![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
3rd ICS-CSR 2015: Ingolstadt, Germany
- Helge Janicke, Kevin I. Jones:
3rd International Symposium for ICS & SCADA Cyber Security Research 2015, ICS-CSR 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany. Workshops in Computing, BCS 2015 - Laurens Lemaire, Jan Vossaert, Joachim Jansen, Vincent Naessens:
Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System. - Roman Schlegel, Sebastian Obermeier, Johannes Schneider:
Assessing the Security of IEC 62351. - Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu:
ICS Threat Analysis Using a Large-Scale Honeynet. - Tingting Li, Chris Hankin:
A Model-based Approach to Interdependency between Safety and Security in ICS. - Peter Eden, Andrew Blyth, Pete Burnap
, Kevin Jones, Kristan Stoddart:
A Forensic Taxonomy of SCADA Systems and Approach to Incident Response. - Ivo Friedberg, David M. Laverty
, Kieran McLaughlin, Paul Smith:
A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation. - Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano:
Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts. - Adam Wedgbury, Kevin Jones:
Automated Asset Discovery in Industrial Control Systems - Exploring the Problem. - Giuseppe Settanni, Florian Skopik
, Helmut Kaufmann, Tobias Gebhardt, Klaus Theuerkauf, Konstantin Böttinger, Mark Carolan, Damien Conroy, Pia Olli:
A Blueprint for a Pan-European Cyber Incident Analysis System. - Johannes Schneider, Sebastian Obermeier, Roman Schlegel:
Cyber Security Maintenance for SCADA Systems. - Ying He, Helge Janicke:
Towards Agile Industrial Control Systems Incident Response. - Christoph Lang-Muhr, Matthias Schrattenholzer, Paul Tavolato:
Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures. - Grigoris Tzokatziou, Leandros A. Maglaras, Helge Janicke:
Insecure by Design: Using Human Interface Devices to exploit SCADA systems. - Cordell C. Davidson, Joel A. Dawson
, Paul Carsten, Mark Yampolskiy, Todd R. Andel:
Investigating the Applicability of a Moving Target Defense for SCADA systems. - Paul Carsten, Todd R. Andel
, Mark Yampolskiy, Jeffrey Todd McDonald, Samuel H. Russ:
A System to Recognize Intruders in Controller Area Network (CAN).
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.