2,096
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) - Index

      proceedings-article
      ,
      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)
      Cyber Security Research
      17 - 18 September 2015
      Bookmark

            Abstract

            The 3rd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR) brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. ICS-CSR is a research conference aimed at high-quality academic research in the cyber security of industrial control system from the hardware, system and human-factor perspectives.

            The 3rd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR) brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. ICS-CSR is a research conference aimed at high-quality academic research in the cyber security of industrial control system from the hardware, system and human-factor perspectives.

            The papers in this proceedings cover a wide spectrum of ICS cyber security issues and range from automated asset identification over Intrusion Detection to Active Defence using large scale honeypots. Other technical contributions include the extraction of vulnerabilities from ICS designs and the analysis of microgrid cyber security. This year, other topics are covered that address the response to incidents in ICS and SCADA systems as well as their forensically sound investigation. www.ics-csr.com

            Main article text

            Papers:

            Laurens Lemaire, Jan Vossaert, Joachim Jansen & Vincent Naessens Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System http://dx.doi.org/10.14236/ewic/ICSCSR2015.1

            Roman Schlegel, Sebastian Obermeier & Johannes Schneider Assessing the Security of IEC 62351 http://dx.doi.org/10.14236/ewic/ICSCSR2015.2

            Alexandru Vlad Serbanescu, Sebastian Obermeier & Der-Yeuan Yu ICS Threat Analysis Using a Large-Scale Honeynet http://dx.doi.org/10.14236/ewic/ICSCSR2015.3

            Tingting Li & Chris Hankin A Model-based Approach to Interdependency between Safety and Security in ICS http://dx.doi.org/10.14236/ewic/ICSCSR2015.4

            Peter Eden, Andrew Blyth, Pete Burnap, Kevin Jones & Kristan Stoddart A Forensic Taxonomy of SCADA Systems and Approach to Incident Response http://dx.doi.org/10.14236/ewic/ICSCSR2015.5

            Ivo Friedberg, David Laverty, Kieran McLaughlin & Paul Smith A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation http://dx.doi.org/10.14236/ewic/ICSCSR2015.6

            Manuel Cheminod, Luca Durante, Lucia Seno & Adriano Valenzano Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts http://dx.doi.org/10.14236/ewic/ICSCSR2015.7

            Adam Wedgbury & Kevin Jones Automated Asset Discovery in Industrial Control Systems - Exploring the Problem http://dx.doi.org/10.14236/ewic/ICSCSR2015.8

            Giuseppe Settanni, Florian Skopik, Helmut Kaufmann, Tobias Gebhardt, Klaus Theuerkauf, Konstantin Boettinger, Mark Carolan, Damien Conroy & Pia Olli A Blueprint for a Pan-European Cyber Incident Analysis System http://dx.doi.org/10.14236/ewic/ICSCSR2015.9

            Johannes Schneider, Sebastian Obermeier & Roman Schlegel Cyber Security Maintenance for SCADA Systems http://dx.doi.org/10.14236/ewic/ICSCSR2015.10

            Ying He & Helge Janicke Towards Agile Industrial Control Systems Incident Response http://dx.doi.org/10.14236/ewic/ICSCSR2015.11

            Christoph Lang-Muhr, Matthias Schrattenholzer & Paul Tavolato Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures http://dx.doi.org/10.14236/ewic/ICSCSR2015.12

            Grigoris Tzokatziou, Leandros Maglaras & Helge Janicke Insecure by Design: Using Human Interface Devices to exploit SCADA systems http://dx.doi.org/10.14236/ewic/ICSCSR2015.13

            Cordell C. Davidson, Joel Dawson, Paul Carsten, Mark Yampolskiy & Todd R. Andel Investigating the Applicability of a Moving Target Defense for SCADA systems http://dx.doi.org/10.14236/ewic/ICSCSR2015.14

            Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey T. McDonald & Samuel Russ A System to Recognize Intruders in Controller Area Network (CAN) http://dx.doi.org/10.14236/ewic/ICSCSR2015.15

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            Article
            10.14236/ewic/ICSCSR2015.0
            c320951e-6f89-4fe0-90b0-c3d3436616db
            Copyright @ 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            University of Applied Sciences Ingolstadt, Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction

            Comments

            Comment on this article