-
1
-
-
85001831785
-
-
Online: accessed August 1st 2016
-
Snort. https://www.snort.org/. [Online: accessed August 1st 2016].
-
Snort
-
-
-
2
-
-
84964801519
-
Scheduling intrusion detection systems in resource-bounded cyber-physical systems
-
W. Abbas, A. Laszka, Y. Vorobeychik, and X. D. Koutsoukos. Scheduling intrusion detection systems in resource-bounded cyber-physical systems. In Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015, pages 55-66, 2015.
-
(2015)
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015
, pp. 55-66
-
-
Abbas, W.1
Laszka, A.2
Vorobeychik, Y.3
Koutsoukos, X.D.4
-
3
-
-
85001650365
-
Simaticscan: Towards a specialised vulnerability scanner for industrial control systems
-
R. Antrobus, S. Frey, B. Green, and A. Rashid. Simaticscan: Towards a specialised vulnerability scanner for industrial control systems. In Proceedings of the 4th International Symposium on ICS & SCADA Cyber Security Research (ICS-CSR 2016), ICS-CSR 2016, 2016.
-
(2016)
Proceedings of the 4th International Symposium on ICS & SCADA Cyber Security Research (ICS-CSR 2016), ICS-CSR 2016
-
-
Antrobus, R.1
Frey, S.2
Green, B.3
Rashid, A.4
-
4
-
-
84929713854
-
Sequence-aware intrusion detection in industrial control systems
-
M. Caselli, E. Zambon, and F. Kargl. Sequence-aware intrusion detection in industrial control systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS 2015, Singapore, Republic of Singapore, April 14 - March 14, 2015, pages 13-24, 2015.
-
(2015)
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS 2015, Singapore, Republic of Singapore, April 14 - March 14, 2015
, pp. 13-24
-
-
Caselli, M.1
Zambon, E.2
Kargl, F.3
-
6
-
-
85001592010
-
-
Digital Bond
-
Digital Bond. PLCScan, 2016.
-
(2016)
PLCScan
-
-
-
7
-
-
84973460527
-
On the role of latent design conditions in cyber-physical systems security
-
ACM
-
S. Frey, A. Rashid, A. Zanutto, J. Busby, and K. Szmagalska-Follis. On the role of latent design conditions in cyber-physical systems security. In Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, Austin, Texas, pages 43-46. ACM, 2016.
-
(2016)
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, Austin, Texas
, pp. 43-46
-
-
Frey, S.1
Rashid, A.2
Zanutto, A.3
Busby, J.4
Szmagalska-Follis, K.5
-
9
-
-
36248958741
-
Passive scanning in modbus networks
-
J. González and M. Papa. Passive scanning in modbus networks. In Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pages 175-187, 2007.
-
(2007)
Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007
, pp. 175-187
-
-
González, J.1
Papa, M.2
-
10
-
-
85022328702
-
Testbed diversity as a fundamental principle for effective ICS security research
-
Lancaster University Technical Report
-
B. Green, S. Frey, A. Rashid, and D. Hutchison. Testbed diversity as a fundamental principle for effective ICS security research. In Proceedings of the First International Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN), pages 12-15. Lancaster University Technical Report SCC-2016-01, 2016.
-
(2016)
Proceedings of the First International Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN)
, pp. 12-15
-
-
Green, B.1
Frey, S.2
Rashid, A.3
Hutchison, D.4
-
11
-
-
85001759344
-
Achieving ics resilience and security through granular data flow management
-
B. Green, M. Krotofil, and D. Hutchison. Achieving ics resilience and security through granular data flow management. In 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC), Austria, Vienna, October 28, 2016, 2016.
-
(2016)
2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC), Austria, Vienna, October 28, 2016
-
-
Green, B.1
Krotofil, M.2
Hutchison, D.3
-
12
-
-
84954527190
-
Through the eye of the PLC: Semantic security monitoring for industrial processes
-
D. Hadziosmanovic, R. Sommer, E. Zambon, and P. H. Hartel. Through the eye of the PLC: semantic security monitoring for industrial processes. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014, pages 126-135, 2014.
-
(2014)
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014
, pp. 126-135
-
-
Hadziosmanovic, D.1
Sommer, R.2
Zambon, E.3
Hartel, P.H.4
-
13
-
-
85001818000
-
-
Infracritical. Last accessed 12 April 2016
-
Infracritical. Project SHINE findings report. http://www.slideshare.net/BobRadvanovsky/project-shine-findings-report-dated-1oct2014, 2014. Last accessed 12 April 2016.
-
(2014)
Project SHINE Findings Report
-
-
-
14
-
-
85001619835
-
Accurate modeling of the siemens S7 SCADA protocol for intrusion detection and digital forensic
-
A. Kleinmann and A. Wool. Accurate modeling of the siemens S7 SCADA protocol for intrusion detection and digital forensic. JDFSL, 9(2):37-50, 2014.
-
(2014)
JDFSL
, vol.9
, Issue.2
, pp. 37-50
-
-
Kleinmann, A.1
Wool, A.2
-
16
-
-
84899706706
-
Secure data transfer guidance for industrial control and SCADA systems
-
Last accessed 4 January 2016
-
R. E. Mahan, J. D. Fluckiger, S. L. Clements, C. Tews, J. R. Burnette, C. A. Goranson, and H. Kirkham. Secure data transfer guidance for industrial control and SCADA systems. Pacific Northwest National Lab (PNNL) Report, http://www.pnnl.gov/main/publications/external/technical-reports/PNNL-20776.pdf, 2011. Last accessed 4 January 2016.
-
(2011)
Pacific Northwest National Lab (PNNL) Report
-
-
Mahan, R.E.1
Fluckiger, J.D.2
Clements, S.L.3
Tews, C.4
Burnette, J.R.5
Goranson, C.A.6
Kirkham, H.7
-
17
-
-
85001817978
-
PRECYSE: Cyber-attack detection and response for industrial control systems
-
K. McLaughlin, S. Sezer, P. Smith, Z. Ma, and F. Skopik. PRECYSE: cyber-attack detection and response for industrial control systems. In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria, 2014.
-
(2014)
2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria
-
-
McLaughlin, K.1
Sezer, S.2
Smith, P.3
Ma, Z.4
Skopik, F.5
-
18
-
-
84869463457
-
SABOT: Specification-based payload generation for programmable logic controllers
-
S. E. McLaughlin and P. McDaniel. SABOT: specification-based payload generation for programmable logic controllers. In the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012, pages 439-449, 2012.
-
(2012)
The ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012
, pp. 439-449
-
-
McLaughlin, S.E.1
McDaniel, P.2
-
19
-
-
84991904281
-
Position paper: Safety and security monitoring in ICS/SCADA systems
-
UK, BCS
-
A. Nicholson, H. Janicke, and A. Cau. Position paper: Safety and security monitoring in ICS/SCADA systems. In Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, pages 61-66, UK, 2014. BCS.
-
(2014)
Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014
, pp. 61-66
-
-
Nicholson, A.1
Janicke, H.2
Cau, A.3
-
20
-
-
85001619833
-
Design and Construction of an Industrial Control System Testbed
-
B. Paske, B. Green, D. Prince, and D. Hutchison. Design and Construction of an Industrial Control System Testbed. In PGNET, pages 151-156, 2014.
-
(2014)
PGNET
, pp. 151-156
-
-
Paske, B.1
Green, B.2
Prince, D.3
Hutchison, D.4
-
22
-
-
84948985283
-
Intrusion detection for airborne communication using PHY-Layer information
-
M. Strohmeier, V. Lenders, and I. Martinovic. Intrusion detection for airborne communication using PHY-Layer information. In Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings, pages 67-77, 2015.
-
(2015)
Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
, pp. 67-77
-
-
Strohmeier, M.1
Lenders, V.2
Martinovic, I.3
|