On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks



P. Simões, T. Cruz, J. Gomes, E. Monteiro, , Proc. of the 12th European Conf. on Information Warfare and Security (ECIW 2013), pp. 263-270, Jyväskylä, Finland, 11-12 July 2013.


Protection of Critical Infrastructures, Security, SCADA Systems


In Proc. of 12th European Conference on Information Warfare and Security (ECIW 2013). ISBN: 978-1-909507-34-0 ISSN: 2048-8602, July 2013

Cited by

Year 2019 : 2 citations

 Amine Belqruch and Abdelilah Maach. "SCADA security using SSH honeypot". In Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19). ACM, New York, NY, USA, Article 2, 5 pages. DOI:

 Maglaras L., Ferrag M.A., Derhab A., Mukherjee M., Janicke H. (2019) Cyber Security: From Regulations and Policies to Practice. In: Kavoura A., Kefallonitis E., Giovanis A. (eds) Strategic Innovative Marketing and Tourism. Springer Proceedings in Business and Economics. Springer, Cham. DOI: 10.1007/978-3-030-12453-3_88

Year 2018 : 3 citations

 Maglaras, Leandros & Ferrag, Mohamed Amine & Derhab, Abdelouahid & Mukherjee, Mithun & Janicke, Helge. (2018). Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. Security and Safety.

 Palleti, V.R., Tan, Y.C., Samavedham, L., A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems, (2018) Journal of Process Control, 68, pp. 160-170. DOI: 10.1016/j.jprocont.2018.05.005

 Adam Rose, Noah Miller, Jonathan Eyer, Joshua Banks, (2018). Economic Effectiveness of Mitigation and Resilience. 315-351. 10.1007/978-3-319-77492-3_14. May 2018.

Year 2017 : 2 citations

 Angséus, J., Ekbom, R., "Network-based Intrusion Detection Systems for Industrial Control Systems", Master’s thesis in Computer Systems and Networks (MPCSN), Department of Computer Science and Engineering. CHALMERS UNIVERSITY OF TECHNOLOGY/UNIVERSITY OF GOTHENBURG, Gothenburg, Sweden 2017

 Ibraheem Frieslaar and Barry Irwin. 2017. Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable. In Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT '17). ACM, New York, NY, USA, Article 15, 10 pages. DOI:

Year 2016 : 2 citations

 Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016

 J. Nurmi, J. Kannisto and M. Vajaranta, "Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet," 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), Fukuoka, Japan, 2016, pp. 55-59.
doi: 10.1109/AsiaJCIS.2016.31

Year 2015 : 1 citations

 Kamil Koltys and Robert Gajewski, SHaPe: A Honeypot for Electric Power Substation, Journal of Telecommunications and Information Technology, 2015, vol. 4, pp. 37-43.