CISUC

Improving Network Security Monitoring for Industrial Control Systems

Authors



Keywords

ICS, Monitoring

Subject

ICS, Monitoring

Conference

14th IFIP/IEEE Int. Symposium on Integrated Management (IM 2015), May 2015

DOI


Cited by

Year 2019 : 4 citations

 Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306

 T. Abdelghani, "Industrial control systems (ics) security in power transmission network," 2019 Algerian Large Electrical Network Conference (CAGRE), Algiers, Algeria, 2019, pp. 1-4. DOI: 10.1109/CAGRE.2019.8713289

 D. Zegzhda, D. Lavrova, and M. Poltavtseva, "Multifractal Security Analysis of Cyberphysical Systems", in NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, Vol.22, No.2, pp.196 - 204, 2019.

 Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally, Cybersecurity in industrial control systems: Issues, technologies, and challenges, Computer Networks, Volume 165, 2019, ISSN 1389-1286. DOI: 10.1016/j.comnet.2019.106946.

Year 2018 : 6 citations

 Yau K., Chow KP., Yiu SM. (2018) A Forensic Logging System for Siemens Programmable Logic Controllers. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology, vol 532. Springer, Cham. DOI: 10.1007/978-3-319-99277-8_18

 P. Palaniswamy and B. McMillin, "Cyber-Physical Security of an Electric Microgrid," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 74-83. doi: 10.1109/PRDC.2018.00018

 S. S. Patlolla, B. McMillin, S. Adepu and A. Mathur, "An Approach for Formal Analysis of the Security of a Water Treatment Testbed," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 115-124. doi: 10.1109/PRDC.2018.00022

 Julius C AgumaBruce McMillin, "Introduction of a Hybrid Monitor to Cyber-Physical Systems", May 2018. arXiv:1805.01975

 T. Terzimehic, S. Voss and M. Wenger, "Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems," 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), Munich, Germany, 2018, pp. 881-886. DOI: 10.1109/COASE.2018.8560591.

 Patlolla, Sai Sidharth, "An approach for formal analysis of the security of a water treatment testbed" (2018). Master's Thesis, Missouri University of Science and Technology. http://scholarsmine.mst.edu/masters_theses/7778

Year 2017 : 8 citations

 Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477

 Stergiou, C., Psannis, K., Plageras, A., Kokkonis, G., Ishibashi, Y, "Architecture for security monitoring in IoT environments", in Proc. of 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017 Edinburgh, Scotland, UK, At Edinburgh, Scotland, UK.

 P. R. Dunaka and B. McMillin, "Cyber-Physical Security of a Chemical Plant," 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, 2017, pp. 33-40. doi: 10.1109/HASE.2017.23

 Eden, Peter and Blyth, Andrew and Jones, Kevin and Soulsby, Hugh and Burnap, Pete and Cherdantseva, Yulia and Stoddart, Kristan, "SCADA System Forensic Analysis Within IIoT", in Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, pp73-101, ed. Thames, Lane and Schaefer, Dirk, Springer International Publishing, April 2017.. doi:10.1007/978-3-319-50660-9_4.

 A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, Fourthquarter 2017. doi: 10.1109/COMST.2017.2736886

 Dunaka, Prakash Rao, "Cyber-physical security of a chemical plant" (2017). M.Sc. Thesis in Computer Science, Missouri University of Science an Technology. Available at: http://scholarsmine.mst.edu/masters_theses/7638

 Korkmaz E., Davis M., Dolgikh A., Skormin V. (2017) Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak J., Bay J., Kotenko I., Popyack L., Skormin V., Szczypiorski K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science, vol 10446. Springer, DOI: 10.1007/978-3-319-65127-9_6

 Romero-Mariona J. et al. (2017) An Approach to Organizational Cybersecurity. In: Chang V., Ramachandran M., Walters R., Wills G. (eds) Enterprise Security. Lecture Notes in Computer Science, vol 10131. Springer, Cham, DOI: 10.1007/978-3-319-54380-2_9

Year 2016 : 2 citations

 Hallman, R., Kerr, L., et al., "TMT: Technology Matching Tool for SCADA Network Security", in Proc. of Cybersecurity Symposium 2016, Coeur d’Alene, Idaho, 18-20 April 2016, pp. 38-43. DOI: 10.1109/CYBERSEC.2016.014

 Daniel Cunningham, Geancarlo Palavicini Jr., Jose Romero-Mariona, Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems, Proceedings of the AIAA/USU Conference on Small Satellites, SSC16-IV-6, 2016. http://digitalcommons.usu.edu/smallsat/2016/TS4AdvTech1/6/

Year 2015 : 1 citations

 P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5.