Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3295453acmotherconferencesBook PagePublication PagesicssConference Proceedingsconference-collections
ICSS '18: Proceedings of the 4th Annual Industrial Control System Security Workshop
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICSS '18: 4th Annual Industrial Control System Security Workshop San Juan PR USA 4 December 2018
ISBN:
978-1-4503-6220-7
Published:
04 December 2018
In-Cooperation:
ACSA

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems

Security aspects of SCADA environments and the systems within are increasingly a center of interest to researchers and security professionals. As the rise of sophisticated and nation-state malware targeting such systems flourishes, traditional digital ...

research-article
Graph-Based Data-Collection Policies for the Internet of Things

Smart industrial control systems (e.g., smart grid, oil and gas systems, transportation systems) are connected to the internet, and have the capability to collect and transmit data; as such, they are part of the IoT. The data collected can be used to ...

research-article
The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems

Much research effort has recently been devoted to securing Industrial Control Systems (ICS) in response to the increasing number of adverse incidents targeting nation-wide critical infrastructures. Leveraging the static and regular nature of the ...

research-article
Public Access
A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response

The integration of modern information technologies with industrial control systems has created an enormous interest in the security of industrial control, however, given the cost, variety, and industry practices, it is hard for researchers to test and ...

research-article
Public Access
Securing Your ICS Software with the AttackSurface Host Analyzer (AHA)

Implementing a secure development lifecycle (SDL) presents increasing challenges to software developers as they must ensure software correctly integrates both underlying operating system security features while also managing dependencies on third-party ...

Contributors
  • Griffith University
  • Hamburg University of Technology
  • Advanced Digital Sciences Center
  • Old Dominion University
  • Samsung Research America
  • European Commission Joint Research Centre
  • Oakland University
  • Queensland University of Technology
  • Georgia Institute of Technology

Recommendations