Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2020
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design
AbstractWith society now heavily invested in cyber-technology and most cyber-attacks due to human error, it has never been more vital to focus research on human-centric interventions. Whilst some studies have previously investigated the importance of end-...
- research-articleJune 2019
Adversarial Machine Learning Beyond the Image Domain
DAC '19: Proceedings of the 56th Annual Design Automation Conference 2019Article No.: 176, Pages 1–4https://doi.org/10.1145/3316781.3323470Machine learning systems have had enormous success in a wide range of fields from computer vision, natural language processing, and anomaly detection. However, such systems are vulnerable to attackers who can cause deliberate misclassification by ...
- research-articleAugust 2018
Early-stage malware prediction using recurrent neural networks
Computers and Security (CSEC), Volume 77, Issue CPages 578–594https://doi.org/10.1016/j.cose.2018.05.010AbstractStatic malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly by examining the features of an executable piece of code and matching it to previously observed malicious code. However, static code ...
- research-articleJuly 2018
An introduction to cyber peacekeeping
Journal of Network and Computer Applications (JNCA), Volume 114, Issue CPages 70–87https://doi.org/10.1016/j.jnca.2018.04.010AbstractCyber is the newest domain of war, and the topic of cyber warfare is one that is receiving increasing attention. Research efforts into cyber warfare are extensive, covering a range of issues such as legality, cyber weapons and ...
-
- research-articleApril 2017
Determining and Sharing Risk Data in Distributed Interdependent Systems
Any risk analysis of a large infrastructure that does not account for external dependencies is dangerously introspective. A top-down, goal-to-dependencies modeling approach can capture interdependencies and allow supply-chain entities to securely share ...
- bookMarch 2017
Industrial Networks and Intelligent Systems: Second International Conference, INISCOM 2016, Leicester, UK, October 31 November 1, 2016
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial Networks and Intelligent Systems, INISCOM 2016 held in Leicester, UK, October 31 November 1, 2016. The 15 revised full papers ...
- research-articleAugust 2016
Forensic readiness for SCADA/ICS incident response
ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016Pages 1–9https://doi.org/10.14236/ewic/ICS2016.16The actions carried out following any cyber-attack are vital in limiting damage, regaining control and determining the cause and those responsible. Within SCADA and ICS environments there is certainly no exception. Critical National Infrastructure (CNI) ...
- research-articleAugust 2016
Towards a distributed runtime monitor for ICS/SCADA systems
ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016Pages 1–10https://doi.org/10.14236/ewic/ICS2016.15Industrial Control Systems (ICS) and SCADA (Supervisory Control and Data Acquisition) systems are typically used in industries such as electricity generation and supply, gas supply, logistics, manufacturing and hospitals and are considered critical ...
- proceedingAugust 2016
ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016
The 4th International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ...
- research-articleSeptember 2015
Automated asset discovery in industrial control systems: exploring the problem
ICS-CSR '15: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security ResearchPages 73–83https://doi.org/10.14236/ewic/ICS2015.8Vulnerabilities within Industrial Control Systems (ICS) and Critical National Infrastructure (CNI) represent a significant safety, ecological and economical risk to owners, operators and nation states. Numerous examples from recent years are available ...
- research-articleSeptember 2015
A forensic taxonomy of SCADA systems and approach to incident response
ICS-CSR '15: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security ResearchPages 42–51https://doi.org/10.14236/ewic/ICS2015.5SCADA systems that monitor and control Critical National Infrastructure (CNI) are increasingly becoming the target of advanced cyber-attacks since their convergence with TCP/IP and other networks for efficient controlling. When a SCADA incident occurs ...
- proceedingSeptember 2015
ICS-CSR '15: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research
The 3rd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2014) brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-...
- bookSeptember 2015
Third International Symposium for ICS & SCADA Cyber Security Research 2015
The 3rd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR) brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. ...
- research-articleJune 2015
A survey of cyber security management in industrial control systems
International Journal of Critical Infrastructure Protection (IJCIP), Volume 9, Issue CPages 52–80https://doi.org/10.1016/j.ijcip.2015.02.002Contemporary industrial control systems no longer operate in isolation, but use other networks (e.g., corporate networks and the Internet) to facilitate and improve business processes. The consequence of this development is the increased exposure to ...
- research-articleMarch 2015
Cyber warfare
Computers and Security (CSEC), Volume 49, Issue CPages 70–94https://doi.org/10.1016/j.cose.2014.11.007The topic of cyber warfare is a vast one, with numerous sub topics receiving attention from the research community. We first examine the most basic question of what cyber warfare is, comparing existing definitions to find common ground or disagreements. ...
- proceedingSeptember 2014
ICS-CSR 2014: Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research 2014
The 2nd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR) brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. ...
- bookSeptember 2014
Second International Symposium for ICS & SCADA Cyber Security Research 2014
The 2nd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR) brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. ...
- ArticleOctober 2013
A Plausible Solution to SCADA Security Honeypot Systems
BWCCA '13: Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and ApplicationsPages 443–448https://doi.org/10.1109/BWCCA.2013.77The need to urgently address the security issues related to SCADA system remains high. Contrary to regular IT systems, most successful SCADA attacks can have serious consequences on the nation's economy, stability and, worse affect people's live ...
- bookOctober 2013
First International Symposium for ICS & Scada Cyber Security Research 2013
The 1st International Symposium for Industrial Control System & SCADA Cyber Security Research brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber space. Topics ...