Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2019
Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild
ICSS: Proceedings of the Fifth Annual Industrial Control System Security (ICSS) WorkshopPages 30–37https://doi.org/10.1145/3372318.3372322Internet connectivity of electronic devices has brought us the ease of centralized management and these days more and more devices are connected to this globally accessible network. At the same time, this landscape has opened new doors for malicious ...
- research-articleDecember 2018
Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
ICSS '18: Proceedings of the 4th Annual Industrial Control System Security WorkshopPages 1–8https://doi.org/10.1145/3295453.3295454Security aspects of SCADA environments and the systems within are increasingly a center of interest to researchers and security professionals. As the rise of sophisticated and nation-state malware targeting such systems flourishes, traditional digital ...
- research-articleDecember 2016
Virtualization of Industrial Control System Testbeds for Cybersecurity
ICSS '16: Proceedings of the 2nd Annual Industrial Control System Security WorkshopPages 10–14https://doi.org/10.1145/3018981.3018988With an immense number of threats pouring in from nation states and hacktivists as well as terrorists and cybercriminals, the requirement of a globally secure infrastructure becomes a major obligation. Most critical infrastructures were primarily ...