Ranked #1

Towards a SCADA Forensics Architecture
Towards a SCADA Forensics Architecture
With the increasing threat of sophisticated attacks on critical infrastructures, it is vital that forensic investigation... Read more
15 Sep 2013
•
Ranked #2

Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection
SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types ... Read more
15 Sep 2013
•
Similar Podcasts
Ranked #3

Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research
Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research
This paper outlines a general framework for future research into the real-time cyber security assessments of industrial ... Read more
15 Sep 2013
•
Ranked #4

An Initial Investigation into Attribution in SCADA Systems
An Initial Investigation into Attribution in SCADA Systems
Supervisory control and Data Acquisition (SCADA) systems play a core role in a nation’s critical infrastructure, oversee... Read more
15 Sep 2013
•
Ranked #5

The SCADA Threat Landscape
The SCADA Threat Landscape
Nations around the world rely on the correct and continued functioning of industrial control systems (ICS) to keep econo... Read more
15 Sep 2013
•
Ranked #6

An isolated virtual cluster for SCADA network security research
An isolated virtual cluster for SCADA network security research
To enable researchers to perform network security experiments while taking into account the physical component of ICS ne... Read more
15 Sep 2013
•
Ranked #7

HADA: Hybrid Access Decision Architecture for Building Automation and Control Systems
HADA: Hybrid Access Decision Architecture for Building Automation and Control Systems
This paper analyzes the security requirements and constraints in ICS/BACS and proposes the Hybrid Access Decision Archit... Read more
15 Sep 2013
•
Ranked #8

Role Logic and its Application to the Analysis of Process Control Systems from the Socio—Technical System Perspective
Role Logic and its Application to the Analysis of Process Control Systems from the Socio—Technical System Perspective
Security requirements for process control systems can be viewed as a social construct derived from the culture and socie... Read more
15 Sep 2013
•
Ranked #9

Security-Aware, Model-Based Systems Engineering with SysML
Security-Aware, Model-Based Systems Engineering with SysML
This work provides an overview of the literature regarding the key issues faced by engineers attempting to secure indust... Read more
15 Sep 2013
•
Ranked #10

Trusted Virtual Machine Management for Virtualization in Critical Environments
Trusted Virtual Machine Management for Virtualization in Critical Environments
In this paper, we address the problem of securing an existing or new host machine with on-demand integrity measurement s... Read more
15 Sep 2013
•