Abstract is missing.
- An Initial Investigation into Attribution in SCADA SystemsAndrew Nicholson, Helge Janicke, Tim Watson. [doi]
- Trusted Virtual Machine Management for Virtualization in Critical EnvironmentsKhan Ferdous Wahid, Nicolai Kuntze, Carsten Rudolph. [doi]
- Intrusion Detection via Machine Learning for SCADA System ProtectionS. L. P. Yasakethu, J. Jiang. [doi]
- Role Logic and its Application to the Analysis of Process Control Systems from the Socio - Technical System PerspectiveAndrew J. C. Blyth. [doi]
- The SCADA Threat LandscapeMichael Robinson. [doi]
- Industrial Control System Cyber AttacksThomas H. Morris, Wei Gao. [doi]
- A Model for the Analysis of Security Policies in Industrial NetworksIvan Cibrario Bertolotti, Luca Durante, Tingting Hu, Adriano Valenzano. [doi]
- Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future ResearchWilliam Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, Kevin Jones. [doi]
- Towards a SCADA Forensics ArchitectureTina Wu, Jules Ferdinand Pagna Disso, Kevin Jones, Adrian Campos. [doi]
- An isolated virtual cluster for SCADA network security researchAntoine Lemay, José M. Fernandez, Scott Knight. [doi]
- Security-Aware, Model-Based Systems Engineering with SysMLRobert Oates, Fran Thom, Graham Herries. [doi]
- HADA: Hybrid Access Decision Architecture for Building Automation and Control SystemsAmit Soni, Sye Loong Keoh, Sandeep S. Kumar, Oscar García Morchon. [doi]