Abstract is missing.
- Distinguished keynote speakerKevin Warwick. 8 [doi]
- Keynote speaker 1Frank Z. Wang. 9 [doi]
- Keynote speaker 2Martin Visser. 10-11 [doi]
- Keynote speaker 3Aspen Olmsted. 12 [doi]
- Keynote speaker 4Frank Geels. 13 [doi]
- Keynote speaker 5Maryline Chetto. 14 [doi]
- PhD and Doctorate ConsortiumCharles A. Shoniregun. 15-16 [doi]
- Disturbance observer-based predictive functional control using zero phase error tracking controllerHiroki Hara, Toshiyuki Satoh, Naoki Saito, Jun-Ya Nagase, Norihiko Saga. 19-20 [doi]
- Industrial communication intrusion detection algorithm based on improved one-class SVMWenli Shang, Lin Li, Ming Wan, Peng Zeng. 21-25 [doi]
- Disturbance observer-based model predictive control using time-varying constraintsRie Abe, Toshiyuki Satoh, Naoki Saito, Jun-Ya Nagase, Norihiko Saga. 26-27 [doi]
- Agent-based PKI for Distributed Control SystemSergi Blanch-Torne, Fernando Cores, Ramiro Moreno Chiral. 28-35 [doi]
- Attack-Tolerant networked control system based on the deception for the cyber-attacksAmer Atta Yaseen, Mireille Bayart. 37-44 [doi]
- Frequency-based anomaly detection for the automotive CAN busAdrian Taylor, Nathalie Japkowicz, Sylvain Leblanc. 45-49 [doi]
- Evolving decision trees to detect anomalies in recurrent ICS networksJasenko Hosic, Jereme Lamps, Derek H. Hart. 50-57 [doi]
- Performance characteristics of an improved single neuron PID controller using additional error of an inversed control signalBenyamin Kusumoputro, Muhammad Rif'an. 58-62 [doi]
- Contextual merging of uncertain information for better informed plan selection in BDI systemsSarah Calderwood, Kevin McAreavey, Weiru Liu, Jun Hong. 64-65 [doi]
- Applicability of Domain Based Security risk modeling to SCADA systemsShireesha Katam, Pavol Zavarsky, Francis Gichohi. 66-69 [doi]
- Secure remote access to an industrial generator with mobile devicesLaurens Lemaire, Jan Vossaert, Vincent Naessens. 70-75 [doi]
- Security as a flow machineSabah Al-Fedaghi. 76-81 [doi]
- Kalman filter based vision-servoing alignment system for human ear surgeryWenchao Gao, Wenyu Liang, Kok Kiong Tan. 83-88 [doi]
- Integration of Fuzzy-QFD and AHP base on a fuzzy scale for mini-CNC milling machine retrofitRattawut Vongvit. 89-94 [doi]
- An identification protocol based on the twisted ring-root extraction problemMaheswara Rao Valluri. 95-97 [doi]