Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 Revised Selected Papers / [electronic resource] :
edited by Adrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis Katsikas, Costas Lambrinoudakis.
- 1st ed. 2016.
- X, 169 p. 41 illus. online resource.
- Security and Cryptology, 9588 2946-1863 ; .
- Security and Cryptology, 9588 .
ICSs: Cyber protection and cyber defense of SCADA systems -- Plant control systems -- Engineering workstations -- Substation equipment -- Programmable logic controllers -- PLCs, and other industrial control system -- WOS-CPS: Security of Cyber Physical Systems -- In embedded systems -- In smart vehicles -- SCADA systems in smart grids -- Control systems in water distribution systems -- In smart transportation systems etc. .
This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security. The 6 revised full papers and 2 short papers of CyberICS 2015 presented together with 3 revised full papers of WOS-CPS 2015 were carefully reviewed and selected from 28 initial submissions. CyberICS 2015 focuses on topics covering ICSs, including cyber protection and cyber defense of SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers, PLCs, and other industrial control system. WOS-CPS 2015 deals with the Security of Cyber Physical Systems, that exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems etc. .
9783319403854
10.1007/978-3-319-40385-4 doi
Data protection. Cryptography. Data encryption (Computer science). Computer engineering. Computer networks . Application software. Electronic data processing--Management. Computers and civilization. Data and Information Security. Cryptology. Computer Engineering and Networks. Computer and Information Systems Applications. IT Operations. Computers and Society.