Volume 1 (2016)
Issue 1, June 2016
Pages | Title | Author(s) | Papers |
2 - 12 | Utilizing Genetic Programming to Identify Failures in ICS Networks DOI: 10.20533/ijicss.9781.9083.20346.2016.0001 |
Jasenko Hosic, Jereme Lamps, Derek H. Hart | |
13 - 20 | Secure Remote Access to Industrial Control Systems with Mobile Devices DOI: 10.20533/ijicss.9781.9083.20346.2016.0002 |
Laurens Lemaire, Jan Vossaert, Vincent Naessens | |
21 - 30 | Uncertain Information Combination for Decision Making in Smart Grid BDI Agent Systems DOI: 10.20533/ijicss.9781.9083.20346.2016.0003 |
Sarah Calderwood, Kevin McAreavey, Weiru Liu, Jun Hong | |
31 - 39 | SCADA Security: An Attack Tolerant Approach DOI: 10.20533/ijicss.9781.9083.20346.2016.0004 |
Amer Atta Yaseen, Mireille Bayart |
Issue 2, December 2016
Pages | Title | Author(s) | Papers |
44 - 56 | Developing a State of the Art Methodology & Toolkit for ICS SCADA Forensics DOI: 10.20533/ijicss.9781.9083.20346.2016.0005 |
Molly Betts, Joseph Stirland, Funminiyi Olajide, Kevin Jones, Helge Janicke | |
57 - 63 | Secure Cyber: Modelling Physical Impact of Cyber Attacks over Cyber Physical System Network DOI: 10.20533/ijicss.9781.9083.20346.2016.0006 |
Mohammad Shahir, Suhaimi Ibrahim |