Issue 1, June 2016

2 - 12Utilizing Genetic Programming to Identify Failures in ICS Networks

DOI: 10.20533/ijicss.9781.9083.20346.2016.0001
Jasenko Hosic, Jereme Lamps, Derek H. Hart Download Paper
13 - 20Secure Remote Access to Industrial Control Systems with Mobile Devices

DOI: 10.20533/ijicss.9781.9083.20346.2016.0002
Laurens Lemaire, Jan Vossaert, Vincent Naessens Download Paper
21 - 30Uncertain Information Combination for Decision Making in Smart Grid BDI Agent Systems

DOI: 10.20533/ijicss.9781.9083.20346.2016.0003
Sarah Calderwood, Kevin McAreavey, Weiru Liu, Jun Hong Download Paper
31 - 39SCADA Security: An Attack Tolerant Approach

DOI: 10.20533/ijicss.9781.9083.20346.2016.0004
Amer Atta Yaseen, Mireille Bayart Download Paper

Issue 2, December 2016

44 - 56Developing a State of the Art Methodology & Toolkit for ICS SCADA Forensics

DOI: 10.20533/ijicss.9781.9083.20346.2016.0005
Molly Betts, Joseph Stirland, Funminiyi Olajide, Kevin Jones, Helge Janicke Download Paper
57 - 63Secure Cyber: Modelling Physical Impact of Cyber Attacks over Cyber Physical System Network

DOI: 10.20533/ijicss.9781.9083.20346.2016.0006
Mohammad Shahir, Suhaimi Ibrahim Download Paper