


default search action
WCICSS 2015: London, United Kingdom
- 2015 World Congress on Industrial Control Systems Security, WCICSS 2015, London, United Kingdom, December 14-16, 2015. IEEE 2015, ISBN 978-1-9083-2058-2

Keynote Speakers
- Kevin Warwick:

Distinguished keynote speaker. 8 - Frank Z. Wang:

Keynote speaker 1. 9 - Martin Visser:

Keynote speaker 2. 10-11 - Aspen Olmsted:

Keynote speaker 3. 12 - Frank W. Geels:

Keynote speaker 4. 13 - Maryline Chetto

:
Keynote speaker 5. 14
PhD and Doctorate Consortium
- Charles A. Shoniregun:

PhD and Doctorate Consortium. 15-16
Session 1: Industrial Control Systems
- Hiroki Hara, Toshiyuki Satoh

, Naoki Saito, Jun-Ya Nagase, Norihiko Saga
:
Disturbance observer-based predictive functional control using zero phase error tracking controller. 19-20 - Wenli Shang, Lin Li, Ming Wan, Peng Zeng

:
Industrial communication intrusion detection algorithm based on improved one-class SVM. 21-25 - Rie Abe, Toshiyuki Satoh

, Naoki Saito, Jun-Ya Nagase, Norihiko Saga
:
Disturbance observer-based model predictive control using time-varying constraints. 26-27 - Sergi Blanch-Torne, Fernando Cores

, Ramiro Moreno Chiral:
Agent-based PKI for Distributed Control System. 28-35
Session 2: Networked Industrial Control Systems
- Amer Atta Yaseen, Mireille Bayart

:
Attack-Tolerant networked control system based on the deception for the cyber-attacks. 37-44 - Adrian Taylor, Nathalie Japkowicz

, Sylvain P. Leblanc
:
Frequency-based anomaly detection for the automotive CAN bus. 45-49 - Jasenko Hosic, Jereme Lamps, Derek H. Hart:

Evolving decision trees to detect anomalies in recurrent ICS networks. 50-57 - Benyamin Kusumoputro, Muhammad Rif'an

:
Performance characteristics of an improved single neuron PID controller using additional error of an inversed control signal. 58-62
Session 3: Industrial Control Systems and Security
- Sarah Calderwood, Kevin McAreavey, Weiru Liu

, Jun Hong:
Contextual merging of uncertain information for better informed plan selection in BDI systems. 64-65 - Shireesha Katam, Pavol Zavarsky, Francis Gichohi:

Applicability of Domain Based Security risk modeling to SCADA systems. 66-69 - Laurens Lemaire, Jan Vossaert, Vincent Naessens:

Secure remote access to an industrial generator with mobile devices. 70-75 - Sabah Al-Fedaghi:

Security as a flow machine. 76-81
Session 4: Advanced Applications
- Wenchao Gao, Wenyu Liang

, Kok Kiong Tan:
Kalman filter based vision-servoing alignment system for human ear surgery. 83-88 - Rattawut Vongvit

:
Integration of Fuzzy-QFD and AHP base on a fuzzy scale for mini-CNC milling machine retrofit. 89-94 - Maheswara Rao Valluri

:
An identification protocol based on the twisted ring-root extraction problem. 95-97

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














