


default search action
WCICSS 2015: London, United Kingdom
- 2015 World Congress on Industrial Control Systems Security, WCICSS 2015, London, United Kingdom, December 14-16, 2015. IEEE 2015, ISBN 978-1-9083-2058-2
Keynote Speakers
- Kevin Warwick:
Distinguished keynote speaker. 8 - Frank Z. Wang:
Keynote speaker 1. 9 - Martin Visser:
Keynote speaker 2. 10-11 - Aspen Olmsted:
Keynote speaker 3. 12 - Frank W. Geels:
Keynote speaker 4. 13 - Maryline Chetto
:
Keynote speaker 5. 14
PhD and Doctorate Consortium
- Charles A. Shoniregun:
PhD and Doctorate Consortium. 15-16
Session 1: Industrial Control Systems
- Hiroki Hara, Toshiyuki Satoh
, Naoki Saito, Jun-Ya Nagase, Norihiko Saga
:
Disturbance observer-based predictive functional control using zero phase error tracking controller. 19-20 - Wenli Shang, Lin Li, Ming Wan, Peng Zeng
:
Industrial communication intrusion detection algorithm based on improved one-class SVM. 21-25 - Rie Abe, Toshiyuki Satoh
, Naoki Saito, Jun-Ya Nagase, Norihiko Saga
:
Disturbance observer-based model predictive control using time-varying constraints. 26-27 - Sergi Blanch-Torne, Fernando Cores
, Ramiro Moreno Chiral:
Agent-based PKI for Distributed Control System. 28-35
Session 2: Networked Industrial Control Systems
- Amer Atta Yaseen, Mireille Bayart
:
Attack-Tolerant networked control system based on the deception for the cyber-attacks. 37-44 - Adrian Taylor, Nathalie Japkowicz
, Sylvain P. Leblanc
:
Frequency-based anomaly detection for the automotive CAN bus. 45-49 - Jasenko Hosic, Jereme Lamps, Derek H. Hart:
Evolving decision trees to detect anomalies in recurrent ICS networks. 50-57 - Benyamin Kusumoputro, Muhammad Rif'an
:
Performance characteristics of an improved single neuron PID controller using additional error of an inversed control signal. 58-62
Session 3: Industrial Control Systems and Security
- Sarah Calderwood, Kevin McAreavey, Weiru Liu
, Jun Hong:
Contextual merging of uncertain information for better informed plan selection in BDI systems. 64-65 - Shireesha Katam, Pavol Zavarsky, Francis Gichohi:
Applicability of Domain Based Security risk modeling to SCADA systems. 66-69 - Laurens Lemaire, Jan Vossaert, Vincent Naessens:
Secure remote access to an industrial generator with mobile devices. 70-75 - Sabah Al-Fedaghi:
Security as a flow machine. 76-81
Session 4: Advanced Applications
- Wenchao Gao, Wenyu Liang
, Kok Kiong Tan:
Kalman filter based vision-servoing alignment system for human ear surgery. 83-88 - Rattawut Vongvit
:
Integration of Fuzzy-QFD and AHP base on a fuzzy scale for mini-CNC milling machine retrofit. 89-94 - Maheswara Rao Valluri
:
An identification protocol based on the twisted ring-root extraction problem. 95-97

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.