Login / Signup
WCICSS
2016
2016
2016
Keyphrases
Publications
2016
Amer Atta Yaseen
,
Mireille Bayart
Towards distinguishing between faults and cyber-attacks in the networked control system.
WCICSS
(2016)
Niall O' Mahony
,
Trevor Murphy
,
Krishna Panduru
,
Daniel Riordan
,
Joseph Walsh
Machine learning algorithms for process analytical technology.
WCICSS
(2016)
Haroon Wardak
,
Sami Zhioua
,
Ahmad Almulhem
PLC access control: a security analysis.
WCICSS
(2016)
Maheswara Rao Valluri
,
Shailendra Vikash Narayan
Quaternion public key cryptosystems.
WCICSS
(2016)
Muhammad Zia Ur Rahman
,
Inam Ul Hassan Shaikh
,
Ahsan Ali
,
Nasir Ahmad
Fixed structure Hα control of couple tank system and anti-integral windup PID control strategy for actuator saturation.
WCICSS
(2016)
C. Y. Lam
Resilience of logistics network: analysis and design.
WCICSS
(2016)
Ed O'Connor
,
Joseph Walsh
Analysis of carbon displacement possibilities from conversion of existing fossil fuel driven domestic heating systems to biomass driven domestic heating system.
WCICSS
(2016)
Asem Ghaleb
,
Sami Zhioua
,
Ahmad Almulhem
SCADA-SST: a SCADA security testbed.
WCICSS
(2016)
Charles Kim
Cyber-resilient industrial control system with diversified architecture and bus monitoring.
WCICSS
(2016)
2016 World Congress on Industrial Control Systems Security, WCICSS 2016, London, United Kingdom, December 12-14, 2016
WCICSS
(2016)
2015
Wenchao Gao
,
Wenyu Liang
,
Kok Kiong Tan
Kalman filter based vision-servoing alignment system for human ear surgery.
WCICSS
(2015)
Sarah Calderwood
,
Kevin McAreavey
,
Weiru Liu
,
Jun Hong
Contextual merging of uncertain information for better informed plan selection in BDI systems.
WCICSS
(2015)
Maheswara Rao Valluri
An identification protocol based on the twisted ring-root extraction problem.
WCICSS
(2015)
Martin Visser
Keynote speaker 2.
WCICSS
(2015)
Shireesha Katam
,
Pavol Zavarsky
,
Francis Gichohi
Applicability of Domain Based Security risk modeling to SCADA systems.
WCICSS
(2015)
Laurens Lemaire
,
Jan Vossaert
,
Vincent Naessens
Secure remote access to an industrial generator with mobile devices.
WCICSS
(2015)
Wenli Shang
,
Lin Li
,
Ming Wan
,
Peng Zeng
Industrial communication intrusion detection algorithm based on improved one-class SVM.
WCICSS
(2015)
Rie Abe
,
Toshiyuki Satoh
,
Naoki Saito
,
Jun-Ya Nagase
,
Norihiko Saga
Disturbance observer-based model predictive control using time-varying constraints.
WCICSS
(2015)
Benyamin Kusumoputro
,
Muhammad Rif'an
Performance characteristics of an improved single neuron PID controller using additional error of an inversed control signal.
WCICSS
(2015)
Amer Atta Yaseen
,
Mireille Bayart
Attack-Tolerant networked control system based on the deception for the cyber-attacks.
WCICSS
(2015)
Jasenko Hosic
,
Jereme Lamps
,
Derek H. Hart
Evolving decision trees to detect anomalies in recurrent ICS networks.
WCICSS
(2015)
2015 World Congress on Industrial Control Systems Security, WCICSS 2015, London, United Kingdom, December 14-16, 2015
WCICSS
(2015)
Kevin Warwick
Distinguished keynote speaker.
WCICSS
(2015)
Frank Z. Wang
Keynote speaker 1.
WCICSS
(2015)
Hiroki Hara
,
Toshiyuki Satoh
,
Naoki Saito
,
Jun-Ya Nagase
,
Norihiko Saga
Disturbance observer-based predictive functional control using zero phase error tracking controller.
WCICSS
(2015)
Vongvit Rattawut
Integration of Fuzzy-QFD and AHP base on a fuzzy scale for mini-CNC milling machine retrofit.
WCICSS
(2015)
Adrian Taylor
,
Nathalie Japkowicz
,
Sylvain Leblanc
Frequency-based anomaly detection for the automotive CAN bus.
WCICSS
(2015)
Aspen Olmsted
Keynote speaker 3.
WCICSS
(2015)
Sergi Blanch-Torne
,
Fernando Cores
,
Ramiro Moreno Chiral
Agent-based PKI for Distributed Control System.
WCICSS
(2015)
Maryline Chetto
Keynote speaker 5.
WCICSS
(2015)
Sabah Al-Fedaghi
Security as a flow machine.
WCICSS
(2015)
Charles A. Shoniregun
PhD and Doctorate Consortium.
WCICSS
(2015)
Frank Geels
Keynote speaker 4.
WCICSS
(2015)