Security of Industrial Control Systems and Cyber-Physical Systems

Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers

  • Nora Cuppens-Boulahia
  • Costas Lambrinoudakis
  • Frédéric Cuppens
  • Sokratis Katsikas
Conference proceedings CyberICPS 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10166)

Also part of the Security and Cryptology book sub series (LNSC, volume 10166)

Table of contents

  1. Front Matter
    Pages I-VII
  2. Invited Papers

    1. Front Matter
      Pages 1-1
    2. Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro
      Pages 3-18
    3. Dimitris Gritzalis, George Stergiopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos, Georgia Lykou
      Pages 19-34
  3. Full Papers

    1. Front Matter
      Pages 35-35
    2. Vasileios Gkioulos, Stephen D. Wolthusen
      Pages 37-51
    3. Pacome L. Ambassa, Stephen D. Wolthusen, Anne V. D. M. Kayem, Christoph Meinel
      Pages 52-68
    4. Goitom K. Weldehawaryat, Pacome L. Ambassa, Anesu M. C. Marufu, Stephen D. Wolthusen, Anne V. D. M. Kayem
      Pages 69-86
    5. Jonathan Yung, Hervé Debar, Louis Granboulan
      Pages 87-102
  4. Back Matter
    Pages 121-121

About these proceedings


This book constitutes the refereed proceedings of the Second Conference on

Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2016, held in Crete, Greece, in September 2016 in conjunction with ESORICS 2016, the 21st annual European Symposium on Research in Computer Security.

The 5 revised full papers  2 invited papers presented were carefully reviewed and selected from 18 initial submissions. CyberICPS 2016 focuses on topics related to the management of cyber security in industrial control systems and cyber-physical systems, including security monitoring, trust management, security policies and measures.


security policies risk analysis and management vulnerability assessment and metrics awaremess, training and simulation ICS/CPS security standards privacy and anonymity in ICS/CPS threat modeling security architectures access control malware and cyber weapons intrusion detection and visualisation defense in depth monitoring and real time supervision defense in depth monitoring and real time supervision applied cryptography perimeter security safety-security interactions cyber security engineering secure communication protocols

Editors and affiliations

  • Nora Cuppens-Boulahia
    • 1
  • Costas Lambrinoudakis
    • 2
  • Frédéric Cuppens
    • 3
  • Sokratis Katsikas
    • 4
  1. 1.Telecom Bretagne Cesson SevigneFrance
  2. 2.University of Piraeus PiraeusGreece
  3. 3.Telecom BretagneCesson Sevigne France
  4. 4.Norwegian University of Science & TechnologyGjøvikNorway

Bibliographic information

Industry Sectors
IT & Software