1,420
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A Blueprint for a Pan-European Cyber Incident Analysis System

      Published
      proceedings-article
      , , , , , , , , , , , , ,
      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)
      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
      17 - 18 September 2015
      collaborative incident analysis, pan-European coordination, situational awareness
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            : 84-88
            Affiliations
            [0001]AIT Austrian Institute of Technology
            [0002]Airbus Defense and Space
            [0003]ifak Institut fuer Automation

            und Kommunikation e.V. Magdeburg
            [0004]Fraunhofer AISEC, Germany
            [0005]Espion Limited, Ireland
            [0006]VTT, Finland
            Article
            10.14236/ewic/ICS2015.9
            f7dab881-033f-4608-b40e-ed4faea59a60
            © Settanni et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2015.9
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            pan-European coordination,collaborative incident analysis,situational awareness

            References

            1. ENISA 2010 A step-by-step approach on how to set up a CSIRT Heraklion, Greece European Union Agency for Network and Information Security, Tech. Rep

            2. ENISA 2013 Detect, share, protect Heraklion, Greece EU Agency for Network and Information Security, Tech. Rep

            3. European Commission 2013 Commission proposal for a directive concerning measures to ensure a high common level of network and information security across the union

            4. 2014 A structural design for a pan-European early warning system for critical infrastructures In Elektrotechnik und Informationstechnik Berlin, Germany Springer

            5. NIST 2014 Framework for improving critical infrastructure cybersecurity (2014-02-12)

            6. 2011 Advanced persistent threats and how to monitor and deter them Netw. Security 2011 8 16 19

            7. White House 2013 Executive order (eo13636): Improving critical infrastructure cybersecurity

            Comments

            Comment on this article