<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xenofon Kousoukos</style></author><author><style face="normal" font="default" size="100%">Neema, Himanshu</style></author><author><style face="normal" font="default" size="100%">Goncalo Martins</style></author><author><style face="normal" font="default" size="100%">Sajal Bhatia</style></author><author><style face="normal" font="default" size="100%">Sztipanovits Janos</style></author><author><style face="normal" font="default" size="100%">Keith Stouffer</style></author><author><style face="normal" font="default" size="100%">CheeYee Tang</style></author><author><style face="normal" font="default" size="100%">Richard Candell</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Performance Evaluation of Secure Industrial Control System Design: A Railway Control System Case Study</style></title><secondary-title><style face="normal" font="default" size="100%">4th International Symposium on Resilient Cyber Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">08/2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Chicago, IL</style></pub-location><abstract><style face="normal" font="default" size="100%">Industrial control systems (ICS) are composed of sensors, actuators, control processing units, and communication devices all interconnected to provide monitoring and control capabilities. Due to the integral role of the networking infrastructure, such systems are vulnerable to cyber attacks. In-depth consideration of security and resilience and their effects to system performance are very important. This paper focuses on railway control systems (RCS), an important and potentially vulnerable class of ICS, and presents a simulation integration platform that enables (1) Modeling and simulation including realistic models of cyber and physical components and their interactions, as well as operational scenarios that can be used or evaluations of cybersecurity risks and mitigation measures and (2) Evaluation of performance impact and security assessment of mitigation mechanisms focusing on authentication mechanisms and firewalls. The approach is demonstrated using simulation results from a realistic RCS case study.</style></abstract></record></records></xml>