


default search action
CPSIOTSEC@CCS 2020: Virtual Event, USA
- Michail Maniatakos, Yuqing Zhang:

CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8087-4 - Marina Krotofil:

Optimize Your Efforts: How to Tailor PhD Research to Real-World Needs - Industrial Perspective on Academic CPS/IoT Research. 1 - Luis E. Salazar

, Neil Ortiz Silva, Xi Qin, Alvaro A. Cárdenas
:
Towards a High-Fidelity Network Emulation of IEC 104 SCADA Systems. 3-12 - Luca Maria Castiglione

, Emil C. Lupu:
Hazard Driven Threat Modelling for Cyber Physical Systems. 13-24 - Federico Turrin

, Alessandro Erba
, Nils Ole Tippenhauer
, Mauro Conti
:
A Statistical Analysis Framework for ICS Process Datasets. 25-30 - Anand Agrawal, Marios Sazos, Ahmed Al-Durra, Michail Maniatakos

:
Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining. 31-36 - Giovanni Salzillo

, Massimiliano Rak:
A (in)Secure-by-Design IoT Protocol: the ESP Touch Protocol and a Case Study Analysis from the Real Market. 37-48 - Richard James Thomas

, Joseph Gardiner
, Tom Chothia, Emmanouil Samanis
, Joshua Perrett, Awais Rashid
:
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures. 49-60 - Heng Zhang, Amiya Kumar Maji, Saurabh Bagchi:

Privacy in the Mobile World: An Analysis of Bluetooth Scan Traces. 61-65 - Joseph Gardiner

, Awais Rashid:
DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs. 67 - Juan Ospina

, Ioannis Zografopoulos
, Xiaorui Liu, Charalambos Konstantinou
:
DEMO: Trustworthy Cyberphysical Energy Systems: Time-Delay Attacks in a Real-Time Co-Simulation Environment. 69 - Pooria Madani

, Natalija Vlajic, Shadi Sadeghpour
:
MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach. 71-80 - Sunandan Adhikary, Ipsita Koley

, Saurav Kumar Ghosh, Sumana Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions. 81-86 - Batyr Charyyev, Mehmet Hadi Gunes:

Voice Command Fingerprinting with Locality Sensitive Hashes. 87-92

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














