


default search action
3rd CPS-SPC@CCS 2017: Dallas, TX, USA
- Bhavani Thuraisingham, Rakesh B. Bobba, Awais Rashid:

Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5394-6
Intrusion and Anomaly Detection
- Chen Markman, Avishai Wool

, Alvaro A. Cárdenas:
A New Burst-DFA model for SCADA Anomaly Detection. 1-12 - Davide Fauri, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle, Stefano Tonetta:

From System Specification to Anomaly Detection (and back). 13-24 - Herson Esquivel-Vargas

, Marco Caselli, Andreas Peter:
Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. 25-36
Attacks
- Ioannis Agadakos

, Chien-Ying Chen, Matteo Campanelli
, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist
:
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things. 37-48 - Carmen Cheh

, Ken Keefe, Brett Feddersen, Binbin Chen
, William G. Temple, William H. Sanders:
Developing Models for Physical Attacks in Cyber-Physical Systems. 49-55 - Benjamin Green, Marina Krotofil, Ali Abbasi

:
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. 57-67
Threat Analysis and Risk Assessment
- Neetesh Saxena

, Victor Chukwuka, Leilei Xiong, Santiago Grijalva:
CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid. 69-79 - Amarjit Datta, Mohammad Ashiqur Rahman

:
Cyber Threat Analysis Framework for the Wind Energy Based Power System. 81-92 - Daniele Antonioli, Hamid Reza Ghaeini

, Sridhar Adepu, Martín Ochoa
, Nils Ole Tippenhauer
:
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. 93-102 - Benjamin Green, Daniel Prince

, Jerry S. Busby, David Hutchison
:
"How Long is a Piece of String": : Defining Key Phases andObserved Challenges within ICS Risk Assessment. 103-109
Analysis and Verification
- Junia Valente, Alvaro A. Cárdenas:

Remote Proofs of Video Freshness for Public Spaces. 111-122 - Minghao Ruan, Muaz Ahmad, Yongqiang Wang:

Secure and Privacy-Preserving Average Consensus. 123-129 - Muhammad Azmi Umer

, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection. 131-136

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














