![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
CPSIOTSEC@CCS 2023: Copenhagen, Denmark
- Magnus Almgren, Earlence Fernandes:
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, Copenhagen, Denmark, 26 November 2023. ACM 2023 - Yung-Tai Cheng
, Shin-Ming Cheng
:
Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI. 1-9 - Alyah Alfageh
, Sridhar Adepu
, Charalambos Konstantinou
:
Water Risk-Proofed: Risk Assessment in Water Desalination. 11-23 - Niccolò Marastoni
, Mariano Ceccato
:
Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges. 25-36 - Islam Obaidat
, Zachary Palko
, Meera Sridhar
:
From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulations Through Full System Emulation. 37 - Yazhou Tu
, Sara Rampazzi
, Xiali Hei
:
Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side Channels. 39-51 - Alexandre Armengol-Urpi
, Reid Kovacs
, Sanjay E. Sarma
:
Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface. 53-66 - Samuel Barnes-Thornton
, Joseph Gardiner
, Awais Rashid
:
The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming. 67-73 - Zetong Zhao
, Shreyas Srinivasa
, Emmanouil Vasilomanolakis
:
SweetCam: an IP Camera Honeypot. 75-81 - Hadjer Benkraouda
, Anand Agrawal
, Dimitrios Tychalas
, Marios Sazos
, Michail Maniatakos
:
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications. 83-89 - Ashley Andrews
, George Oikonomou
, Simon Armour
, Paul Thomas
, Thomas Cattermole
:
Granular IoT Device Identification Using TF-IDF and Cosine Similarity. 91-99 - Xin Yang
, Omid Ardakanian
:
Privacy through Diffusion: A White-listing Approach to Sensor Data Anonymization. 101-107
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.