BibTeX records: David I. Urbina

download as .bib file

@inproceedings{DBLP:conf/acns/GiraldoUCT19,
  author    = {Jairo Giraldo and
               David I. Urbina and
               Alvaro A. C{\'{a}}rdenas and
               Nils Ole Tippenhauer},
  editor    = {Robert H. Deng and
               Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
               Mart{\'{\i}}n Ochoa and
               Moti Yung},
  title     = {Hide and Seek: An Architecture for Improving Attack-Visibility in
               Industrial Control Systems},
  booktitle = {Applied Cryptography and Network Security - 17th International Conference,
               {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11464},
  pages     = {175--195},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-21568-2\_9},
  doi       = {10.1007/978-3-030-21568-2\_9},
  timestamp = {Wed, 29 May 2019 12:25:55 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/GiraldoUCT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/GiraldoUCVFRTSC18,
  author    = {Jairo Giraldo and
               David I. Urbina and
               Alvaro Cardenas and
               Junia Valente and
               Mustafa Amir Faisal and
               Justin Ruths and
               Nils Ole Tippenhauer and
               Henrik Sandberg and
               Richard Candell},
  title     = {A Survey of Physics-Based Attack Detection in Cyber-Physical Systems},
  journal   = {{ACM} Comput. Surv.},
  volume    = {51},
  number    = {4},
  pages     = {76:1--76:36},
  year      = {2018},
  url       = {https://doi.org/10.1145/3203245},
  doi       = {10.1145/3203245},
  timestamp = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/csur/GiraldoUCVFRTSC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UrbinaGCTVFRCS16,
  author    = {David I. Urbina and
               Jairo Alonso Giraldo and
               Alvaro A. C{\'{a}}rdenas and
               Nils Ole Tippenhauer and
               Junia Valente and
               Mustafa Amir Faisal and
               Justin Ruths and
               Richard Candell and
               Henrik Sandberg},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Limiting the Impact of Stealthy Attacks on Industrial Control Systems},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1092--1105},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2976749.2978388},
  doi       = {10.1145/2976749.2978388},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/UrbinaGCTVFRCS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/UrbinaGTC16,
  author    = {David I. Urbina and
               Jairo Alonso Giraldo and
               Nils Ole Tippenhauer and
               Alvaro A. C{\'{a}}rdenas},
  editor    = {Aditya Mathur and
               Abhik Roychoudhury},
  title     = {Attacking Fieldbus Communications in {ICS:} Applications to the SWaT
               Testbed},
  booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
               2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series    = {Cryptology and Information Security Series},
  volume    = {14},
  pages     = {75--89},
  publisher = {{IOS} Press},
  year      = {2016},
  url       = {https://doi.org/10.3233/978-1-61499-617-0-75},
  doi       = {10.3233/978-1-61499-617-0-75},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/sgcrc/UrbinaGTC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UrbinaGCL14,
  author    = {David I. Urbina and
               Yufei Gu and
               Juan Caballero and
               Zhiqiang Lin},
  editor    = {Miroslaw Kutylowski and
               Jaideep Vaidya},
  title     = {SigPath: {A} Memory Graph Based Approach for Program Data Introspection
               and Modification},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8713},
  pages     = {237--256},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11212-1\_14},
  doi       = {10.1007/978-3-319-11212-1\_14},
  timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/esorics/UrbinaGCL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/BerthierUCGHJMHB14,
  author    = {Robin Berthier and
               David I. Urbina and
               Alvaro A. C{\'{a}}rdenas and
               Michael Guerrero and
               Ulrich Herberg and
               Jorjeta G. Jetcheva and
               Daisuke Mashima and
               Jun Ho Huh and
               Rakesh B. Bobba},
  title     = {On the practicality of detecting anomalies with encrypted traffic
               in {AMI}},
  booktitle = {2014 {IEEE} International Conference on Smart Grid Communications,
               SmartGridComm 2014, Venice, Italy, November 3-6, 2014},
  pages     = {890--895},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://doi.org/10.1109/SmartGridComm.2014.7007761},
  doi       = {10.1109/SmartGridComm.2014.7007761},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/smartgridcomm/BerthierUCGHJMHB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics