callback( { "result":{ "query":":facetid:toc:\"db/conf/icss2/icss2019.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.65" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"0" }, "hits":{ "@total":"8", "@computed":"8", "@sent":"8", "@first":"0", "hit":[{ "@score":"1", "@id":"2209890", "info":{"authors":{"author":[{"@pid":"227/9056","text":"Wissam Aoudi"},{"@pid":"263/5455","text":"Albin Hellqvist"},{"@pid":"263/5341","text":"Albert Overland"},{"@pid":"55/3115","text":"Magnus Almgren"}]},"title":"A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective.","venue":"ICSS","pages":"1-10","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icss2/AoudiHOA19","doi":"10.1145/3372318.3372320","ee":"https://doi.org/10.1145/3372318.3372320","url":"https://dblp.org/rec/conf/icss2/AoudiHOA19"}, "url":"URL#2209890" }, { "@score":"1", "@id":"2209891", "info":{"authors":{"author":[{"@pid":"147/2908","text":"Eyasu Getahun Chekole"},{"@pid":"57/34","text":"Huaqun Guo"}]},"title":"ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS.","venue":"ICSS","pages":"60-69","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icss2/ChekoleG19","doi":"10.1145/3372318.3372325","ee":"https://doi.org/10.1145/3372318.3372325","url":"https://dblp.org/rec/conf/icss2/ChekoleG19"}, "url":"URL#2209891" }, { "@score":"1", "@id":"2209892", "info":{"authors":{"author":[{"@pid":"211/9574","text":"Celine Irvene"},{"@pid":"187/9868","text":"Tohid Shekari"},{"@pid":"151/4119","text":"David Formby"},{"@pid":"12/6354","text":"Raheem Beyah"}]},"title":"If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic.","venue":"ICSS","pages":"48-59","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icss2/IrveneSFB19","doi":"10.1145/3372318.3372324","ee":"https://doi.org/10.1145/3372318.3372324","url":"https://dblp.org/rec/conf/icss2/IrveneSFB19"}, "url":"URL#2209892" }, { "@score":"1", "@id":"2209893", "info":{"authors":{"author":[{"@pid":"89/4864","text":"Thuy D. Nguyen"},{"@pid":"263/5258","text":"Steve C. Austin"},{"@pid":"31/5391","text":"Cynthia E. Irvine"}]},"title":"A Strategy for Security Testing Industrial Firewalls.","venue":"ICSS","pages":"38-47","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icss2/NguyenAI19","doi":"10.1145/3372318.3372323","ee":"https://doi.org/10.1145/3372318.3372323","url":"https://dblp.org/rec/conf/icss2/NguyenAI19"}, "url":"URL#2209893" }, { "@score":"1", "@id":"2209894", "info":{"authors":{"author":[{"@pid":"215/3350","text":"Md Touhiduzzaman"},{"@pid":"44/10653","text":"Adam Hahn"},{"@pid":"179/0069","text":"Saeed Lotfifard"}]},"title":"An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on IEC 61850.","venue":"ICSS","pages":"21-29","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icss2/TouhiduzzamanHL19","doi":"10.1145/3372318.3372326","ee":"https://doi.org/10.1145/3372318.3372326","url":"https://dblp.org/rec/conf/icss2/TouhiduzzamanHL19"}, "url":"URL#2209894" }, { "@score":"1", "@id":"2209895", "info":{"authors":{"author":[{"@pid":"263/5188","text":"Varsha Venugopal"},{"@pid":"15/2648","text":"Jim Alves-Foss"},{"@pid":"263/5151","text":"Sandeep Gogineni Ravindrababu"}]},"title":"Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege Networking.","venue":"ICSS","pages":"11-20","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icss2/VenugopalAR19","doi":"10.1145/3372318.3372321","ee":"https://doi.org/10.1145/3372318.3372321","url":"https://dblp.org/rec/conf/icss2/VenugopalAR19"}, "url":"URL#2209895" }, { "@score":"1", "@id":"2209896", "info":{"authors":{"author":[{"@pid":"252/4052","text":"Mohammad-Reza Zamiri-Gourabi"},{"@pid":"252/4079","text":"Ali Razmjoo-Qalaei"},{"@pid":"248/1647","text":"Babak Amin Azad"}]},"title":"Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild.","venue":"ICSS","pages":"30-37","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/icss2/Zamiri-GourabiR19","doi":"10.1145/3372318.3372322","ee":"https://doi.org/10.1145/3372318.3372322","url":"https://dblp.org/rec/conf/icss2/Zamiri-GourabiR19"}, "url":"URL#2209896" }, { "@score":"1", "@id":"2297892", "info":{"title":"Proceedings of the Fifth Annual Industrial Control System Security Workshop, ICSS 2019, San Juan, PR, USA, December 10, 2019","venue":"ICSS","publisher":"ACM","year":"2019","type":"Editorship","key":"conf/icss2/2019","doi":"10.1145/3372318","ee":"https://doi.org/10.1145/3372318","url":"https://dblp.org/rec/conf/icss2/2019"}, "url":"URL#2297892" } ] } } } )