Search dblp for Publications

export results for "stream:streams/conf/icss2:"

 download as .bib file

@inproceedings{DBLP:conf/icss2/AoudiHOA19,
  author    = {Wissam Aoudi and
               Albin Hellqvist and
               Albert Overland and
               Magnus Almgren},
  title     = {A Probe into Process-Level Attack Detection in Industrial Environments
               from a Side-Channel Perspective},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {1--10},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372320},
  doi       = {10.1145/3372318.3372320},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/AoudiHOA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/ChekoleG19,
  author    = {Eyasu Getahun Chekole and
               Huaqun Guo},
  title     = {{ICS-SEA:} Formally Modeling the Conflicting Design Constraints in
               {ICS}},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {60--69},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372325},
  doi       = {10.1145/3372318.3372325},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/ChekoleG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/IrveneSFB19,
  author    = {Celine Irvene and
               Tohid Shekari and
               David Formby and
               Raheem Beyah},
  title     = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security
               using Power Substation Traffic},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {48--59},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372324},
  doi       = {10.1145/3372318.3372324},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/NguyenAI19,
  author    = {Thuy D. Nguyen and
               Steve C. Austin and
               Cynthia E. Irvine},
  title     = {A Strategy for Security Testing Industrial Firewalls},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {38--47},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372323},
  doi       = {10.1145/3372318.3372323},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/NguyenAI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/TouhiduzzamanHL19,
  author    = {Md Touhiduzzaman and
               Adam Hahn and
               Saeed Lotfifard},
  title     = {An Distributed Cyberattack Diagnosis Scheme for Malicious Protection
               Operation based on {IEC} 61850},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {21--29},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372326},
  doi       = {10.1145/3372318.3372326},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/TouhiduzzamanHL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/VenugopalAR19,
  author    = {Varsha Venugopal and
               Jim Alves{-}Foss and
               Sandeep Gogineni Ravindrababu},
  title     = {Use of an {SDN} Switch in Support of {NIST} {ICS} Security Recommendations
               and Least Privilege Networking},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {11--20},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372321},
  doi       = {10.1145/3372318.3372321},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/VenugopalAR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Zamiri-GourabiR19,
  author    = {Mohammad{-}Reza Zamiri{-}Gourabi and
               Ali Razmjoo{-}Qalaei and
               Babak Amin Azad},
  title     = {Gas what?: {I} can see your GasPots. Studying the fingerprintability
               of {ICS} honeypots in the wild},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {30--37},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372322},
  doi       = {10.1145/3372318.3372322},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/Zamiri-GourabiR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2019,
  title     = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318},
  doi       = {10.1145/3372318},
  isbn      = {978-1-4503-7719-5},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/2019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/AlmgrenAGKL18,
  author    = {Magnus Almgren and
               Wissam Aoudi and
               Robert Gustafsson and
               Robin Krahl and
               Andreas Lindh{\'{e}}},
  editor    = {Sajal Bhatia and
               Alvaro A. C{\'{a}}rdenas and
               Ernest Foo and
               Marina Krotofil and
               Sye Loong Keoh and
               Thomas Locher and
               Daisuke Mashima and
               Tommy Morris and
               John Mulder and
               Stephen McLaughlin and
               Igor Nai Fovino and
               Julian L. Rrushi and
               Bradley Schatz and
               Jared Smith and
               Saman A. Zonouz and
               Tim Zimmerman},
  title     = {The Nuts and Bolts of Deploying Process-Level {IDS} in Industrial
               Control Systems},
  booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
               {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages     = {17--24},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3295453.3295456},
  doi       = {10.1145/3295453.3295456},
  timestamp = {Thu, 17 Dec 2020 10:31:41 +0100},
  biburl    = {https://dblp.org/rec/conf/icss2/AlmgrenAGKL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/AwadBSLP18,
  author    = {Rima Asmar Awad and
               Saeed Beztchi and
               Jared M. Smith and
               Bryan Lyles and
               Stacy Prowell},
  editor    = {Sajal Bhatia and
               Alvaro A. C{\'{a}}rdenas and
               Ernest Foo and
               Marina Krotofil and
               Sye Loong Keoh and
               Thomas Locher and
               Daisuke Mashima and
               Tommy Morris and
               John Mulder and
               Stephen McLaughlin and
               Igor Nai Fovino and
               Julian L. Rrushi and
               Bradley Schatz and
               Jared Smith and
               Saman A. Zonouz and
               Tim Zimmerman},
  title     = {Tools, Techniques, and Methodologies: {A} Survey of Digital Forensics
               for {SCADA} Systems},
  booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
               {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages     = {1--8},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3295453.3295454},
  doi       = {10.1145/3295453.3295454},
  timestamp = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/AwadBSLP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/FernandezJT18,
  author    = {Maribel Fern{\'{a}}ndez and
               Jenjira Jaimunk and
               Bhavani M. Thuraisingham},
  editor    = {Sajal Bhatia and
               Alvaro A. C{\'{a}}rdenas and
               Ernest Foo and
               Marina Krotofil and
               Sye Loong Keoh and
               Thomas Locher and
               Daisuke Mashima and
               Tommy Morris and
               John Mulder and
               Stephen McLaughlin and
               Igor Nai Fovino and
               Julian L. Rrushi and
               Bradley Schatz and
               Jared Smith and
               Saman A. Zonouz and
               Tim Zimmerman},
  title     = {Graph-Based Data-Collection Policies for the Internet of Things},
  booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
               {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages     = {9--16},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3295453.3295455},
  doi       = {10.1145/3295453.3295455},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/FernandezJT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/HahnTA18,
  author    = {Adam Hahn and
               Ali Tamimi and
               Dave Anderson},
  editor    = {Sajal Bhatia and
               Alvaro A. C{\'{a}}rdenas and
               Ernest Foo and
               Marina Krotofil and
               Sye Loong Keoh and
               Thomas Locher and
               Daisuke Mashima and
               Tommy Morris and
               John Mulder and
               Stephen McLaughlin and
               Igor Nai Fovino and
               Julian L. Rrushi and
               Bradley Schatz and
               Jared Smith and
               Saman A. Zonouz and
               Tim Zimmerman},
  title     = {Securing Your {ICS} Software with the AttackSurface Host Analyzer
               {(AHA)}},
  booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
               {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages     = {33--39},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3295453.3295458},
  doi       = {10.1145/3295453.3295458},
  timestamp = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/HahnTA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Murillo-Piedrahita18,
  author    = {Andr{\'{e}}s Felipe Murillo{-}Piedrahita and
               Luis Francisco C{\'{o}}mbita and
               Andrea Calder{\'{o}}n Gonzalez and
               Sandra Rueda and
               Alvaro A. C{\'{a}}rdenas and
               Nicanor Quijano},
  editor    = {Sajal Bhatia and
               Alvaro A. C{\'{a}}rdenas and
               Ernest Foo and
               Marina Krotofil and
               Sye Loong Keoh and
               Thomas Locher and
               Daisuke Mashima and
               Tommy Morris and
               John Mulder and
               Stephen McLaughlin and
               Igor Nai Fovino and
               Julian L. Rrushi and
               Bradley Schatz and
               Jared Smith and
               Saman A. Zonouz and
               Tim Zimmerman},
  title     = {A Virtual Environment for Industrial Control Systems: {A} Nonlinear
               Use-Case in Attack Detection, Identification, and Response},
  booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
               {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages     = {25--32},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3295453.3295457},
  doi       = {10.1145/3295453.3295457},
  timestamp = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/Murillo-Piedrahita18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2018,
  editor    = {Sajal Bhatia and
               Alvaro A. C{\'{a}}rdenas and
               Ernest Foo and
               Marina Krotofil and
               Sye Loong Keoh and
               Thomas Locher and
               Daisuke Mashima and
               Tommy Morris and
               John Mulder and
               Stephen McLaughlin and
               Igor Nai Fovino and
               Julian L. Rrushi and
               Bradley Schatz and
               Jared Smith and
               Saman A. Zonouz and
               Tim Zimmerman},
  title     = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
               {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://dl.acm.org/citation.cfm?id=3295453},
  isbn      = {978-1-4503-6220-7},
  timestamp = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/icss2/2018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001MY17,
  author    = {Thiago Alves and
               Thomas Morris and
               Seong{-}Moo Yoo},
  title     = {Securing {SCADA} Applications Using OpenPLC With End-To-End Encryption},
  booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
               {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages     = {1--6},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3174776.3174777},
  doi       = {10.1145/3174776.3174777},
  timestamp = {Wed, 17 Jun 2020 08:28:52 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/0001MY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/ChiaKT17,
  author    = {Ming Hong Chia and
               Sye Loong Keoh and
               Zhaohui Tang},
  title     = {Secure Data Provenance in Home Energy Monitoring Networks},
  booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
               {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages     = {7--14},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3174776.3174778},
  doi       = {10.1145/3174776.3174778},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/ChiaKT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Rrushi17,
  author    = {Julian L. Rrushi},
  title     = {Timing Performance Profiling of Substation Control Code for {IED}
               Malware Detection},
  booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
               {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages     = {15--23},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3174776.3174779},
  doi       = {10.1145/3174776.3174779},
  timestamp = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/Rrushi17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/TacliadNG17,
  author    = {Francisco Tacliad and
               Thuy D. Nguyen and
               Mark A. Gondree},
  title     = {DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing},
  booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
               {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages     = {24--31},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3174776.3174780},
  doi       = {10.1145/3174776.3174780},
  timestamp = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/TacliadNG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2017,
  title     = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
               {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3174776},
  doi       = {10.1145/3174776},
  timestamp = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/2017.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001DM16,
  author    = {Thiago Alves and
               Rishabh Das and
               Thomas Morris},
  title     = {Virtualization of Industrial Control System Testbeds for Cybersecurity},
  booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages     = {10--14},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981.3018988},
  doi       = {10.1145/3018981.3018988},
  timestamp = {Fri, 24 Apr 2020 14:03:29 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/0001DM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/AhmedRJSS16,
  author    = {Irfan Ahmed and
               Vassil Roussev and
               William E. Johnson and
               Saranyan Senthivel and
               Sneha Sudhakaran},
  title     = {A {SCADA} System Testbed for Cybersecurity and Forensic Research and
               Pedagogy},
  booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages     = {1--9},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981.3018984},
  doi       = {10.1145/3018981.3018984},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/AhmedRJSS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Amullen0KK16,
  author    = {Esther M. Amullen and
               Hui Lin and
               Zbigniew Kalbarczyk and
               Lee H. Keel},
  title     = {Multi-agent System for Detecting False Data Injection Attacks Against
               the Power Grid},
  booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages     = {38--44},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981.3018987},
  doi       = {10.1145/3018981.3018987},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/Amullen0KK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/BratusCHHPKS16,
  author    = {Sergey Bratus and
               J. Adam Crain and
               Sven M. Hallberg and
               Daniel P. Hirsch and
               Meredith L. Patterson and
               Maxwell Koo and
               Sean W. Smith},
  title     = {Implementing a vertically hardened {DNP3} control stack for power
               applications},
  booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages     = {45--53},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981.3018985},
  doi       = {10.1145/3018981.3018985},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/BratusCHHPKS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/FernandezKT16,
  author    = {Maribel Fern{\'{a}}ndez and
               Murat Kantarcioglu and
               Bhavani M. Thuraisingham},
  title     = {A Framework for Secure Data Collection and Management for Internet
               of Things},
  booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages     = {30--37},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981.3018982},
  doi       = {10.1145/3018981.3018982},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/FernandezKT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/MellSH16,
  author    = {Peter Mell and
               James M. Shook and
               Richard E. Harang},
  title     = {Measuring and Improving the Effectiveness of Defense-in-Depth Postures},
  booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages     = {15--22},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981.3018986},
  doi       = {10.1145/3018981.3018986},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/MellSH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/RajabiB16,
  author    = {Arezoo Rajabi and
               Rakesh B. Bobba},
  title     = {A Resilient Algorithm for Power System Mode Estimation using Synchrophasors},
  booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages     = {23--29},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981.3018983},
  doi       = {10.1145/3018981.3018983},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/RajabiB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2016,
  title     = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
               {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/3018981},
  doi       = {10.1145/3018981},
  isbn      = {978-1-4503-4788-4},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/2016.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics