Search dblp for Publications

export results for "toc:db/conf/icss2/icss2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icss2/AoudiHOA19,
  author    = {Wissam Aoudi and
               Albin Hellqvist and
               Albert Overland and
               Magnus Almgren},
  title     = {A Probe into Process-Level Attack Detection in Industrial Environments
               from a Side-Channel Perspective},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {1--10},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372320},
  doi       = {10.1145/3372318.3372320},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/AoudiHOA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/ChekoleG19,
  author    = {Eyasu Getahun Chekole and
               Huaqun Guo},
  title     = {{ICS-SEA:} Formally Modeling the Conflicting Design Constraints in
               {ICS}},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {60--69},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372325},
  doi       = {10.1145/3372318.3372325},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/ChekoleG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/IrveneSFB19,
  author    = {Celine Irvene and
               Tohid Shekari and
               David Formby and
               Raheem Beyah},
  title     = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security
               using Power Substation Traffic},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {48--59},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372324},
  doi       = {10.1145/3372318.3372324},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/NguyenAI19,
  author    = {Thuy D. Nguyen and
               Steve C. Austin and
               Cynthia E. Irvine},
  title     = {A Strategy for Security Testing Industrial Firewalls},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {38--47},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372323},
  doi       = {10.1145/3372318.3372323},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/NguyenAI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/TouhiduzzamanHL19,
  author    = {Md Touhiduzzaman and
               Adam Hahn and
               Saeed Lotfifard},
  title     = {An Distributed Cyberattack Diagnosis Scheme for Malicious Protection
               Operation based on {IEC} 61850},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {21--29},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372326},
  doi       = {10.1145/3372318.3372326},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/TouhiduzzamanHL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/VenugopalAR19,
  author    = {Varsha Venugopal and
               Jim Alves{-}Foss and
               Sandeep Gogineni Ravindrababu},
  title     = {Use of an {SDN} Switch in Support of {NIST} {ICS} Security Recommendations
               and Least Privilege Networking},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {11--20},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372321},
  doi       = {10.1145/3372318.3372321},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/VenugopalAR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Zamiri-GourabiR19,
  author    = {Mohammad{-}Reza Zamiri{-}Gourabi and
               Ali Razmjoo{-}Qalaei and
               Babak Amin Azad},
  title     = {Gas what?: {I} can see your GasPots. Studying the fingerprintability
               of {ICS} honeypots in the wild},
  booktitle = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages     = {30--37},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318.3372322},
  doi       = {10.1145/3372318.3372322},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/Zamiri-GourabiR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2019,
  title     = {Proceedings of the Fifth Annual Industrial Control System Security
               Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3372318},
  doi       = {10.1145/3372318},
  isbn      = {978-1-4503-7719-5},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icss2/2019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics