![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
3rd CPS-SPC@CCS 2017: Dallas, TX, USA
- Bhavani Thuraisingham, Rakesh B. Bobba, Awais Rashid:
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5394-6
Intrusion and Anomaly Detection
- Chen Markman, Avishai Wool
, Alvaro A. Cárdenas:
A New Burst-DFA model for SCADA Anomaly Detection. 1-12 - Davide Fauri, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle, Stefano Tonetta:
From System Specification to Anomaly Detection (and back). 13-24 - Herson Esquivel-Vargas
, Marco Caselli, Andreas Peter:
Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. 25-36
Attacks
- Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli
, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist
:
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things. 37-48 - Carmen Cheh
, Ken Keefe, Brett Feddersen, Binbin Chen
, William G. Temple, William H. Sanders:
Developing Models for Physical Attacks in Cyber-Physical Systems. 49-55 - Benjamin Green, Marina Krotofil, Ali Abbasi
:
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. 57-67
Threat Analysis and Risk Assessment
- Neetesh Saxena
, Victor Chukwuka, Leilei Xiong, Santiago Grijalva:
CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid. 69-79 - Amarjit Datta, Mohammad Ashiqur Rahman
:
Cyber Threat Analysis Framework for the Wind Energy Based Power System. 81-92 - Daniele Antonioli, Hamid Reza Ghaeini
, Sridhar Adepu, Martín Ochoa
, Nils Ole Tippenhauer
:
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. 93-102 - Benjamin Green, Daniel Prince
, Jerry S. Busby, David Hutchison
:
"How Long is a Piece of String": : Defining Key Phases andObserved Challenges within ICS Risk Assessment. 103-109
Analysis and Verification
- Junia Valente, Alvaro A. Cárdenas:
Remote Proofs of Video Freshness for Public Spaces. 111-122 - Minghao Ruan, Muaz Ahmad, Yongqiang Wang:
Secure and Privacy-Preserving Average Consensus. 123-129 - Muhammad Azmi Umer
, Aditya Mathur, Khurum Nazir Junejo, Sridhar Adepu:
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection. 131-136
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.