Search dblp for Publications

export results for "stream:conf/icss2:"

 download as .bib file

@inproceedings{DBLP:conf/icss2/AoudiHOA19,
  author       = {Wissam Aoudi and
                  Albin Hellqvist and
                  Albert Overland and
                  Magnus Almgren},
  title        = {A Probe into Process-Level Attack Detection in Industrial Environments
                  from a Side-Channel Perspective},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372320},
  doi          = {10.1145/3372318.3372320},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/AoudiHOA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/ChekoleG19,
  author       = {Eyasu Getahun Chekole and
                  Huaqun Guo},
  title        = {{ICS-SEA:} Formally Modeling the Conflicting Design Constraints in
                  {ICS}},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {60--69},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372325},
  doi          = {10.1145/3372318.3372325},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/ChekoleG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/IrveneSFB19,
  author       = {Celine Irvene and
                  Tohid Shekari and
                  David Formby and
                  Raheem Beyah},
  title        = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security
                  using Power Substation Traffic},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {48--59},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372324},
  doi          = {10.1145/3372318.3372324},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/NguyenAI19,
  author       = {Thuy D. Nguyen and
                  Steve C. Austin and
                  Cynthia E. Irvine},
  title        = {A Strategy for Security Testing Industrial Firewalls},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372323},
  doi          = {10.1145/3372318.3372323},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/NguyenAI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/TouhiduzzamanHL19,
  author       = {Md Touhiduzzaman and
                  Adam Hahn and
                  Saeed Lotfifard},
  title        = {An Distributed Cyberattack Diagnosis Scheme for Malicious Protection
                  Operation based on {IEC} 61850},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372326},
  doi          = {10.1145/3372318.3372326},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/TouhiduzzamanHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/VenugopalAR19,
  author       = {Varsha Venugopal and
                  Jim Alves{-}Foss and
                  Sandeep Gogineni Ravindrababu},
  title        = {Use of an {SDN} Switch in Support of {NIST} {ICS} Security Recommendations
                  and Least Privilege Networking},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372321},
  doi          = {10.1145/3372318.3372321},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/VenugopalAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Zamiri-GourabiR19,
  author       = {Mohammad{-}Reza Zamiri{-}Gourabi and
                  Ali Razmjoo{-}Qalaei and
                  Babak Amin Azad},
  title        = {Gas what?: {I} can see your GasPots. Studying the fingerprintability
                  of {ICS} honeypots in the wild},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {30--37},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372322},
  doi          = {10.1145/3372318.3372322},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/Zamiri-GourabiR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2019,
  title        = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318},
  doi          = {10.1145/3372318},
  isbn         = {978-1-4503-7719-5},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/AlmgrenAGKL18,
  author       = {Magnus Almgren and
                  Wissam Aoudi and
                  Robert Gustafsson and
                  Robin Krahl and
                  Andreas Lindh{\'{e}}},
  editor       = {Sajal Bhatia and
                  Alvaro A. C{\'{a}}rdenas and
                  Ernest Foo and
                  Marina Krotofil and
                  Sye Loong Keoh and
                  Thomas Locher and
                  Daisuke Mashima and
                  Tommy H. Morris and
                  John Mulder and
                  Stephen McLaughlin and
                  Igor Nai Fovino and
                  Julian L. Rrushi and
                  Bradley L. Schatz and
                  Jared Smith and
                  Saman A. Zonouz and
                  Tim Zimmerman},
  title        = {The Nuts and Bolts of Deploying Process-Level {IDS} in Industrial
                  Control Systems},
  booktitle    = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
                  {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3295453.3295456},
  doi          = {10.1145/3295453.3295456},
  timestamp    = {Mon, 13 Jun 2022 18:49:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/AlmgrenAGKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/AwadBSLP18,
  author       = {Rima Asmar Awad and
                  Saeed Beztchi and
                  Jared M. Smith and
                  J. Bryan Lyles and
                  Stacy J. Prowell},
  editor       = {Sajal Bhatia and
                  Alvaro A. C{\'{a}}rdenas and
                  Ernest Foo and
                  Marina Krotofil and
                  Sye Loong Keoh and
                  Thomas Locher and
                  Daisuke Mashima and
                  Tommy H. Morris and
                  John Mulder and
                  Stephen McLaughlin and
                  Igor Nai Fovino and
                  Julian L. Rrushi and
                  Bradley L. Schatz and
                  Jared Smith and
                  Saman A. Zonouz and
                  Tim Zimmerman},
  title        = {Tools, Techniques, and Methodologies: {A} Survey of Digital Forensics
                  for {SCADA} Systems},
  booktitle    = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
                  {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3295453.3295454},
  doi          = {10.1145/3295453.3295454},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/AwadBSLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/FernandezJT18,
  author       = {Maribel Fern{\'{a}}ndez and
                  Jenjira Jaimunk and
                  Bhavani Thuraisingham},
  editor       = {Sajal Bhatia and
                  Alvaro A. C{\'{a}}rdenas and
                  Ernest Foo and
                  Marina Krotofil and
                  Sye Loong Keoh and
                  Thomas Locher and
                  Daisuke Mashima and
                  Tommy H. Morris and
                  John Mulder and
                  Stephen McLaughlin and
                  Igor Nai Fovino and
                  Julian L. Rrushi and
                  Bradley L. Schatz and
                  Jared Smith and
                  Saman A. Zonouz and
                  Tim Zimmerman},
  title        = {Graph-Based Data-Collection Policies for the Internet of Things},
  booktitle    = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
                  {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3295453.3295455},
  doi          = {10.1145/3295453.3295455},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/FernandezJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/HahnTA18,
  author       = {Adam Hahn and
                  Ali Tamimi and
                  Dave Anderson},
  editor       = {Sajal Bhatia and
                  Alvaro A. C{\'{a}}rdenas and
                  Ernest Foo and
                  Marina Krotofil and
                  Sye Loong Keoh and
                  Thomas Locher and
                  Daisuke Mashima and
                  Tommy H. Morris and
                  John Mulder and
                  Stephen McLaughlin and
                  Igor Nai Fovino and
                  Julian L. Rrushi and
                  Bradley L. Schatz and
                  Jared Smith and
                  Saman A. Zonouz and
                  Tim Zimmerman},
  title        = {Securing Your {ICS} Software with the AttackSurface Host Analyzer
                  {(AHA)}},
  booktitle    = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
                  {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages        = {33--39},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3295453.3295458},
  doi          = {10.1145/3295453.3295458},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/HahnTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Murillo-Piedrahita18,
  author       = {Andr{\'{e}}s Felipe Murillo{-}Piedrahita and
                  Luis Francisco C{\'{o}}mbita and
                  Andrea Calder{\'{o}}n Gonzalez and
                  Sandra Rueda and
                  Alvaro A. C{\'{a}}rdenas and
                  Nicanor Quijano},
  editor       = {Sajal Bhatia and
                  Alvaro A. C{\'{a}}rdenas and
                  Ernest Foo and
                  Marina Krotofil and
                  Sye Loong Keoh and
                  Thomas Locher and
                  Daisuke Mashima and
                  Tommy H. Morris and
                  John Mulder and
                  Stephen McLaughlin and
                  Igor Nai Fovino and
                  Julian L. Rrushi and
                  Bradley L. Schatz and
                  Jared Smith and
                  Saman A. Zonouz and
                  Tim Zimmerman},
  title        = {A Virtual Environment for Industrial Control Systems: {A} Nonlinear
                  Use-Case in Attack Detection, Identification, and Response},
  booktitle    = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
                  {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3295453.3295457},
  doi          = {10.1145/3295453.3295457},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/Murillo-Piedrahita18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2018,
  editor       = {Sajal Bhatia and
                  Alvaro A. C{\'{a}}rdenas and
                  Ernest Foo and
                  Marina Krotofil and
                  Sye Loong Keoh and
                  Thomas Locher and
                  Daisuke Mashima and
                  Tommy H. Morris and
                  John Mulder and
                  Stephen McLaughlin and
                  Igor Nai Fovino and
                  Julian L. Rrushi and
                  Bradley L. Schatz and
                  Jared Smith and
                  Saman A. Zonouz and
                  Tim Zimmerman},
  title        = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
                  {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3295453},
  isbn         = {978-1-4503-6220-7},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001MY17,
  author       = {Thiago Alves and
                  Thomas H. Morris and
                  Seong{-}Moo Yoo},
  title        = {Securing {SCADA} Applications Using OpenPLC With End-To-End Encryption},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174777},
  doi          = {10.1145/3174776.3174777},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icss2/0001MY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/ChiaKT17,
  author       = {Ming Hong Chia and
                  Sye Loong Keoh and
                  Zhaohui Tang},
  title        = {Secure Data Provenance in Home Energy Monitoring Networks},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174778},
  doi          = {10.1145/3174776.3174778},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/ChiaKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Rrushi17,
  author       = {Julian L. Rrushi},
  title        = {Timing Performance Profiling of Substation Control Code for {IED}
                  Malware Detection},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {15--23},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174779},
  doi          = {10.1145/3174776.3174779},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/Rrushi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/TacliadNG17,
  author       = {Francisco Tacliad and
                  Thuy D. Nguyen and
                  Mark A. Gondree},
  title        = {DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {24--31},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174780},
  doi          = {10.1145/3174776.3174780},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/TacliadNG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2017,
  title        = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776},
  doi          = {10.1145/3174776},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001DM16,
  author       = {Thiago Alves and
                  Rishabh Das and
                  Thomas H. Morris},
  title        = {Virtualization of Industrial Control System Testbeds for Cybersecurity},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {10--14},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018988},
  doi          = {10.1145/3018981.3018988},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icss2/0001DM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/AhmedRJSS16,
  author       = {Irfan Ahmed and
                  Vassil Roussev and
                  William E. Johnson and
                  Saranyan Senthivel and
                  Sneha Sudhakaran},
  title        = {A {SCADA} System Testbed for Cybersecurity and Forensic Research and
                  Pedagogy},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018984},
  doi          = {10.1145/3018981.3018984},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icss2/AhmedRJSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Amullen0KK16,
  author       = {Esther M. Amullen and
                  Hui Lin and
                  Zbigniew Kalbarczyk and
                  Lee H. Keel},
  title        = {Multi-agent System for Detecting False Data Injection Attacks Against
                  the Power Grid},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {38--44},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018987},
  doi          = {10.1145/3018981.3018987},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/Amullen0KK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/BratusCHHPKS16,
  author       = {Sergey Bratus and
                  J. Adam Crain and
                  Sven M. Hallberg and
                  Daniel P. Hirsch and
                  Meredith L. Patterson and
                  Maxwell Koo and
                  Sean W. Smith},
  title        = {Implementing a vertically hardened {DNP3} control stack for power
                  applications},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {45--53},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018985},
  doi          = {10.1145/3018981.3018985},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/BratusCHHPKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/FernandezKT16,
  author       = {Maribel Fern{\'{a}}ndez and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham},
  title        = {A Framework for Secure Data Collection and Management for Internet
                  of Things},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {30--37},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018982},
  doi          = {10.1145/3018981.3018982},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/FernandezKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/MellSH16,
  author       = {Peter Mell and
                  James M. Shook and
                  Richard E. Harang},
  title        = {Measuring and Improving the Effectiveness of Defense-in-Depth Postures},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018986},
  doi          = {10.1145/3018981.3018986},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/MellSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/RajabiB16,
  author       = {Arezoo Rajabi and
                  Rakesh B. Bobba},
  title        = {A Resilient Algorithm for Power System Mode Estimation using Synchrophasors},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {23--29},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018983},
  doi          = {10.1145/3018981.3018983},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/RajabiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2016,
  title        = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981},
  doi          = {10.1145/3018981},
  isbn         = {978-1-4503-4788-4},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}