default search action
Search dblp for Publications
export results for "stream:conf/icss2:"
@inproceedings{DBLP:conf/icss2/AoudiHOA19, author = {Wissam Aoudi and Albin Hellqvist and Albert Overland and Magnus Almgren}, title = {A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {1--10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372320}, doi = {10.1145/3372318.3372320}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/AoudiHOA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/ChekoleG19, author = {Eyasu Getahun Chekole and Huaqun Guo}, title = {{ICS-SEA:} Formally Modeling the Conflicting Design Constraints in {ICS}}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {60--69}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372325}, doi = {10.1145/3372318.3372325}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/ChekoleG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/IrveneSFB19, author = {Celine Irvene and Tohid Shekari and David Formby and Raheem Beyah}, title = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security using Power Substation Traffic}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {48--59}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372324}, doi = {10.1145/3372318.3372324}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/NguyenAI19, author = {Thuy D. Nguyen and Steve C. Austin and Cynthia E. Irvine}, title = {A Strategy for Security Testing Industrial Firewalls}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {38--47}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372323}, doi = {10.1145/3372318.3372323}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/NguyenAI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/TouhiduzzamanHL19, author = {Md Touhiduzzaman and Adam Hahn and Saeed Lotfifard}, title = {An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on {IEC} 61850}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {21--29}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372326}, doi = {10.1145/3372318.3372326}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/TouhiduzzamanHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/VenugopalAR19, author = {Varsha Venugopal and Jim Alves{-}Foss and Sandeep Gogineni Ravindrababu}, title = {Use of an {SDN} Switch in Support of {NIST} {ICS} Security Recommendations and Least Privilege Networking}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {11--20}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372321}, doi = {10.1145/3372318.3372321}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/VenugopalAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/Zamiri-GourabiR19, author = {Mohammad{-}Reza Zamiri{-}Gourabi and Ali Razmjoo{-}Qalaei and Babak Amin Azad}, title = {Gas what?: {I} can see your GasPots. Studying the fingerprintability of {ICS} honeypots in the wild}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {30--37}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372322}, doi = {10.1145/3372318.3372322}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/Zamiri-GourabiR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icss2/2019, title = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318}, doi = {10.1145/3372318}, isbn = {978-1-4503-7719-5}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/AlmgrenAGKL18, author = {Magnus Almgren and Wissam Aoudi and Robert Gustafsson and Robin Krahl and Andreas Lindh{\'{e}}}, editor = {Sajal Bhatia and Alvaro A. C{\'{a}}rdenas and Ernest Foo and Marina Krotofil and Sye Loong Keoh and Thomas Locher and Daisuke Mashima and Tommy H. Morris and John Mulder and Stephen McLaughlin and Igor Nai Fovino and Julian L. Rrushi and Bradley L. Schatz and Jared Smith and Saman A. Zonouz and Tim Zimmerman}, title = {The Nuts and Bolts of Deploying Process-Level {IDS} in Industrial Control Systems}, booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop, {ICSS} 2018, San Juan, PR, USA, December 4, 2018}, pages = {17--24}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3295453.3295456}, doi = {10.1145/3295453.3295456}, timestamp = {Mon, 13 Jun 2022 18:49:36 +0200}, biburl = {https://dblp.org/rec/conf/icss2/AlmgrenAGKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/AwadBSLP18, author = {Rima Asmar Awad and Saeed Beztchi and Jared M. Smith and J. Bryan Lyles and Stacy J. Prowell}, editor = {Sajal Bhatia and Alvaro A. C{\'{a}}rdenas and Ernest Foo and Marina Krotofil and Sye Loong Keoh and Thomas Locher and Daisuke Mashima and Tommy H. Morris and John Mulder and Stephen McLaughlin and Igor Nai Fovino and Julian L. Rrushi and Bradley L. Schatz and Jared Smith and Saman A. Zonouz and Tim Zimmerman}, title = {Tools, Techniques, and Methodologies: {A} Survey of Digital Forensics for {SCADA} Systems}, booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop, {ICSS} 2018, San Juan, PR, USA, December 4, 2018}, pages = {1--8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3295453.3295454}, doi = {10.1145/3295453.3295454}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/AwadBSLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/FernandezJT18, author = {Maribel Fern{\'{a}}ndez and Jenjira Jaimunk and Bhavani Thuraisingham}, editor = {Sajal Bhatia and Alvaro A. C{\'{a}}rdenas and Ernest Foo and Marina Krotofil and Sye Loong Keoh and Thomas Locher and Daisuke Mashima and Tommy H. Morris and John Mulder and Stephen McLaughlin and Igor Nai Fovino and Julian L. Rrushi and Bradley L. Schatz and Jared Smith and Saman A. Zonouz and Tim Zimmerman}, title = {Graph-Based Data-Collection Policies for the Internet of Things}, booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop, {ICSS} 2018, San Juan, PR, USA, December 4, 2018}, pages = {9--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3295453.3295455}, doi = {10.1145/3295453.3295455}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/FernandezJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/HahnTA18, author = {Adam Hahn and Ali Tamimi and Dave Anderson}, editor = {Sajal Bhatia and Alvaro A. C{\'{a}}rdenas and Ernest Foo and Marina Krotofil and Sye Loong Keoh and Thomas Locher and Daisuke Mashima and Tommy H. Morris and John Mulder and Stephen McLaughlin and Igor Nai Fovino and Julian L. Rrushi and Bradley L. Schatz and Jared Smith and Saman A. Zonouz and Tim Zimmerman}, title = {Securing Your {ICS} Software with the AttackSurface Host Analyzer {(AHA)}}, booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop, {ICSS} 2018, San Juan, PR, USA, December 4, 2018}, pages = {33--39}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3295453.3295458}, doi = {10.1145/3295453.3295458}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/HahnTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/Murillo-Piedrahita18, author = {Andr{\'{e}}s Felipe Murillo{-}Piedrahita and Luis Francisco C{\'{o}}mbita and Andrea Calder{\'{o}}n Gonzalez and Sandra Rueda and Alvaro A. C{\'{a}}rdenas and Nicanor Quijano}, editor = {Sajal Bhatia and Alvaro A. C{\'{a}}rdenas and Ernest Foo and Marina Krotofil and Sye Loong Keoh and Thomas Locher and Daisuke Mashima and Tommy H. Morris and John Mulder and Stephen McLaughlin and Igor Nai Fovino and Julian L. Rrushi and Bradley L. Schatz and Jared Smith and Saman A. Zonouz and Tim Zimmerman}, title = {A Virtual Environment for Industrial Control Systems: {A} Nonlinear Use-Case in Attack Detection, Identification, and Response}, booktitle = {Proceedings of the 4th Annual Industrial Control System Security Workshop, {ICSS} 2018, San Juan, PR, USA, December 4, 2018}, pages = {25--32}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3295453.3295457}, doi = {10.1145/3295453.3295457}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/Murillo-Piedrahita18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icss2/2018, editor = {Sajal Bhatia and Alvaro A. C{\'{a}}rdenas and Ernest Foo and Marina Krotofil and Sye Loong Keoh and Thomas Locher and Daisuke Mashima and Tommy H. Morris and John Mulder and Stephen McLaughlin and Igor Nai Fovino and Julian L. Rrushi and Bradley L. Schatz and Jared Smith and Saman A. Zonouz and Tim Zimmerman}, title = {Proceedings of the 4th Annual Industrial Control System Security Workshop, {ICSS} 2018, San Juan, PR, USA, December 4, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3295453}, isbn = {978-1-4503-6220-7}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/0001MY17, author = {Thiago Alves and Thomas H. Morris and Seong{-}Moo Yoo}, title = {Securing {SCADA} Applications Using OpenPLC With End-To-End Encryption}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {1--6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174777}, doi = {10.1145/3174776.3174777}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icss2/0001MY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/ChiaKT17, author = {Ming Hong Chia and Sye Loong Keoh and Zhaohui Tang}, title = {Secure Data Provenance in Home Energy Monitoring Networks}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {7--14}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174778}, doi = {10.1145/3174776.3174778}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/ChiaKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/Rrushi17, author = {Julian L. Rrushi}, title = {Timing Performance Profiling of Substation Control Code for {IED} Malware Detection}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {15--23}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174779}, doi = {10.1145/3174776.3174779}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/Rrushi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/TacliadNG17, author = {Francisco Tacliad and Thuy D. Nguyen and Mark A. Gondree}, title = {DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {24--31}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174780}, doi = {10.1145/3174776.3174780}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/TacliadNG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icss2/2017, title = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776}, doi = {10.1145/3174776}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/0001DM16, author = {Thiago Alves and Rishabh Das and Thomas H. Morris}, title = {Virtualization of Industrial Control System Testbeds for Cybersecurity}, booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, pages = {10--14}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981.3018988}, doi = {10.1145/3018981.3018988}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icss2/0001DM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/AhmedRJSS16, author = {Irfan Ahmed and Vassil Roussev and William E. Johnson and Saranyan Senthivel and Sneha Sudhakaran}, title = {A {SCADA} System Testbed for Cybersecurity and Forensic Research and Pedagogy}, booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, pages = {1--9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981.3018984}, doi = {10.1145/3018981.3018984}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icss2/AhmedRJSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/Amullen0KK16, author = {Esther M. Amullen and Hui Lin and Zbigniew Kalbarczyk and Lee H. Keel}, title = {Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid}, booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, pages = {38--44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981.3018987}, doi = {10.1145/3018981.3018987}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/Amullen0KK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/BratusCHHPKS16, author = {Sergey Bratus and J. Adam Crain and Sven M. Hallberg and Daniel P. Hirsch and Meredith L. Patterson and Maxwell Koo and Sean W. Smith}, title = {Implementing a vertically hardened {DNP3} control stack for power applications}, booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, pages = {45--53}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981.3018985}, doi = {10.1145/3018981.3018985}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/BratusCHHPKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/FernandezKT16, author = {Maribel Fern{\'{a}}ndez and Murat Kantarcioglu and Bhavani Thuraisingham}, title = {A Framework for Secure Data Collection and Management for Internet of Things}, booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, pages = {30--37}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981.3018982}, doi = {10.1145/3018981.3018982}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/FernandezKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/MellSH16, author = {Peter Mell and James M. Shook and Richard E. Harang}, title = {Measuring and Improving the Effectiveness of Defense-in-Depth Postures}, booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, pages = {15--22}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981.3018986}, doi = {10.1145/3018981.3018986}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/MellSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/RajabiB16, author = {Arezoo Rajabi and Rakesh B. Bobba}, title = {A Resilient Algorithm for Power System Mode Estimation using Synchrophasors}, booktitle = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, pages = {23--29}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981.3018983}, doi = {10.1145/3018981.3018983}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/RajabiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icss2/2016, title = {Proceedings of the 2nd Annual Industrial Control System Security Workshop, {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3018981}, doi = {10.1145/3018981}, isbn = {978-1-4503-4788-4}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.