default search action
Search dblp for Publications
export results for "toc:db/conf/icss2/icss2017.bht:"
@inproceedings{DBLP:conf/icss2/0001MY17, author = {Thiago Alves and Thomas H. Morris and Seong{-}Moo Yoo}, title = {Securing {SCADA} Applications Using OpenPLC With End-To-End Encryption}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {1--6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174777}, doi = {10.1145/3174776.3174777}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icss2/0001MY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/ChiaKT17, author = {Ming Hong Chia and Sye Loong Keoh and Zhaohui Tang}, title = {Secure Data Provenance in Home Energy Monitoring Networks}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {7--14}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174778}, doi = {10.1145/3174776.3174778}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/ChiaKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/Rrushi17, author = {Julian L. Rrushi}, title = {Timing Performance Profiling of Substation Control Code for {IED} Malware Detection}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {15--23}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174779}, doi = {10.1145/3174776.3174779}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/Rrushi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/TacliadNG17, author = {Francisco Tacliad and Thuy D. Nguyen and Mark A. Gondree}, title = {DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing}, booktitle = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, pages = {24--31}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776.3174780}, doi = {10.1145/3174776.3174780}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/TacliadNG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icss2/2017, title = {Proceedings of the 3rd Annual Industrial Control System Security Workshop, {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3174776}, doi = {10.1145/3174776}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.