default search action
Search dblp for Publications
export results for "toc:db/conf/icss2/icss2019.bht:"
@inproceedings{DBLP:conf/icss2/AoudiHOA19, author = {Wissam Aoudi and Albin Hellqvist and Albert Overland and Magnus Almgren}, title = {A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {1--10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372320}, doi = {10.1145/3372318.3372320}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/AoudiHOA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/ChekoleG19, author = {Eyasu Getahun Chekole and Huaqun Guo}, title = {{ICS-SEA:} Formally Modeling the Conflicting Design Constraints in {ICS}}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {60--69}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372325}, doi = {10.1145/3372318.3372325}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/ChekoleG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/IrveneSFB19, author = {Celine Irvene and Tohid Shekari and David Formby and Raheem Beyah}, title = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security using Power Substation Traffic}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {48--59}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372324}, doi = {10.1145/3372318.3372324}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/NguyenAI19, author = {Thuy D. Nguyen and Steve C. Austin and Cynthia E. Irvine}, title = {A Strategy for Security Testing Industrial Firewalls}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {38--47}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372323}, doi = {10.1145/3372318.3372323}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/NguyenAI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/TouhiduzzamanHL19, author = {Md Touhiduzzaman and Adam Hahn and Saeed Lotfifard}, title = {An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on {IEC} 61850}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {21--29}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372326}, doi = {10.1145/3372318.3372326}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/TouhiduzzamanHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/VenugopalAR19, author = {Varsha Venugopal and Jim Alves{-}Foss and Sandeep Gogineni Ravindrababu}, title = {Use of an {SDN} Switch in Support of {NIST} {ICS} Security Recommendations and Least Privilege Networking}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {11--20}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372321}, doi = {10.1145/3372318.3372321}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/VenugopalAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icss2/Zamiri-GourabiR19, author = {Mohammad{-}Reza Zamiri{-}Gourabi and Ali Razmjoo{-}Qalaei and Babak Amin Azad}, title = {Gas what?: {I} can see your GasPots. Studying the fingerprintability of {ICS} honeypots in the wild}, booktitle = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, pages = {30--37}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318.3372322}, doi = {10.1145/3372318.3372322}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/Zamiri-GourabiR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icss2/2019, title = {Proceedings of the Fifth Annual Industrial Control System Security Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3372318}, doi = {10.1145/3372318}, isbn = {978-1-4503-7719-5}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icss2/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.