default search action
Search dblp for Publications
export results for "toc:db/conf/ifip11-10/iccip2014.bht:"
@inproceedings{DBLP:conf/ifip11-10/AbabnehAWC14, author = {Mohammad Ababneh and Malek Athamnah and Duminda Wijesekera and Paulo C. G. Costa}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {An Automated Dialog System for Conducting Security Interviews for Access Control}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {111--125}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_8}, doi = {10.1007/978-3-662-45355-1\_8}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/AbabnehAWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/AgbeyiborBGM14, author = {Richard Agbeyibor and Jonathan Butts and Michael R. Grimaila and Robert F. Mills}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {245--261}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_16}, doi = {10.1007/978-3-662-45355-1\_16}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/AgbeyiborBGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/AlcarazW14, author = {Cristina Alcaraz and Stephen D. Wolthusen}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Recovery of Structural Controllability for Control Systems}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {47--63}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_4}, doi = {10.1007/978-3-662-45355-1\_4}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/AlcarazW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ArnoldBT14, author = {Chad Arnold and Jonathan Butts and Krishnaprasad Thirunarayan}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Detecting Integrity Attacks on Industrial Control Systems}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {3--13}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_1}, doi = {10.1007/978-3-662-45355-1\_1}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/ArnoldBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/CavalliniBBB14, author = {Simona Cavallini and Fabio Bisogni and Marco Bardoscia and Roberto Bellotti}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Assessing Potential Casualties in Critical Events}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {231--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_15}, doi = {10.1007/978-3-662-45355-1\_15}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/CavalliniBBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/CavallinidVACBA14, author = {Simona Cavallini and Cristina d'Alessandro and Margherita Volpe and Stefano Armenia and Camillo Carlini and Elisabeth Brein and Pierluigi Assogna}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {A System Dynamics Framework for Modeling Critical Infrastructure Resilience}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {141--154}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_10}, doi = {10.1007/978-3-662-45355-1\_10}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/CavallinidVACBA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/FormicolaPADM14, author = {Valerio Formicola and Antonio Di Pietro and Abdullah Alsubaie and Salvatore D'Antonio and Jos{\'{e}} R. Mart{\'{\i}}}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {213--229}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_14}, doi = {10.1007/978-3-662-45355-1\_14}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/FormicolaPADM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/GaoPDWHL14, author = {Haihui Gao and Yong Peng and Zhonghua Dai and Ting Wang and Xuefeng Han and Hanjing Li}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {79--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_6}, doi = {10.1007/978-3-662-45355-1\_6}, timestamp = {Fri, 09 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/GaoPDWHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/GonzalezH14, author = {Carlos Aguayo Gonzalez and Alan Hinton}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {15--27}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_2}, doi = {10.1007/978-3-662-45355-1\_2}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/GonzalezH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/HurstMF14, author = {William Hurst and Madjid Merabti and Paul Fergus}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {A Survey of Critical Infrastructure Security}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {127--138}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_9}, doi = {10.1007/978-3-662-45355-1\_9}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/HurstMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/KhoujSLM14, author = {Mohammed Talat Khouj and Sarbjit Sarkaria and Cesar Lopez Castellanos and Jos{\'{e}} R. Mart{\'{\i}}}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {155--172}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_11}, doi = {10.1007/978-3-662-45355-1\_11}, timestamp = {Fri, 10 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/KhoujSLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/KrotofilCA14, author = {Marina Krotofil and Alvaro A. C{\'{a}}rdenas and Kishore Angrishi}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Timing of Cyber-Physical Attacks on Process Control Systems}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {29--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_3}, doi = {10.1007/978-3-662-45355-1\_3}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/KrotofilCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/MorrisG14, author = {Thomas H. Morris and Wei Gao}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Industrial Control System Traffic Data Sets for Intrusion Detection Research}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {65--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_5}, doi = {10.1007/978-3-662-45355-1\_5}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/MorrisG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/PalaWBLA14, author = {Okan Pala and David C. Wilson and Russell Bent and Steve Linger and James Arnold}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {173--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_12}, doi = {10.1007/978-3-662-45355-1\_12}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/PalaWBLA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/SantiniFP14, author = {Riccardo Santini and Chiara Foglietta and Stefano Panzieri}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Evidence Theory for Cyber-Physical Systems}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {95--109}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_7}, doi = {10.1007/978-3-662-45355-1\_7}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/SantiniFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/WeldehawaryatW14, author = {Goitom Weldehawaryat and Stephen D. Wolthusen}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {263--276}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_17}, doi = {10.1007/978-3-662-45355-1\_17}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/WeldehawaryatW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/WhiteBCM14, author = {Richard White and Aaron Burkhart and Edward Chow and Logan Maynard}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {A Decision Support Tool for a Unified Homeland Security Strategy}, booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, pages = {195--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1\_13}, doi = {10.1007/978-3-662-45355-1\_13}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/WhiteBCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11-10/2014, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {441}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45355-1}, doi = {10.1007/978-3-662-45355-1}, isbn = {978-3-662-45354-4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.