Search dblp for Publications

export results for "toc:db/conf/ifip11-10/iccip2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ifip11-10/Al-UtaibiAM15,
  author       = {Khaled Al{-}Utaibi and
                  Abdullah Alsubaie and
                  Jos{\'{e}} R. Mart{\'{\i}}},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Allocation and Scheduling of Firefighting Units in Large Petrochemical
                  Complexes},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {263--279},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_16},
  doi          = {10.1007/978-3-319-26567-4\_16},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/Al-UtaibiAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/BadenhopFHRR15,
  author       = {Christopher W. Badenhop and
                  Jonathan D. Fuller and
                  Joseph Hall and
                  Benjamin W. P. Ramsey and
                  Mason Rice},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Evaluating {ITU-T} {G.9959} Based Wireless Systems Used in Critical
                  Infrastructure Assets},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {209--227},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_13},
  doi          = {10.1007/978-3-319-26567-4\_13},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/BadenhopFHRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ButtsG15,
  author       = {Jonathan Butts and
                  Michael Glover},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {How Industrial Control System Security Training is Falling Short},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_9},
  doi          = {10.1007/978-3-319-26567-4\_9},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ButtsG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/CaselliZPK15,
  author       = {Marco Caselli and
                  Emmanuele Zambon and
                  Jonathan Petit and
                  Frank Kargl},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Modeling Message Sequences for Intrusion Detection in Industrial Control
                  Systems},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {49--71},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_4},
  doi          = {10.1007/978-3-319-26567-4\_4},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/CaselliZPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ChoiCYK15,
  author       = {Seungoh Choi and
                  Yeop Chang and
                  Jeong{-}Han Yun and
                  Woonyon Kim},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Traffic-Locality-Based Creation of Flow Whitelists for {SCADA} Networks},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_6},
  doi          = {10.1007/978-3-319-26567-4\_6},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ChoiCYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ChowYL15,
  author       = {Kam{-}Pui Chow and
                  Ken Yau and
                  Frankie Li},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Cyber Attacks and Political Events: The Case of the Occupy Central
                  Campaign},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {17--27},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_2},
  doi          = {10.1007/978-3-319-26567-4\_2},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ChowYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/FogliettaPSP15,
  author       = {Chiara Foglietta and
                  Cosimo Palazzo and
                  Riccardo Santini and
                  Stefano Panzieri},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Assessing Cyber Risk Using the CISIApro Simulator},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {315--331},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_19},
  doi          = {10.1007/978-3-319-26567-4\_19},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/FogliettaPSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/Howser15,
  author       = {Gerry Howser},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Using Information Flow Methods to Secure Cyber-Physical Systems},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {185--205},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_12},
  doi          = {10.1007/978-3-319-26567-4\_12},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/Howser15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/JenkinsB15,
  author       = {Jonathan Jenkins and
                  Mike Burmester},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Runtime Integrity for Cyber-Physical Infrastructures},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_10},
  doi          = {10.1007/978-3-319-26567-4\_10},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/JenkinsB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/LuiijfK15,
  author       = {Eric A. M. Luiijf and
                  Marieke H. A. Klaver},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {On the Sharing of Cyber Security Information},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_3},
  doi          = {10.1007/978-3-319-26567-4\_3},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/LuiijfK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/MohanBKF15,
  author       = {Apurva Mohan and
                  Gregory Brainard and
                  Himanshu Khurana and
                  Scott Fischer},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {A Cyber Security Architecture for Microgrid Deployments},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_15},
  doi          = {10.1007/978-3-319-26567-4\_15},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/MohanBKF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/MohanK15,
  author       = {Apurva Mohan and
                  Himanshu Khurana},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Implementing Cyber Security Requirements and Mechanisms in Microgrids},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {229--244},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_14},
  doi          = {10.1007/978-3-319-26567-4\_14},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/MohanK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/PengXGCR15,
  author       = {Yong Peng and
                  Chong Xiang and
                  Haihui Gao and
                  Dongqing Chen and
                  Wang Ren},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Industrial Control System Fingerprinting and Anomaly Detection},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_5},
  doi          = {10.1007/978-3-319-26567-4\_5},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/PengXGCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/PietroPG15,
  author       = {Antonio Di Pietro and
                  Stefano Panzieri and
                  Andrea Gasparri},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Situational Awareness Using Distributed Data Fusion with Evidence
                  Discounting},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {281--296},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_17},
  doi          = {10.1007/978-3-319-26567-4\_17},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/PietroPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/RedwoodLB15,
  author       = {W. Owen Redwood and
                  Joshua Lawrence and
                  Mike Burmester},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {A Symbolic Honeynet Framework for {SCADA} System Threat Intelligence},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_7},
  doi          = {10.1007/978-3-319-26567-4\_7},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/RedwoodLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/StergiopoulosTK15,
  author       = {George Stergiopoulos and
                  Marianthi Theocharidou and
                  Panayiotis Kotzanikolaou and
                  Dimitris Gritzalis},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Using Centrality Measures in Dependency Risk Graphs for Efficient
                  Risk Mitigation},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_18},
  doi          = {10.1007/978-3-319-26567-4\_18},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/StergiopoulosTK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ThorntonM15,
  author       = {Zach Thornton and
                  Thomas H. Morris},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Enhancing a Virtual {SCADA} Laboratory Using Simulink},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_8},
  doi          = {10.1007/978-3-319-26567-4\_8},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ThorntonM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/VenablesSS15,
  author       = {Adrian Venables and
                  Siraj Ahmed Shaikh and
                  James Shuttleworth},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {A Model for Characterizing Cyberpower},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_1},
  doi          = {10.1007/978-3-319-26567-4\_1},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/VenablesSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/YampolskiySVY15,
  author       = {Mark Yampolskiy and
                  Lena Schutzle and
                  Uday Vaidya and
                  Alec Yasinsac},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Security Challenges of Additive Manufacturing with Metals and Alloys},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_11},
  doi          = {10.1007/978-3-319-26567-4\_11},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/YampolskiySVY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-10/2015,
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4},
  doi          = {10.1007/978-3-319-26567-4},
  isbn         = {978-3-319-26566-7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}