default search action
Search dblp for Publications
export results for "toc:db/conf/ifip11-10/iccip2015.bht:"
@inproceedings{DBLP:conf/ifip11-10/Al-UtaibiAM15, author = {Khaled Al{-}Utaibi and Abdullah Alsubaie and Jos{\'{e}} R. Mart{\'{\i}}}, editor = {Mason Rice and Sujeet Shenoi}, title = {Allocation and Scheduling of Firefighting Units in Large Petrochemical Complexes}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {263--279}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_16}, doi = {10.1007/978-3-319-26567-4\_16}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/Al-UtaibiAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/BadenhopFHRR15, author = {Christopher W. Badenhop and Jonathan D. Fuller and Joseph Hall and Benjamin W. P. Ramsey and Mason Rice}, editor = {Mason Rice and Sujeet Shenoi}, title = {Evaluating {ITU-T} {G.9959} Based Wireless Systems Used in Critical Infrastructure Assets}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {209--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_13}, doi = {10.1007/978-3-319-26567-4\_13}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/BadenhopFHRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ButtsG15, author = {Jonathan Butts and Michael Glover}, editor = {Mason Rice and Sujeet Shenoi}, title = {How Industrial Control System Security Training is Falling Short}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {135--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_9}, doi = {10.1007/978-3-319-26567-4\_9}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/ButtsG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/CaselliZPK15, author = {Marco Caselli and Emmanuele Zambon and Jonathan Petit and Frank Kargl}, editor = {Mason Rice and Sujeet Shenoi}, title = {Modeling Message Sequences for Intrusion Detection in Industrial Control Systems}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {49--71}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_4}, doi = {10.1007/978-3-319-26567-4\_4}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/CaselliZPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ChoiCYK15, author = {Seungoh Choi and Yeop Chang and Jeong{-}Han Yun and Woonyon Kim}, editor = {Mason Rice and Sujeet Shenoi}, title = {Traffic-Locality-Based Creation of Flow Whitelists for {SCADA} Networks}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {87--102}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_6}, doi = {10.1007/978-3-319-26567-4\_6}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/ChoiCYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ChowYL15, author = {Kam{-}Pui Chow and Ken Yau and Frankie Li}, editor = {Mason Rice and Sujeet Shenoi}, title = {Cyber Attacks and Political Events: The Case of the Occupy Central Campaign}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {17--27}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_2}, doi = {10.1007/978-3-319-26567-4\_2}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/ChowYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/FogliettaPSP15, author = {Chiara Foglietta and Cosimo Palazzo and Riccardo Santini and Stefano Panzieri}, editor = {Mason Rice and Sujeet Shenoi}, title = {Assessing Cyber Risk Using the CISIApro Simulator}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {315--331}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_19}, doi = {10.1007/978-3-319-26567-4\_19}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/FogliettaPSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/Howser15, author = {Gerry Howser}, editor = {Mason Rice and Sujeet Shenoi}, title = {Using Information Flow Methods to Secure Cyber-Physical Systems}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {185--205}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_12}, doi = {10.1007/978-3-319-26567-4\_12}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/Howser15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/JenkinsB15, author = {Jonathan Jenkins and Mike Burmester}, editor = {Mason Rice and Sujeet Shenoi}, title = {Runtime Integrity for Cyber-Physical Infrastructures}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {153--167}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_10}, doi = {10.1007/978-3-319-26567-4\_10}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/JenkinsB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/LuiijfK15, author = {Eric A. M. Luiijf and Marieke H. A. Klaver}, editor = {Mason Rice and Sujeet Shenoi}, title = {On the Sharing of Cyber Security Information}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {29--46}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_3}, doi = {10.1007/978-3-319-26567-4\_3}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/LuiijfK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/MohanBKF15, author = {Apurva Mohan and Gregory Brainard and Himanshu Khurana and Scott Fischer}, editor = {Mason Rice and Sujeet Shenoi}, title = {A Cyber Security Architecture for Microgrid Deployments}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {245--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_15}, doi = {10.1007/978-3-319-26567-4\_15}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/MohanBKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/MohanK15, author = {Apurva Mohan and Himanshu Khurana}, editor = {Mason Rice and Sujeet Shenoi}, title = {Implementing Cyber Security Requirements and Mechanisms in Microgrids}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {229--244}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_14}, doi = {10.1007/978-3-319-26567-4\_14}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/MohanK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/PengXGCR15, author = {Yong Peng and Chong Xiang and Haihui Gao and Dongqing Chen and Wang Ren}, editor = {Mason Rice and Sujeet Shenoi}, title = {Industrial Control System Fingerprinting and Anomaly Detection}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {73--85}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_5}, doi = {10.1007/978-3-319-26567-4\_5}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/PengXGCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/PietroPG15, author = {Antonio Di Pietro and Stefano Panzieri and Andrea Gasparri}, editor = {Mason Rice and Sujeet Shenoi}, title = {Situational Awareness Using Distributed Data Fusion with Evidence Discounting}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {281--296}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_17}, doi = {10.1007/978-3-319-26567-4\_17}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/PietroPG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/RedwoodLB15, author = {W. Owen Redwood and Joshua Lawrence and Mike Burmester}, editor = {Mason Rice and Sujeet Shenoi}, title = {A Symbolic Honeynet Framework for {SCADA} System Threat Intelligence}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {103--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_7}, doi = {10.1007/978-3-319-26567-4\_7}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/RedwoodLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/StergiopoulosTK15, author = {George Stergiopoulos and Marianthi Theocharidou and Panayiotis Kotzanikolaou and Dimitris Gritzalis}, editor = {Mason Rice and Sujeet Shenoi}, title = {Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {299--314}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_18}, doi = {10.1007/978-3-319-26567-4\_18}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/StergiopoulosTK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ThorntonM15, author = {Zach Thornton and Thomas H. Morris}, editor = {Mason Rice and Sujeet Shenoi}, title = {Enhancing a Virtual {SCADA} Laboratory Using Simulink}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {119--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_8}, doi = {10.1007/978-3-319-26567-4\_8}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/ThorntonM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/VenablesSS15, author = {Adrian Venables and Siraj Ahmed Shaikh and James Shuttleworth}, editor = {Mason Rice and Sujeet Shenoi}, title = {A Model for Characterizing Cyberpower}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {3--16}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_1}, doi = {10.1007/978-3-319-26567-4\_1}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/VenablesSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/YampolskiySVY15, author = {Mark Yampolskiy and Lena Schutzle and Uday Vaidya and Alec Yasinsac}, editor = {Mason Rice and Sujeet Shenoi}, title = {Security Challenges of Additive Manufacturing with Metals and Alloys}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {169--183}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_11}, doi = {10.1007/978-3-319-26567-4\_11}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/YampolskiySVY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11-10/2015, editor = {Mason Rice and Sujeet Shenoi}, title = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4}, doi = {10.1007/978-3-319-26567-4}, isbn = {978-3-319-26566-7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.