default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 61 matches
- 2024
- Mohamed Ahzam Amanullah, Mohan Baruwal Chhetri, Seng W. Loke, Robin Doss:
IntelliMD: A Hybrid Approach for Local Misbehaviour Detection in Cooperative Intelligent Transport Systems. CPSIOTSEC@CCS 2024: 2-13 - Konstantinos Anastasakis, Awais Rashid:
Towards Linking Indicators of Compromise to Operational Resilience and Safety Requirements. CPSIOTSEC@CCS 2024: 104-110 - Andy Baldrian, Joseph Hallett:
RTFM: How Hard are IoT Platform Providers Making it for their Developers? CPSIOTSEC@CCS 2024: 14-26 - Brennan Vanden Bos, Victor Calzada, Raghav Puri, Shrirang Mare:
Exploring Usability of Data Flow Visualizations in a Privacy-focused Smart Home Dashboard. CPSIOTSEC@CCS 2024: 111-117 - Alvaro A. Cárdenas:
Keynote: Physics and Security: Then and Now. CPSIOTSEC@CCS 2024: 1 - Cihan Eryonucu, Panos Papadimitratos:
Detecting Mobile Crowdsensing Sybil Attackers via Presence Verification. CPSIOTSEC@CCS 2024: 118-124 - Sibylle B. Fröschle, Martin Kubisch:
Three Taps for Secure Machine-to-Machine Communication: Towards High Assurance yet Fully Local Machine Pairing. CPSIOTSEC@CCS 2024: 125-133 - Joseph Gardiner, Stanislav Abaimov, Jacob Williams, Feras Shahbi, Konstantinos Anastasakis, Partha Das Chowdhury, Winston Ellis, Maria Sameen, Emmanouil Samanis, Awais Rashid:
"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag Competitions. CPSIOTSEC@CCS 2024: 27-40 - Michael P. Heinl, Victor Embacher:
BT2X: Multi-Leveled Binary Transparency to Protect the Software Supply Chain of Operational Technology. CPSIOTSEC@CCS 2024: 41-54 - Jean Carlos Tonday Rodriguez, David Perry, Mohammad Ashiqur Rahman, Syed Bahauddin Alam:
An Intelligent Hierarchical Framework for Efficient Fault Detection and Diagnosis in Nuclear Power Plants. CPSIOTSEC@CCS 2024: 80-92 - Davide Rusconi, Matteo Zoia, Luca Buccioli, Fabio Pierazzi, Danilo Bruschi, Lorenzo Cavallaro, Flavio Toffalini, Andrea Lanzi:
EmbedWatch: Fat Pointer Solution for Detecting Spatial Memory Errors in Embedded Systems. CPSIOTSEC@CCS 2024: 55-67 - Prathyusha Sagi, Arun Sankar, Utz Roedig:
Detection of Wake Word Jamming. CPSIOTSEC@CCS 2024: 134-141 - Luis E. Salazar, Efrén López-Morales, Juan Lozano, Carlos E. Rubio-Medrano, Alvaro A. Cárdenas:
ICSNet: A Hybrid-Interaction Honeynet for Industrial Control Systems. CPSIOTSEC@CCS 2024: 68-79 - Muhammet Anil Yagiz, Pedram MohajerAnsari, Mert D. Pesé, Polat Goktas:
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI. CPSIOTSEC@CCS 2024: 93-103 - Qingzhao Zhang, Z. Morley Mao:
Stealthy Data Fabrication in Collaborative Vehicular Perception. CPSIOTSEC@CCS 2024: 142-149 - Kassem Fawaz, Magnus Almgren:
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1244-9 [contents] - 2023
- Alyah Alfageh, Sridhar Adepu, Charalambos Konstantinou:
Water Risk-Proofed: Risk Assessment in Water Desalination. CPSIOTSEC@CCS 2023: 11-23 - Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole:
Granular IoT Device Identification Using TF-IDF and Cosine Similarity. CPSIOTSEC@CCS 2023: 91-99 - Alexandre Armengol-Urpi, Reid Kovacs, Sanjay E. Sarma:
Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer Interface. CPSIOTSEC@CCS 2023: 53-66 - Samuel Barnes-Thornton, Joseph Gardiner, Awais Rashid:
The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming. CPSIOTSEC@CCS 2023: 67-73 - Hadjer Benkraouda, Anand Agrawal, Dimitrios Tychalas, Marios Sazos, Michail Maniatakos:
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications. CPSIOTSEC@CCS 2023: 83-89 - Yung-Tai Cheng, Shin-Ming Cheng:
Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI. CPSIOTSEC@CCS 2023: 1-9 - Niccolò Marastoni, Mariano Ceccato:
Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges. CPSIOTSEC@CCS 2023: 25-36 - Islam Obaidat, Zachary Palko, Meera Sridhar:
From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulations Through Full System Emulation. CPSIOTSEC@CCS 2023: 37 - Yazhou Tu, Sara Rampazzi, Xiali Hei:
Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side Channels. CPSIOTSEC@CCS 2023: 39-51 - Xin Yang, Omid Ardakanian:
Privacy through Diffusion: A White-listing Approach to Sensor Data Anonymization. CPSIOTSEC@CCS 2023: 101-107 - Zetong Zhao, Shreyas Srinivasa, Emmanouil Vasilomanolakis:
SweetCam: an IP Camera Honeypot. CPSIOTSEC@CCS 2023: 75-81 - Magnus Almgren, Earlence Fernandes:
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - 2022
- Mohammad Fakhruddin Babar, Monowar Hasan:
Real-Time Scheduling of TrustZone-enabled DNN Workloads. CPSIOTSEC@CCS 2022: 63-69 - Vijay Banerjee, Sena Hounsinou, Habeeb Olufowobi, Monowar Hasan, Gedare Bloom:
Secure Reboots for Real-Time Cyber-Physical Systems. CPSIOTSEC@CCS 2022: 27-33
skipping 31 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-30 17:19 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint