default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2019
- Wissam Aoudi, Albin Hellqvist, Albert Overland, Magnus Almgren:
A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective. ICSS 2019: 1-10 - Eyasu Getahun Chekole, Huaqun Guo:
ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS. ICSS 2019: 60-69 - Celine Irvene, Tohid Shekari, David Formby, Raheem Beyah:
If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic. ICSS 2019: 48-59 - Thuy D. Nguyen, Steve C. Austin, Cynthia E. Irvine:
A Strategy for Security Testing Industrial Firewalls. ICSS 2019: 38-47 - Md Touhiduzzaman, Adam Hahn, Saeed Lotfifard:
An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on IEC 61850. ICSS 2019: 21-29 - Varsha Venugopal, Jim Alves-Foss, Sandeep Gogineni Ravindrababu:
Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege Networking. ICSS 2019: 11-20 - Mohammad-Reza Zamiri-Gourabi, Ali Razmjoo-Qalaei, Babak Amin Azad:
Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild. ICSS 2019: 30-37 - Proceedings of the Fifth Annual Industrial Control System Security Workshop, ICSS 2019, San Juan, PR, USA, December 10, 2019. ACM 2019, ISBN 978-1-4503-7719-5 [contents]
- 2018
- Magnus Almgren, Wissam Aoudi, Robert Gustafsson, Robin Krahl, Andreas Lindhé:
The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems. ICSS 2018: 17-24 - Rima Asmar Awad, Saeed Beztchi, Jared M. Smith, J. Bryan Lyles, Stacy J. Prowell:
Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems. ICSS 2018: 1-8 - Maribel Fernández, Jenjira Jaimunk, Bhavani Thuraisingham:
Graph-Based Data-Collection Policies for the Internet of Things. ICSS 2018: 9-16 - Adam Hahn, Ali Tamimi, Dave Anderson:
Securing Your ICS Software with the AttackSurface Host Analyzer (AHA). ICSS 2018: 33-39 - Andrés Felipe Murillo-Piedrahita, Luis Francisco Cómbita, Andrea Calderón Gonzalez, Sandra Rueda, Alvaro A. Cárdenas, Nicanor Quijano:
A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response. ICSS 2018: 25-32 - Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy H. Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley L. Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - 2017
- Thiago Alves, Thomas H. Morris, Seong-Moo Yoo:
Securing SCADA Applications Using OpenPLC With End-To-End Encryption. ICSS 2017: 1-6 - Ming Hong Chia, Sye Loong Keoh, Zhaohui Tang:
Secure Data Provenance in Home Energy Monitoring Networks. ICSS 2017: 7-14 - Julian L. Rrushi:
Timing Performance Profiling of Substation Control Code for IED Malware Detection. ICSS 2017: 15-23 - Francisco Tacliad, Thuy D. Nguyen, Mark A. Gondree:
DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing. ICSS 2017: 24-31 - Proceedings of the 3rd Annual Industrial Control System Security Workshop, ICSS 2017, San Juan, PR, USA, December 05-05, 2017. ACM 2017 [contents]
- 2016
- Thiago Alves, Rishabh Das, Thomas H. Morris:
Virtualization of Industrial Control System Testbeds for Cybersecurity. ICSS 2016: 10-14 - Irfan Ahmed, Vassil Roussev, William E. Johnson, Saranyan Senthivel, Sneha Sudhakaran:
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy. ICSS 2016: 1-9 - Esther M. Amullen, Hui Lin, Zbigniew Kalbarczyk, Lee H. Keel:
Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid. ICSS 2016: 38-44 - Sergey Bratus, J. Adam Crain, Sven M. Hallberg, Daniel P. Hirsch, Meredith L. Patterson, Maxwell Koo, Sean W. Smith:
Implementing a vertically hardened DNP3 control stack for power applications. ICSS 2016: 45-53 - Maribel Fernández, Murat Kantarcioglu, Bhavani Thuraisingham:
A Framework for Secure Data Collection and Management for Internet of Things. ICSS 2016: 30-37 - Peter Mell, James M. Shook, Richard E. Harang:
Measuring and Improving the Effectiveness of Defense-in-Depth Postures. ICSS 2016: 15-22 - Arezoo Rajabi, Rakesh B. Bobba:
A Resilient Algorithm for Power System Mode Estimation using Synchrophasors. ICSS 2016: 23-29 - Proceedings of the 2nd Annual Industrial Control System Security Workshop, ICSS 2016, Los Angeles, CA, USA, December 6, 2016. ACM 2016, ISBN 978-1-4503-4788-4 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-04 06:49 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint