default search action
CPSIOTSEC@CCS 2020: Virtual Event, USA
- Michail Maniatakos, Yuqing Zhang:
CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8087-4 - Marina Krotofil:
Optimize Your Efforts: How to Tailor PhD Research to Real-World Needs - Industrial Perspective on Academic CPS/IoT Research. 1 - Luis E. Salazar, Neil Ortiz Silva, Xi Qin, Alvaro A. Cárdenas:
Towards a High-Fidelity Network Emulation of IEC 104 SCADA Systems. 3-12 - Luca Maria Castiglione, Emil C. Lupu:
Hazard Driven Threat Modelling for Cyber Physical Systems. 13-24 - Federico Turrin, Alessandro Erba, Nils Ole Tippenhauer, Mauro Conti:
A Statistical Analysis Framework for ICS Process Datasets. 25-30 - Anand Agrawal, Marios Sazos, Ahmed Al-Durra, Michail Maniatakos:
Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining. 31-36 - Giovanni Salzillo, Massimiliano Rak:
A (in)Secure-by-Design IoT Protocol: the ESP Touch Protocol and a Case Study Analysis from the Real Market. 37-48 - Richard James Thomas, Joseph Gardiner, Tom Chothia, Emmanouil Samanis, Joshua Perrett, Awais Rashid:
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures. 49-60 - Heng Zhang, Amiya Kumar Maji, Saurabh Bagchi:
Privacy in the Mobile World: An Analysis of Bluetooth Scan Traces. 61-65 - Joseph Gardiner, Awais Rashid:
DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs. 67 - Juan Ospina, Ioannis Zografopoulos, Xiaorui Liu, Charalambos Konstantinou:
DEMO: Trustworthy Cyberphysical Energy Systems: Time-Delay Attacks in a Real-Time Co-Simulation Environment. 69 - Pooria Madani, Natalija Vlajic, Shadi Sadeghpour:
MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach. 71-80 - Sunandan Adhikary, Ipsita Koley, Saurav Kumar Ghosh, Sumana Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions. 81-86 - Batyr Charyyev, Mehmet Hadi Gunes:
Voice Command Fingerprinting with Locality Sensitive Hashes. 87-92
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.