![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
CPSIOTSEC@CCS 2021: Virtual Event, Korea
- Michail Maniatakos, Cristina Alcaraz:
CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8487-2 - Sanjay Chhillar, Dale Geach:
Digital Transformation and emerging ICS/OT cyber attacks - Imminent Threats to Our Society. 1 - Nils Ole Tippenhauer
, Binbin Chen
, Daisuke Mashima, David M. Nicol:
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation. 3-14 - Raul Quinonez, Sleiman Safaoui, Tyler H. Summers, Bhavani Thuraisingham, Alvaro A. Cárdenas:
Shared Reality: Detecting Stealthy Attacks Against Autonomous Vehicles. 15-26 - Kim-Kwang Raymond Choo:
Internet of Things (IoT) Security and Forensics: Challenges and Opportunities. 27-28 - Kyuin Lee, Younghyun Kim:
Balancing Security and Usability of Zero-interaction Pairing and Authentication for the Internet-of-Things. 29-34 - Muhammad Azmi Umer
, Chuadhry Mujeeb Ahmed
, Muhammad Taha Jilani
, Aditya P. Mathur:
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning. 35-40 - Yucheng Yang, Kyuin Lee, Younghyun Kim, Kassem Fawaz:
PEDRO: Secure Pedestrian Mobility Verification in V2P Communication using Commercial Off-the-shelf Mobile Devices. 41-46 - Aneet Kumar Dutta, Bhaskar Mukhoty
, Sandeep K. Shukla:
CatchAll: A Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix. 47-56 - Lorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso
, Giuseppe Bianchi:
TooLate: Cryptographic Data Access Control for Offline Devices through Efficient Key Rotation. 57-62 - Joseph Gardiner
, Adam Eiffert, Peter Garraghan
, Nicholas J. P. Race
, Shishir Nagaraja, Awais Rashid
:
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems. 63-68
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.