![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
13th CSET @ USENIX Security Symposium 2020
- Tamara Denning, Tyler Moore:
13th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2020, August 10, 2020. USENIX Association 2020
Industrial Control Systems
- Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim:
HAI 1.0: HIL-based Augmented ICS Security Dataset. - Seungoh Choi, Jongwon Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim:
Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques. - Benjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince, David Hutchison:
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource. - Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, Alvin Cheng:
On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence.
Vulnerabilities, Exploits, Attacks
- Kayla Afanador, Cynthia E. Irvine:
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT). - Allen D. Householder, Jeff Chrabaszcz, Trent Novelly, David Warren, Jonathan M. Spring:
Historical Analysis of Exploit Availability Timelines. - Thomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen:
Towards Adversarial Phishing Detection. - Yusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka:
APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences.
Network Infrastructure & Attacks
- Alefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel:
Toward Orchestration of Complex Networking Experiments. - Shay Berkovich, Jeffrey Kam
, Glenn Wurster:
UBCIS: Ultimate Benchmark for Container Image Scanning. - Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li:
Bridging Missing Gaps in Evaluating DDoS Research.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.