
Marina Krotofil
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i1]Benjamin Green, William Knowles, Marina Krotofil, Richard Derbyshire, Daniel Prince, N. Suri:
PCaaD: Towards Automated Determination and Exploitation of Industrial Processes. CoRR abs/2102.10049 (2021)
2010 – 2019
- 2019
- [p1]Marina Krotofil, Klaus Kursawe, Dieter Gollmann:
Securing Industrial Control Systems. Security and Privacy Trends in the Industrial Internet of Thing 2019: 3-27 - 2018
- [e1]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - 2017
- [c16]Alexander Winnicki, Marina Krotofil, Dieter Gollmann:
Cyber-Physical System Discovery: Reverse Engineering Physical Processes. CPSS@AsiaCCS 2017: 3-14 - [c15]Benjamin Green, Marina Krotofil, Ali Abbasi:
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. CPS-SPC@CCS 2017: 57-67 - 2016
- [c14]Dieter Gollmann, Marina Krotofil:
Cyber-Physical Systems Security. The New Codebreakers 2016: 195-204 - [c13]Benjamin Green, Marina Krotofil, David Hutchison
:
Achieving ICS Resilience and Security through Granular Data Flow Management. CPS-SPC@CCS 2016: 93-101 - [c12]Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman:
A Rising Tide: Design Exploits in Industrial Control Systems. WOOT 2016 - 2015
- [c11]Dieter Gollmann, Pavel Gurikov
, Alexander Isakov, Marina Krotofil, Jason Larsen, Alexander Winnicki:
Cyber-Physical Systems Security: Experimental Analysis of a Vinyl Acetate Monomer Plant. CPSS@ASIACSS 2015: 1-12 - [c10]Marina Krotofil, Jason Larsen, Dieter Gollmann:
The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems. AsiaCCS 2015: 133-144 - 2014
- [j2]Marina Krotofil, Alvaro A. Cárdenas, Jason Larsen, Dieter Gollmann:
Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks. Int. J. Crit. Infrastructure Prot. 7(4): 213-232 (2014) - [j1]Marina Krotofil:
Cyber Can Kill and Destroy Too: Blurring Borders Between Conventional and Cyber Warfare. Int. J. Cyber Warf. Terror. 4(3): 27-42 (2014) - [c9]Marina Krotofil, Alvaro A. Cárdenas, Bradley Manning, Jason Larsen:
CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals. ACSAC 2014: 146-155 - [c8]Marina Krotofil, Alvaro A. Cárdenas:
Is this a good time?: deciding when to launch attacks on process control systems. HiCoNS 2014: 65-66 - [c7]Antoine Lemay, Marina Krotofil, José M. Fernandez, Scott Knight:
Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape. ICS-CSR 2014 - [c6]Marina Krotofil, Alvaro A. Cárdenas, Kishore Angrishi:
Timing of Cyber-Physical Attacks on Process Control Systems. Critical Infrastructure Protection 2014: 29-45 - [c5]Marina Krotofil, Jason Larsen:
Are You Threatening My Hazards? IWSEC 2014: 17-32 - 2013
- [c4]Marina Krotofil, Dieter Gollmann:
Industrial control systems security: What is happening? INDIN 2013: 664-669 - [c3]Maryna Krotofil, Dieter Gollmann:
Industrial control systems security: What is happening? INDIN 2013: 670-675 - [c2]Marina Krotofil, Alvaro A. Cárdenas:
Resilience of Process Control Systems to Cyber-Physical Attacks. NordSec 2013: 166-182 - 2011
- [c1]Dieter Gollmann, Maryna Krotofil, Harald Sauff:
Rescuing Wireless Sensor Networks Security from Science Fiction. Networking Workshops 2011: 192-206
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-25 23:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint