Search dblp for Publications

export results for "stream:streams/conf/wcicss:"

 download as .bib file

@inproceedings{DBLP:conf/wcicss/GhalebZA16,
  author       = {Asem Ghaleb and
                  Sami Zhioua and
                  Ahmad Almulhem},
  title        = {{SCADA-SST:} a {SCADA} security testbed},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {34--39},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882610},
  doi          = {10.1109/WCICSS.2016.7882610},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/GhalebZA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Kim16,
  author       = {Charles Kim},
  title        = {Cyber-resilient industrial control system with diversified architecture
                  and bus monitoring},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {10--15},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882940},
  doi          = {10.1109/WCICSS.2016.7882940},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Kim16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Lam16,
  author       = {C. Y. Lam},
  title        = {Resilience of logistics network: analysis and design},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {62--66},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882936},
  doi          = {10.1109/WCICSS.2016.7882936},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Lam16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/MahonyMPRW16,
  author       = {Niall O' Mahony and
                  Trevor Murphy and
                  Krishna Panduru and
                  Daniel Riordan and
                  Joseph Walsh},
  title        = {Machine learning algorithms for process analytical technology},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {20--26},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882607},
  doi          = {10.1109/WCICSS.2016.7882607},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/MahonyMPRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/OConnorW16,
  author       = {Ed O'Connor and
                  Joseph Walsh},
  title        = {Analysis of carbon displacement possibilities from conversion of existing
                  fossil fuel driven domestic heating systems to biomass driven domestic
                  heating system},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {53--55},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882934},
  doi          = {10.1109/WCICSS.2016.7882934},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/OConnorW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/RahmanSAA16,
  author       = {Muhammad Zia Ur Rahman and
                  Inam Ul Hassan Shaikh and
                  Ahsan Ali and
                  Nasir Ahmad},
  title        = {Fixed structure H{\(\alpha\)} control of couple tank system and anti-integral
                  windup {PID} control strategy for actuator saturation},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {27--32},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882608},
  doi          = {10.1109/WCICSS.2016.7882608},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/RahmanSAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/ValluriN16,
  author       = {Maheswara Rao Valluri and
                  Shailendra Vikash Narayan},
  title        = {Quaternion public key cryptosystems},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {48--51},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882612},
  doi          = {10.1109/WCICSS.2016.7882612},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/ValluriN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/WardakZA16,
  author       = {Haroon Wardak and
                  Sami Zhioua and
                  Ahmad Almulhem},
  title        = {{PLC} access control: a security analysis},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {56--61},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882935},
  doi          = {10.1109/WCICSS.2016.7882935},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/WardakZA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/YaseenB16,
  author       = {Amer Atta Yaseen and
                  Mireille Bayart},
  title        = {Towards distinguishing between faults and cyber-attacks in the networked
                  control system},
  booktitle    = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WCICSS.2016.7882611},
  doi          = {10.1109/WCICSS.2016.7882611},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/YaseenB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcicss/2016,
  title        = {2016 World Congress on Industrial Control Systems Security, {WCICSS}
                  2016, London, United Kingdom, December 12-14, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7881935/proceeding},
  isbn         = {978-1-9083-2063-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/AbeSSNS15,
  author       = {Rie Abe and
                  Toshiyuki Satoh and
                  Naoki Saito and
                  Jun{-}Ya Nagase and
                  Norihiko Saga},
  title        = {Disturbance observer-based model predictive control using time-varying
                  constraints},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {26--27},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420318},
  doi          = {10.1109/WCICSS.2015.7420318},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/AbeSSNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Al-Fedaghi15,
  author       = {Sabah Al{-}Fedaghi},
  title        = {Security as a flow machine},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420329},
  doi          = {10.1109/WCICSS.2015.7420329},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Al-Fedaghi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Blanch-TorneCC15,
  author       = {Sergi Blanch{-}Torne and
                  Fernando Cores and
                  Ramiro Moreno Chiral},
  title        = {Agent-based {PKI} for Distributed Control System},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {28--35},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420319},
  doi          = {10.1109/WCICSS.2015.7420319},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Blanch-TorneCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/CalderwoodMLH15,
  author       = {Sarah Calderwood and
                  Kevin McAreavey and
                  Weiru Liu and
                  Jun Hong},
  title        = {Contextual merging of uncertain information for better informed plan
                  selection in {BDI} systems},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {64--65},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420326},
  doi          = {10.1109/WCICSS.2015.7420326},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/CalderwoodMLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Chetto15,
  author       = {Maryline Chetto},
  title        = {Keynote speaker 5},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {14},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420312},
  doi          = {10.1109/WCICSS.2015.7420312},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/Chetto15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/GaoLT15,
  author       = {Wenchao Gao and
                  Wenyu Liang and
                  Kok Kiong Tan},
  title        = {Kalman filter based vision-servoing alignment system for human ear
                  surgery},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {83--88},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420331},
  doi          = {10.1109/WCICSS.2015.7420331},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/GaoLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Geels15,
  author       = {Frank W. Geels},
  title        = {Keynote speaker 4},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {13},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420311},
  doi          = {10.1109/WCICSS.2015.7420311},
  timestamp    = {Sat, 28 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/Geels15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/HaraSSNS15,
  author       = {Hiroki Hara and
                  Toshiyuki Satoh and
                  Naoki Saito and
                  Jun{-}Ya Nagase and
                  Norihiko Saga},
  title        = {Disturbance observer-based predictive functional control using zero
                  phase error tracking controller},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {19--20},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420316},
  doi          = {10.1109/WCICSS.2015.7420316},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/HaraSSNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/HosicLH15,
  author       = {Jasenko Hosic and
                  Jereme Lamps and
                  Derek H. Hart},
  title        = {Evolving decision trees to detect anomalies in recurrent {ICS} networks},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {50--57},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420323},
  doi          = {10.1109/WCICSS.2015.7420323},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/HosicLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/KatamZG15,
  author       = {Shireesha Katam and
                  Pavol Zavarsky and
                  Francis Gichohi},
  title        = {Applicability of Domain Based Security risk modeling to {SCADA} systems},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {66--69},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420327},
  doi          = {10.1109/WCICSS.2015.7420327},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/KatamZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/KusumoputroR15,
  author       = {Benyamin Kusumoputro and
                  Muhammad Rif'an},
  title        = {Performance characteristics of an improved single neuron {PID} controller
                  using additional error of an inversed control signal},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {58--62},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420324},
  doi          = {10.1109/WCICSS.2015.7420324},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/KusumoputroR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/LemaireVN15,
  author       = {Laurens Lemaire and
                  Jan Vossaert and
                  Vincent Naessens},
  title        = {Secure remote access to an industrial generator with mobile devices},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420328},
  doi          = {10.1109/WCICSS.2015.7420328},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/LemaireVN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Olmsted15,
  author       = {Aspen Olmsted},
  title        = {Keynote speaker 3},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {12},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420310},
  doi          = {10.1109/WCICSS.2015.7420310},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Olmsted15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Rattawut15,
  author       = {Rattawut Vongvit},
  title        = {Integration of Fuzzy-QFD and {AHP} base on a fuzzy scale for mini-CNC
                  milling machine retrofit},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {89--94},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420332},
  doi          = {10.1109/WCICSS.2015.7420332},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcicss/Rattawut15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/ShangLWZ15,
  author       = {Wenli Shang and
                  Lin Li and
                  Ming Wan and
                  Peng Zeng},
  title        = {Industrial communication intrusion detection algorithm based on improved
                  one-class {SVM}},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {21--25},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420317},
  doi          = {10.1109/WCICSS.2015.7420317},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/ShangLWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Shoniregun15,
  author       = {Charles A. Shoniregun},
  title        = {PhD and Doctorate Consortium},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {15--16},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420313},
  doi          = {10.1109/WCICSS.2015.7420313},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Shoniregun15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/TaylorJL15,
  author       = {Adrian Taylor and
                  Nathalie Japkowicz and
                  Sylvain P. Leblanc},
  title        = {Frequency-based anomaly detection for the automotive {CAN} bus},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {45--49},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420322},
  doi          = {10.1109/WCICSS.2015.7420322},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/TaylorJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Valluri15,
  author       = {Maheswara Rao Valluri},
  title        = {An identification protocol based on the twisted ring-root extraction
                  problem},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {95--97},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420333},
  doi          = {10.1109/WCICSS.2015.7420333},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Valluri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Visser15,
  author       = {Martin Visser},
  title        = {Keynote speaker 2},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {10--11},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420309},
  doi          = {10.1109/WCICSS.2015.7420309},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Visser15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Wang15,
  author       = {Frank Z. Wang},
  title        = {Keynote speaker 1},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420308},
  doi          = {10.1109/WCICSS.2015.7420308},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Wang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/Warwick15,
  author       = {Kevin Warwick},
  title        = {Distinguished keynote speaker},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420307},
  doi          = {10.1109/WCICSS.2015.7420307},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/Warwick15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcicss/YaseenB15,
  author       = {Amer Atta Yaseen and
                  Mireille Bayart},
  title        = {Attack-Tolerant networked control system based on the deception for
                  the cyber-attacks},
  booktitle    = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  pages        = {37--44},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCICSS.2015.7420321},
  doi          = {10.1109/WCICSS.2015.7420321},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/YaseenB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcicss/2015,
  title        = {2015 World Congress on Industrial Control Systems Security, {WCICSS}
                  2015, London, United Kingdom, December 14-16, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7410924/proceeding},
  isbn         = {978-1-9083-2058-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcicss/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics