Search dblp for Publications

export results for "toc:db/conf/icss2/icss2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icss2/AoudiHOA19,
  author       = {Wissam Aoudi and
                  Albin Hellqvist and
                  Albert Overland and
                  Magnus Almgren},
  title        = {A Probe into Process-Level Attack Detection in Industrial Environments
                  from a Side-Channel Perspective},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372320},
  doi          = {10.1145/3372318.3372320},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/AoudiHOA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/ChekoleG19,
  author       = {Eyasu Getahun Chekole and
                  Huaqun Guo},
  title        = {{ICS-SEA:} Formally Modeling the Conflicting Design Constraints in
                  {ICS}},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {60--69},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372325},
  doi          = {10.1145/3372318.3372325},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/ChekoleG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/IrveneSFB19,
  author       = {Celine Irvene and
                  Tohid Shekari and
                  David Formby and
                  Raheem Beyah},
  title        = {If {I} Knew Then What {I} Know Now: On Reevaluating {DNP3} Security
                  using Power Substation Traffic},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {48--59},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372324},
  doi          = {10.1145/3372318.3372324},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/IrveneSFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/NguyenAI19,
  author       = {Thuy D. Nguyen and
                  Steve C. Austin and
                  Cynthia E. Irvine},
  title        = {A Strategy for Security Testing Industrial Firewalls},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372323},
  doi          = {10.1145/3372318.3372323},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/NguyenAI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/TouhiduzzamanHL19,
  author       = {Md Touhiduzzaman and
                  Adam Hahn and
                  Saeed Lotfifard},
  title        = {An Distributed Cyberattack Diagnosis Scheme for Malicious Protection
                  Operation based on {IEC} 61850},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372326},
  doi          = {10.1145/3372318.3372326},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/TouhiduzzamanHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/VenugopalAR19,
  author       = {Varsha Venugopal and
                  Jim Alves{-}Foss and
                  Sandeep Gogineni Ravindrababu},
  title        = {Use of an {SDN} Switch in Support of {NIST} {ICS} Security Recommendations
                  and Least Privilege Networking},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372321},
  doi          = {10.1145/3372318.3372321},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/VenugopalAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Zamiri-GourabiR19,
  author       = {Mohammad{-}Reza Zamiri{-}Gourabi and
                  Ali Razmjoo{-}Qalaei and
                  Babak Amin Azad},
  title        = {Gas what?: {I} can see your GasPots. Studying the fingerprintability
                  of {ICS} honeypots in the wild},
  booktitle    = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  pages        = {30--37},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318.3372322},
  doi          = {10.1145/3372318.3372322},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/Zamiri-GourabiR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2019,
  title        = {Proceedings of the Fifth Annual Industrial Control System Security
                  Workshop, {ICSS} 2019, San Juan, PR, USA, December 10, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3372318},
  doi          = {10.1145/3372318},
  isbn         = {978-1-4503-7719-5},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics