![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
CPSIOTSEC@CCS 2020: Virtual Event, USA
- Michail Maniatakos, Yuqing Zhang:
CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8087-4 - Marina Krotofil:
Optimize Your Efforts: How to Tailor PhD Research to Real-World Needs - Industrial Perspective on Academic CPS/IoT Research. 1 - Luis E. Salazar, Neil Ortiz Silva, Xi Qin, Alvaro A. Cárdenas
:
Towards a High-Fidelity Network Emulation of IEC 104 SCADA Systems. 3-12 - Luca Maria Castiglione, Emil C. Lupu:
Hazard Driven Threat Modelling for Cyber Physical Systems. 13-24 - Federico Turrin
, Alessandro Erba, Nils Ole Tippenhauer
, Mauro Conti
:
A Statistical Analysis Framework for ICS Process Datasets. 25-30 - Anand Agrawal, Marios Sazos, Ahmed Al-Durra, Michail Maniatakos
:
Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining. 31-36 - Giovanni Salzillo
, Massimiliano Rak:
A (in)Secure-by-Design IoT Protocol: the ESP Touch Protocol and a Case Study Analysis from the Real Market. 37-48 - Richard J. Thomas
, Joseph Gardiner
, Tom Chothia, Emmanouil Samanis, Joshua Perrett, Awais Rashid
:
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures. 49-60 - Heng Zhang, Amiya Kumar Maji, Saurabh Bagchi:
Privacy in the Mobile World: An Analysis of Bluetooth Scan Traces. 61-65 - Joseph Gardiner
, Awais Rashid:
DEMO: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs. 67 - Juan Ospina
, Ioannis Zografopoulos
, Xiaorui Liu, Charalambos Konstantinou
:
DEMO: Trustworthy Cyberphysical Energy Systems: Time-Delay Attacks in a Real-Time Co-Simulation Environment. 69 - Pooria Madani
, Natalija Vlajic, Shadi Sadeghpour
:
MAC-Layer Spoofing Detection and Prevention in IoT Systems: Randomized Moving Target Approach. 71-80 - Sunandan Adhikary, Ipsita Koley, Saurav Kumar Ghosh, Sumana Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions. 81-86 - Batyr Charyyev, Mehmet Hadi Gunes:
Voice Command Fingerprinting with Locality Sensitive Hashes. 87-92
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.