Search dblp for Publications

export results for "toc:db/conf/icss2/icss2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icss2/0001MY17,
  author       = {Thiago Alves and
                  Thomas H. Morris and
                  Seong{-}Moo Yoo},
  title        = {Securing {SCADA} Applications Using OpenPLC With End-To-End Encryption},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174777},
  doi          = {10.1145/3174776.3174777},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icss2/0001MY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/ChiaKT17,
  author       = {Ming Hong Chia and
                  Sye Loong Keoh and
                  Zhaohui Tang},
  title        = {Secure Data Provenance in Home Energy Monitoring Networks},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174778},
  doi          = {10.1145/3174776.3174778},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/ChiaKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/Rrushi17,
  author       = {Julian L. Rrushi},
  title        = {Timing Performance Profiling of Substation Control Code for {IED}
                  Malware Detection},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {15--23},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174779},
  doi          = {10.1145/3174776.3174779},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/Rrushi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/TacliadNG17,
  author       = {Francisco Tacliad and
                  Thuy D. Nguyen and
                  Mark A. Gondree},
  title        = {DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {24--31},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174780},
  doi          = {10.1145/3174776.3174780},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/TacliadNG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2017,
  title        = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776},
  doi          = {10.1145/3174776},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics