Search dblp for Publications

export results for "toc:db/conf/sgcrc/sgcrc2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sgcrc/AdepuM16,
  author       = {Sridhar Adepu and
                  Aditya P. Mathur},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent
                  Control Actions},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {59--74},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-59},
  doi          = {10.3233/978-1-61499-617-0-59},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/AdepuM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Telephone-based social engineering attacks: An experiment testing
                  the success and time decay of an intervention},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {107--114},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-107},
  doi          = {10.3233/978-1-61499-617-0-107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16,
  author       = {John Henry Castellanos and
                  Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Sandra Julieta Rueda},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {13--25},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-13},
  doi          = {10.3233/978-1-61499-617-0-13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/CastellanosWOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/DivakaranLT16,
  author       = {Dinil Mon Divakaran and
                  Yung Siang Liau and
                  Vrizlynn L. L. Thing},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Accurate in-network file-type classification},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {139--146},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-139},
  doi          = {10.3233/978-1-61499-617-0-139},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/DivakaranLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/JunejoY16,
  author       = {Khurum Nazir Junejo and
                  David K. Y. Yau},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Data Driven Physical Modelling For Intrusion Detection In Cyber Physical
                  Systems},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {43--57},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-43},
  doi          = {10.3233/978-1-61499-617-0-43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/JunejoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/MengHK16,
  author       = {Weizhi Meng and
                  Lee Wang Hao and
                  S. P. T. Krishnan},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {A Framework for Large-Scale Collection of Information from Smartphone
                  Users based on Juice Filming Attacks},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {99--106},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-99},
  doi          = {10.3233/978-1-61499-617-0-99},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/MengHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/RajR16,
  author       = {Edward Jero Sam Jeeva Raj and
                  Palaniappan Ramu},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {{ECG} Steganography Using Contourlet Transform For Transmission of
                  Secured Patient Identity},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {131--138},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-131},
  doi          = {10.3233/978-1-61499-617-0-131},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/RajR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/TaorminaGTSO16,
  author       = {Riccardo Taormina and
                  Stefano Galelli and
                  Nils Ole Tippenhauer and
                  Elad Salomons and
                  Avi Ostfeld},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Simulation of Cyber-Physical Attacks on Water Distribution Systems
                  with {EPANET}},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {123--130},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-123},
  doi          = {10.3233/978-1-61499-617-0-123},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/TaorminaGTSO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/TranDP16,
  author       = {Ngoc Hieu Tran and
                  Robert H. Deng and
                  HweeHwa Pang},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Privacy-Preserving and Verifiable Data Aggregation},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {115--122},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-115},
  doi          = {10.3233/978-1-61499-617-0-115},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/TranDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/UrbinaGTC16,
  author       = {David I. Urbina and
                  Jairo Alonso Giraldo and
                  Nils Ole Tippenhauer and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Attacking Fieldbus Communications in {ICS:} Applications to the SWaT
                  Testbed},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {75--89},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-75},
  doi          = {10.3233/978-1-61499-617-0-75},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/UrbinaGTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/XuCZ16,
  author       = {Jia Xu and
                  Ee{-}Chien Chang and
                  Jianying Zhou},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Directed Transitive Signature on Directed Tree},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {91--98},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-91},
  doi          = {10.3233/978-1-61499-617-0-91},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/XuCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/XuZL16,
  author       = {Jia Xu and
                  Jianying Zhou and
                  Liming Lu},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Cyber and Physical Access Control in Legacy System Using Passwords},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {27--42},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-27},
  doi          = {10.3233/978-1-61499-617-0-27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/XuZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/ZhangGWT16,
  author       = {Ying Zhang and
                  Jonathan Goh and
                  Lei Lei Win and
                  Vrizlynn L. L. Thing},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Image Region Forgery Detection: {A} Deep Learning Approach},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {1--11},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-1},
  doi          = {10.3233/978-1-61499-617-0-1},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/ZhangGWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sgcrc/2016,
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  publisher    = {{IOS} Press},
  year         = {2016},
  isbn         = {978-1-61499-616-3},
  timestamp    = {Wed, 22 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics