Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sgcrc/sgcrc2016.bht:"
@inproceedings{DBLP:conf/sgcrc/AdepuM16, author = {Sridhar Adepu and Aditya P. Mathur}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {59--74}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-59}, doi = {10.3233/978-1-61499-617-0-59}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/AdepuM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {107--114}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-107}, doi = {10.3233/978-1-61499-617-0-107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16, author = {John Henry Castellanos and Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Sandra Julieta Rueda}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {13--25}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-13}, doi = {10.3233/978-1-61499-617-0-13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/CastellanosWOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/DivakaranLT16, author = {Dinil Mon Divakaran and Yung Siang Liau and Vrizlynn L. L. Thing}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Accurate in-network file-type classification}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {139--146}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-139}, doi = {10.3233/978-1-61499-617-0-139}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/DivakaranLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/JunejoY16, author = {Khurum Nazir Junejo and David K. Y. Yau}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {43--57}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-43}, doi = {10.3233/978-1-61499-617-0-43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/JunejoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/MengHK16, author = {Weizhi Meng and Lee Wang Hao and S. P. T. Krishnan}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {99--106}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-99}, doi = {10.3233/978-1-61499-617-0-99}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/MengHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/RajR16, author = {Edward Jero Sam Jeeva Raj and Palaniappan Ramu}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {{ECG} Steganography Using Contourlet Transform For Transmission of Secured Patient Identity}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {131--138}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-131}, doi = {10.3233/978-1-61499-617-0-131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/RajR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/TaorminaGTSO16, author = {Riccardo Taormina and Stefano Galelli and Nils Ole Tippenhauer and Elad Salomons and Avi Ostfeld}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Simulation of Cyber-Physical Attacks on Water Distribution Systems with {EPANET}}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {123--130}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-123}, doi = {10.3233/978-1-61499-617-0-123}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/TaorminaGTSO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/TranDP16, author = {Ngoc Hieu Tran and Robert H. Deng and HweeHwa Pang}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Privacy-Preserving and Verifiable Data Aggregation}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {115--122}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-115}, doi = {10.3233/978-1-61499-617-0-115}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/TranDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/UrbinaGTC16, author = {David I. Urbina and Jairo Alonso Giraldo and Nils Ole Tippenhauer and Alvaro A. C{\'{a}}rdenas}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Attacking Fieldbus Communications in {ICS:} Applications to the SWaT Testbed}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {75--89}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-75}, doi = {10.3233/978-1-61499-617-0-75}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/UrbinaGTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/XuCZ16, author = {Jia Xu and Ee{-}Chien Chang and Jianying Zhou}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Directed Transitive Signature on Directed Tree}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {91--98}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-91}, doi = {10.3233/978-1-61499-617-0-91}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/XuCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/XuZL16, author = {Jia Xu and Jianying Zhou and Liming Lu}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Cyber and Physical Access Control in Legacy System Using Passwords}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {27--42}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-27}, doi = {10.3233/978-1-61499-617-0-27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/XuZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/ZhangGWT16, author = {Ying Zhang and Jonathan Goh and Lei Lei Win and Vrizlynn L. L. Thing}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Image Region Forgery Detection: {A} Deep Learning Approach}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {1--11}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-1}, doi = {10.3233/978-1-61499-617-0-1}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/ZhangGWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sgcrc/2016, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, publisher = {{IOS} Press}, year = {2016}, isbn = {978-1-61499-616-3}, timestamp = {Wed, 22 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.