IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Secure Control: Towards Survivable Cyber-Physical Systems
ICDCSW '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
HSCC '09 Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Stealthy deception attacks on water SCADA systems
Proceedings of the 13th ACM international conference on Hybrid systems: computation and control
Secure control against replay attacks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Intrusion detection in SCADA networks
AIMS'10 Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security
Security interdependencies for networked control systems with identical agents
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
On dynamic malware payloads aimed at programmable logic controllers
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Using a high assurance TCB for infrastructure security
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Exploiting the critical infrastructure via nontraditional system inputs
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Consensus of multi-agent networks in the presence of adversaries using only local information
Proceedings of the 1st international conference on High Confidence Networked Systems
Attack models and scenarios for networked control systems
Proceedings of the 1st international conference on High Confidence Networked Systems
Anomaly detection in water management systems
Critical Infrastructure Protection
Security aspects of SCADA and DCS environments
Critical Infrastructure Protection
SABOT: specification-based payload generation for programmable logic controllers
Proceedings of the 2012 ACM conference on Computer and communications security
Security of interdependent and identical networked control systems
Automatica (Journal of IFAC)
Taxonomy for description of cross-domain attacks on CPS
Proceedings of the 2nd ACM international conference on High confidence networked systems
CPS: stateful policy enforcement for control system device usage
Proceedings of the 29th Annual Computer Security Applications Conference
Non-invasive spoofing attacks for anti-lock braking systems
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of generating such passwords, or memorizing a random-looking, machine-generated ...