Filter your results
- 31
- 10
- 1
- 30
- 12
- 42
- 1
- 7
- 5
- 5
- 8
- 4
- 4
- 3
- 4
- 1
- 42
- 3
- 12
- 12
- 7
- 6
- 6
- 6
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
42 results
|
|
sorted by
|
|
Detecting Integrity Attacks on Industrial Control Systems8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.3-13, ⟨10.1007/978-3-662-45355-1_1⟩
Conference papers
hal-01386746v1
|
||
|
Advances in Digital Forensics XIISpringer International Publishing, AICT-484, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-46278-3. ⟨10.1007/978-3-319-46279-0⟩
Books
hal-01758686v1
|
||
|
Advances in Digital Forensics XVISpringer International Publishing, AICT-589, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-56223-6
Books
hal-03657590v1
|
||
Critical Infrastructure Protection IXAICT-466, 2015, Critical Infrastructure Protection IX, 978-3-319-26566-7. ⟨10.1007/978-3-319-26567-4⟩
Books
hal-01430961v1
|
|||
|
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.245-261, ⟨10.1007/978-3-662-45355-1_16⟩
Conference papers
hal-01386769v1
|
||
|
Generating honeypot traffic for industrial control systems11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.193-223, ⟨10.1007/978-3-319-70395-4_11⟩
Conference papers
hal-01819143v1
|
||
|
Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment10th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2016, Arlington, VA, United States. pp.3-25, ⟨10.1007/978-3-319-48737-3_1⟩
Conference papers
hal-01614858v1
|
||
|
Vulnerability Assessment of InfiniBand Networking13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.179-205, ⟨10.1007/978-3-030-34647-8_10⟩
Conference papers
hal-03364575v1
|
||
|
Evaluating Digital Forensic Options for the Apple iPad7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.257-273, ⟨10.1007/978-3-642-24212-0_20⟩
Conference papers
hal-01569561v1
|
||
|
An FPGA System for Detecting Malicious DNS Network Traffic7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.195-207, ⟨10.1007/978-3-642-24212-0_15⟩
Conference papers
hal-01569565v1
|
||
|
Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.25-44, ⟨10.1007/978-3-030-62840-6_2⟩
Conference papers
hal-03794636v1
|
||
|
Advances in Digital Forensics XIVSpringer International Publishing, AICT-532, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-99276-1. ⟨10.1007/978-3-319-99277-8⟩
Books
hal-01988831v1
|
||
|
Botnets as an Instrument of Warfare5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.19-28, ⟨10.1007/978-3-642-24864-1_2⟩
Conference papers
hal-01571771v1
|
||
|
Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.111-133, ⟨10.1007/978-3-030-62840-6_6⟩
Conference papers
hal-03794637v1
|
||
|
Critical Infrastructure Protection XISpringer International Publishing, AICT-512, 2017, IFIP Advances in Information and Communication Technology, 978-3-319-70394-7. ⟨10.1007/978-3-319-70395-4⟩
Books
hal-01819132v1
|
||
|
Reversing a Lattice ECP3 FPGA for Bitstream Protection12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.91-111, ⟨10.1007/978-3-030-04537-1_6⟩
Conference papers
hal-02076310v1
|
||
|
Interactive Temporal Digital Forensic Event Analysis16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.39-55, ⟨10.1007/978-3-030-56223-6_3⟩
Conference papers
hal-03657234v1
|
||
|
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.137-156, ⟨10.1007/978-3-030-34647-8_8⟩
Conference papers
hal-03364560v1
|
||
|
Advances in Digital Forensics XVSpringer International Publishing, AICT-569, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-28751-1. ⟨10.1007/978-3-030-28752-8⟩
Books
hal-02534601v1
|
||
|
Critical Infrastructure Protection VIIISpringer, AICT-441, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-45354-4. ⟨10.1007/978-3-662-45355-1⟩
Books
hal-01386773v1
|
||
|
Automated Collection and Correlation of File Provenance Information13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.269-284, ⟨10.1007/978-3-319-67208-3_15⟩
Conference papers
hal-01716392v1
|
||
|
Categorization of cyber training environments for industrial control systems11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.243-271, ⟨10.1007/978-3-319-70395-4_13⟩
Conference papers
hal-01819131v1
|
||
|
Advances in Digital Forensics XISpringer, AICT-462, 2015, Advances in Digital Forensics XI, 978-3-319-24122-7. ⟨10.1007/978-3-319-24123-4⟩
Books
hal-01449076v1
|
||
Critical Infrastructure Protection XAICT-485, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-48736-6. ⟨10.1007/978-3-319-48737-3⟩
Books
hal-01614866v1
|
|||
|
A Compiled Memory Analysis Tool6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.195-204, ⟨10.1007/978-3-642-15506-2_14⟩
Conference papers
hal-01060619v1
|
||
|
Assessing the Cyber Risk of Small Unmanned Aerial Vehicles14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.45-67, ⟨10.1007/978-3-030-62840-6_3⟩
Conference papers
hal-03794626v1
|
||
|
Securing an InfiniBand Network and its Effect on Performance14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.157-179, ⟨10.1007/978-3-030-62840-6_8⟩
Conference papers
hal-03794633v1
|
||
|
Persistent Human Control in a Reservation-Based Autonomous Intersection Protocol12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.197-212, ⟨10.1007/978-3-030-04537-1_11⟩
Conference papers
hal-02076295v1
|
||
Critical Infrastructure Protection VSpringer, AICT-367, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-24864-1⟩
Books
hal-01571769v1
|
|||
|
Advances in Digital Forensics XIIISpringer International Publishing, AICT-511, 2017, IFIP Advances in Information and Communication Technology, 978-3-319-67207-6. ⟨10.1007/978-3-319-67208-3⟩
Books
hal-01716406v1
|
- 1
- 2