Filter your results
- 5
- 5
- 5
- 2
- 1
- 2
- 5
- 1
- 4
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.31-46, ⟨10.1007/978-3-642-24864-1_3⟩
Conference papers
hal-01571779v1
|
||
|
CipherCard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.436-454, ⟨10.1007/978-3-319-22668-2_34⟩
Conference papers
hal-01599857v1
|
||
|
Converting an Electric Power Utility Network to Defend Against Crafted Inputs13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.73-85, ⟨10.1007/978-3-030-34647-8_4⟩
Conference papers
hal-03364559v1
|
||
|
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.235-252, ⟨10.1007/978-3-030-34647-8_12⟩
Conference papers
hal-03364571v1
|
||
|
Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.57-72, ⟨10.1007/978-3-642-24864-1_5⟩
Conference papers
hal-01571775v1
|