Filter your results
- 4
- 4
- 4
- 1
- 1
- 3
- 4
- 1
- 1
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.79-91, ⟨10.1007/978-3-662-45355-1_6⟩
Conference papers
hal-01386756v1
|
||
|
Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree7th International Conference on Computer and Computing Technologies in Agriculture (CCTA), Sep 2013, Beijing, China. pp.232-241, ⟨10.1007/978-3-642-54344-9_29⟩
Conference papers
hal-01220919v1
|
||
|
Industrial Control System Fingerprinting and Anomaly Detection9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.73-85, ⟨10.1007/978-3-319-26567-4_5⟩
Conference papers
hal-01431014v1
|
||
|
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.624-635, ⟨10.1007/978-3-662-45237-0_57⟩
Conference papers
hal-01405658v1
|