Filter your results
- 29
- 10
- 1
- 28
- 12
- 40
- 1
- 7
- 5
- 5
- 8
- 4
- 4
- 3
- 3
- 40
- 1
- 12
- 12
- 7
- 6
- 6
- 6
- 5
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Vulnerability Assessment of InfiniBand Networking13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.179-205, ⟨10.1007/978-3-030-34647-8_10⟩
Conference papers
hal-03364575v1
|
||
|
An FPGA System for Detecting Malicious DNS Network Traffic7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.195-207, ⟨10.1007/978-3-642-24212-0_15⟩
Conference papers
hal-01569565v1
|
||
|
Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.25-44, ⟨10.1007/978-3-030-62840-6_2⟩
Conference papers
hal-03794636v1
|
||
|
Advances in Digital Forensics XIVSpringer International Publishing, AICT-532, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-99276-1. ⟨10.1007/978-3-319-99277-8⟩
Books
hal-01988831v1
|
||
Critical Infrastructure Protection IXAICT-466, 2015, Critical Infrastructure Protection IX, 978-3-319-26566-7. ⟨10.1007/978-3-319-26567-4⟩
Books
hal-01430961v1
|
|||
|
Generating honeypot traffic for industrial control systems11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.193-223, ⟨10.1007/978-3-319-70395-4_11⟩
Conference papers
hal-01819143v1
|
||
|
Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment10th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2016, Arlington, VA, United States. pp.3-25, ⟨10.1007/978-3-319-48737-3_1⟩
Conference papers
hal-01614858v1
|
||
|
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.245-261, ⟨10.1007/978-3-662-45355-1_16⟩
Conference papers
hal-01386769v1
|
||
|
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.137-156, ⟨10.1007/978-3-030-34647-8_8⟩
Conference papers
hal-03364560v1
|
||
|
Advances in Digital Forensics XVSpringer International Publishing, AICT-569, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-28751-1. ⟨10.1007/978-3-030-28752-8⟩
Books
hal-02534601v1
|
||
|
Critical Infrastructure Protection VIIISpringer, AICT-441, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-45354-4. ⟨10.1007/978-3-662-45355-1⟩
Books
hal-01386773v1
|
||
|
Automated Collection and Correlation of File Provenance Information13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.269-284, ⟨10.1007/978-3-319-67208-3_15⟩
Conference papers
hal-01716392v1
|
||
|
Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.81-90, ⟨10.1007/978-3-030-04537-1_5⟩
Conference papers
hal-02076301v1
|
||
|
Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.103-121, ⟨10.1007/978-3-030-34647-8_6⟩
Conference papers
hal-03364566v1
|
||
|
Securing bluetooth low energy locks from unauthorizedaccess and surveillance11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.319-338, ⟨10.1007/978-3-319-70395-4_16⟩
Conference papers
hal-01819142v1
|
||
|
Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.209-227, ⟨10.1007/978-3-319-26567-4_13⟩
Conference papers
hal-01431003v1
|
||
Critical Infrastructure Protection VSpringer, AICT-367, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-24864-1⟩
Books
hal-01571769v1
|
|||
|
Advances in Digital Forensics XIIISpringer International Publishing, AICT-511, 2017, IFIP Advances in Information and Communication Technology, 978-3-319-67207-6. ⟨10.1007/978-3-319-67208-3⟩
Books
hal-01716406v1
|
||
|
Advances in Digital Forensics XVIISpringer International Publishing, AICT-612, 2021, IFIP Advances in Information and Communication Technology, 978-3-030-88380-5. ⟨10.1007/978-3-030-88381-2⟩
Books
hal-03764367v1
|
||
|
Detecting Integrity Attacks on Industrial Control Systems8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.3-13, ⟨10.1007/978-3-662-45355-1_1⟩
Conference papers
hal-01386746v1
|
||
|
Advances in Digital Forensics XIISpringer International Publishing, AICT-484, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-46278-3. ⟨10.1007/978-3-319-46279-0⟩
Books
hal-01758686v1
|
||
|
Advances in Digital Forensics XVISpringer International Publishing, AICT-589, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-56223-6
Books
hal-03657590v1
|
||
|
Practical Application Layer Emulation in Industrial Control System Honeypots10th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2016, Arlington, VA, United States. pp.83-98, ⟨10.1007/978-3-319-48737-3_5⟩
Conference papers
hal-01614865v1
|
||
|
Multi-controller exercise environments for training industrial control system first responders11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.273-294, ⟨10.1007/978-3-319-70395-4_14⟩
Conference papers
hal-01819133v1
|
||
|
Defending building automation systems using decoy networks11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.297-317, ⟨10.1007/978-3-319-70395-4_15⟩
Conference papers
hal-01819134v1
|
||
|
Vehicle Identification and Route Reconstruction via TPMS Data Leakage13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.123-136, ⟨10.1007/978-3-030-34647-8_7⟩
Conference papers
hal-03364572v1
|
||
|
A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.204-217, ⟨10.1007/978-3-319-18467-8_14⟩
Conference papers
hal-01345109v1
|
||
Multi-channel Security Through Data Fragmentation14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.137-155, ⟨10.1007/978-3-030-62840-6_7⟩
Conference papers
hal-03794644v1
|
|||
|
Variable Speed Simulation for Accelerated Industrial Control System Cyber Training12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.283-306, ⟨10.1007/978-3-030-04537-1_15⟩
Conference papers
hal-02076304v1
|
||
|
Botnets as an Instrument of Warfare5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.19-28, ⟨10.1007/978-3-642-24864-1_2⟩
Conference papers
hal-01571771v1
|
- 1
- 2