|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 136 occurrences of 123 keywords
|
|
|
Results
Found 405 publication records. Showing 405 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Maria Teresa Baldassarre, Nicola Boffoli, Danilo Caivano, Giuseppe Visaggio |
Managing Software Process Improvement (SPI) through Statistical Process Control (SPC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES ![In: Product Focused Software Process Improvement, 5th International Conference, PROFES 2004, Kausai Science City, Japan, April 5-8, 2004, Proceedings, pp. 30-46, 2004, Springer, 3-540-21421-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
91 | Kai Guo, Yanhui Chen, Jiandong Li 0001 |
Multiple accumulated-crossover parallel concatenated SPC codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(5), pp. 894-898, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
parallel concatenated codes, single parity check codes, iterative decoding, low density parity check codes |
91 | Lei Shi 0022, Masamitsu Onishi, Kiyoshi Kobayashi |
A Public-Private-Partnership model with moral hazard of SPC and bank. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 1824-1829, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
84 | Danilo Caivano |
Continuous Software Process Improvement through Statistical Process Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 9th European Conference on Software Maintenance and Reengineering (CSMR 2005), 21-23 March 2005, Manchester, UK, Proceedings, pp. 288-293, 2005, IEEE Computer Society, 0-7695-2304-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
77 | K. U. Sargut, Onur Demirörs |
Utilization of statistical process control (SPC) in emergent software organizations: Pitfalls and suggestions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 14(2), pp. 135-157, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Rework percentage, Inspection performance, Statistical process control, Defect density, Control chart |
77 | Mutsumi Komuro |
Experiences of applying SPC techniques to software development processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, May 20-28, 2006, pp. 577-584, 2006, ACM, 1-59593-375-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
effect analysis, statistical analysis, peer review, statistical process control |
70 | Yuta Yoshiike, P. Ravindra S. De Silva, Michio Okada |
Cues for sociable PC: coordinate and synchronize its cues based on user attention and activities on display. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HRI ![In: Proceedings of the 5th ACM/IEEE International Conference on Human Robot Interaction, HRI 2010, Osaka, Japan, March 2-5, 2010, pp. 135-136, 2010, ACM, 978-1-4244-4893-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
sociable pc, social rapport, social cues |
70 | Nicola Boffoli, Giovanni Bruno, Danilo Caivano, Gemma Mastelloni |
Statistical process control for software: a systematic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, ESEM 2008, October 9-10, 2008, Kaiserslautern, Germany, pp. 327-329, 2008, ACM, 978-1-59593-971-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software process monitoring, statistical process control, six-sigma |
63 | Ziren Wang, Ronghua Liang |
Discuss on Applying SPC to Quality Management in University Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2372-2375, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Wen-Chih Chang, Hui-Huang Hsu, Timothy K. Shih, Liang-Yi Chung, Yu-Wen Yen |
Using SPC Table to Strengthen SCORM Compliant Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 825-830, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SP table, SPC table, e-learning, assessment, SCORM |
56 | Maria Teresa Baldassarre, Nicola Boffoli, Giovanni Bruno, Danilo Caivano |
Statistically Based Process Monitoring: Lessons from the Trench. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSP ![In: Trustworthy Software Development Processes, International Conference on Software Process, ICSP 2009 Vancouver, Canada, May 16-17, 2009 Proceedings, pp. 11-23, 2009, Springer, 978-3-642-01679-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Software Process Monitoring, Statistical Process Control |
56 | Edward F. Weller, David Card, Bill Curtis, Bob Raczynski |
Point/Counterpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 25(3), pp. 48-51, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | P. Santhi Thilagam, V. S. Ananthanarayana |
An Abstraction Based Communication Efficient Distributed Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Distributed Computing and Networking, 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008., pp. 251-256, 2008, Springer, 978-3-540-77443-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Sequence Pattern Count Tree, Doubly Logarithmic-depth Tree, Distributed databases, Association rule mining, Incremental mining |
56 | Chun Che Fung, Thitipong Nandhabiwat |
Comparing two off-the-shelf robots for the demonstration of Thai folk dances: an initial study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACE 2008, Yokohama, Japan, December 3-5, 2008, pp. 309-312, 2008, ACM, 978-1-60558-393-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Thai dance, dance robot, humanoid robot, entertainment robot |
56 | Jianhong Liang, Li Wen, Yuxiao Guo 0003 |
Experimental design and performance of underwater vehicle based on capacity of voyage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAM ![In: 2008 IEEE Conference on Robotics, Automation and Mechatronics, RAM 2008, 21-24 September 2008, Chengdu, China, pp. 587-591, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Yuehjen E. Shao, Chien-Ho Wu, Bin-Yih Ho, Bo-Sheng Hsu |
Integration of Multivariate Control Charts and Neural Networks to Determine the Faults of Quality Characteristic(s) in a Multivariate Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007, April 26-28, 2007, Melbourne, Australia, pp. 1028-1031, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Navendu Jain, Lisa Amini, Henrique Andrade, Richard King, Yoonho Park, Philippe Selo, Chitra Venkatramani |
Design, implementation, and evaluation of the linear road bnchmark on the stream processing core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Chicago, Illinois, USA, June 27-29, 2006, pp. 431-442, 2006, ACM, 1-59593-256-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bottleneck analysis, distributed stream processing systems, linear road, performance evaluation |
56 | Yuki Yoshikawa, Satoshi Ohtake, Michiko Inoue, Hideo Fujiwara |
Design for Testability Based on Single-Port-Change Delay Testing for Data Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 14th Asian Test Symposium (ATS 2005), 18-21 December 2005, Calcutta, India, pp. 254-259, 2005, IEEE Computer Society, 0-7695-2481-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur |
Monitoring the software test process using statistical process control: a logarithmic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC / SIGSOFT FSE ![In: Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, ESEC/FSE 2003, Helsinki, Finland, September 1-5, 2003, pp. 158-167, 2003, ACM, 978-1-58113-743-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
logarithmic approach, statistical process control, software test process |
55 | Yibing Li |
Research and Implement of Quality Management System in ERP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROLAMAT ![In: Knowledge Enterprise: Intelligent Strategies in Product Design, Manufacturing, and Management, Proceedings of PROLAMAT 2006, IFIP TC5 International Conference, June 15-17, 2006, Shanghai, China, pp. 570-575, 2006, Springer, 0-387-34402-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SPC, Enterprise Resource Planning, Quality Control, Quality Management |
54 | Jen-Fa Huang, Yao-Tang Chang |
Incoherent Hybrid Spectral Polarization and Amplitude Coding Implemented with Specified Orthogonal Ternary Code over Balanced Photo-Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 24-25 May 2006, Moncton, New Brunswick, Canada, pp. 42-52, 2006, IEEE Computer Society, 0-7695-2578-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Optical Code-Division Multiple-Access (OCDMA) Hybrid Spectral Polarization and amplitude Coding (Hybrid SPC/SAC), Polarization beam splitter (PBS), Phase-Induced Intensity Noise (PIIN), Fiber Bragg Gratings (FBGs) |
49 | T. T. Lee, Tie-Fei Liu, Pei-lin Mao, P. Wu, B. W. Lee, B. J. Ng, L. K. See |
An object-oriented automated SPC analysis and reporting system for powder manufacturing in the specialty chemical plants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: Seventh International Conference on Control, Automation, Robotics and Vision, ICARCV 2002, Singapore, 2-5 December 2002, Proceedings, pp. 1398-1401, 2002, IEEE, 981-04-8364-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke (eds.) |
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![Springer, 3-540-33376-2 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Sjouke Mauw, Ivo van Vessem, Bert Bos |
Forward Secure Communication in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 32-42, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki |
Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 165-180, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee 0001, Dowon Hong |
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 3-17, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multi-layer ad-hoc network, pervasive computing, heterogeneous, key agreement, Password authentication, authenticated key exchange |
44 | Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen |
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 73-88, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, embedded system, efficient implementation, motes, digital signature schemes, Multivariate public-key cryptosystem |
44 | Rafael Accorsi, Adolf Hohl |
Delegating Secure Logging in Pervasive Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 58-72, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Urs Hengartner, Peter Steenkiste |
Securing Information Gateways with Derivation-Constrained Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 181-195, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Jodie P. Boyer, Kaijun Tan, Carl A. Gunter |
Privacy Sensitive Location Information Systems in Smart Buildings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 149-164, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Siraj A. Shaikh, Christos K. Dimitriadis |
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 211-226, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Hongxia Jin |
Higher Dependability and Security for Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 89-103, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Gerald Eichler, Matthias O. Will |
Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 134-148, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Alexander Becher, Zinaida Benenson, Maximillian Dornseif |
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 104-118, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier |
Enabling Secure Discovery in a Pervasive Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 18-31, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Low Rate DoS Attack to Monoprocess Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 43-57, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Howard Chivers |
Trust Without Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 1-2, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Michael J. Covington, Manoj R. Sastry, Deepak J. Manohar |
Attribute-Based Authentication Model for Dynamic Mobile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 227-242, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Dieter Hutter, Melanie Volkamer |
Information Flow Control to Secure Dynamic Web Service Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 196-210, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Michael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright 0003 |
The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 119-133, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Dieter Hutter, Markus Ullmann (eds.) |
Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![Springer, 3-540-25521-4 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jaap-Henk Hoepman |
Ephemeral Pairing on Anonymous Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 101-116, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Christian Floerkemeier, Frédéric Thiesse |
EPC Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 117-118, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Adolf Hohl, Lutz Lowis, Alf Zugenmaier |
Look Who's Talking - Authenticating Service Access Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 151-162, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Sye Loong Keoh, Emil Lupu |
An Efficient Access Control Model for Mobile Ad-Hoc Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 210-224, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yang Liu 0029, John A. Clark, Susan Stepney |
"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 31-45, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security requirements, Ubiquitous systems, process patterns |
44 | Claudia Eckert 0001 |
Security Issues of Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 163, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Dennis Kügler |
Security Concept of the EU-Passport. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 85, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Ádám Darvas, Reiner Hähnle, David Sands 0001 |
A Theorem Proving Approach to Analysis of Secure Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 193-209, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Masayuki Terada, Kensaku Mori, Kazuhiko Ishii, Sadayuki Hongo, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura |
TENeT: A Framework for Distributed Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 3-17, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Florina Almenárez, Andrés Marín López, Celeste Campo, R. Carlos García |
TrustAC: Trust-Based Access Control for Pervasive Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 225-238, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Michael Hitchens, Judy Kay, Bob Kummerfeld, Ajay Brar |
Secure Identity Management for Pseudo-Anonymous Service Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 48-55, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won |
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 70-84, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, RFID system, Challenge-Response |
44 | Stefaan Seys, Bart Preneel |
Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 86-100, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Tobias Kölsch, Lothar Fritsch, Markulf Kohlweiss, Dogan Kesdogan |
Privacy for Profitable Location Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 164-178, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Lorenz M. Hilty |
Pervasive Computing - A Case for the Precautionary Principle? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 1-2, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin |
Exploiting Empirical Engagement in Authentication Protocol Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 119-133, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Michael Friedewald |
Safeguards in a World of Ambient Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 63-69, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Bertin Klein, Tristan Miller, Sandra Zilles |
Security Issues for Pervasive Personalized Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 56-62, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell |
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 134-150, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Masayuki Hanadate, Masayuki Terada, Shinji Nagao, Toshiyuki Miyazawa, Yukiko Yosuke, Seiji Tomita, Ko Fujimura |
P2P Digital Value Fair Trading System Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 18-30, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Panagiotis Papadimitratos |
Securing Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 46-47, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Marco Gruteser, Baik Hoh |
On the Anonymity of Periodic Location Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 179-192, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Lorenzo Cavallaro, Johannes Kinder, Thorsten Holz (eds.) |
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![ACM, 978-1-4503-6831-5 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Habeeb Olufowobi, Sena Hounsinou, Gedare Bloom |
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 63-73, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Stefano Longari, Matteo Penco, Michele Carminati, Stefano Zanero |
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 39-50, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Shai Cohen, Tomer Gluck, Yuval Elovici, Asaf Shabtai |
Security Analysis of Radar Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 3-14, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Luis E. Salazar, Alvaro A. Cárdenas |
Enhancing the Resiliency of Cyber-Physical Systems with Software-Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 15-26, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Sandro Etalle |
Network Monitoring of Industrial Control Systems: The Lessons of SecurityMatters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 1, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Pietro Ferretti, Marcello Pogliani, Stefano Zanero |
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 51-61, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Amir Herzberg, Yehonatan Kfir |
The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 87-98, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Jan Pennekamp, Martin Henze, Simo Schmidt, Philipp Niemietz, Marcel Fey, Daniel Trauth, Thomas Bergs, Christian Brecher, Klaus Wehrle |
Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 27-38, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Joseph Gardiner, Barnaby Craggs, Benjamin Green 0001, Awais Rashid |
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 75-86, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | Jingyi Zhang 0006, Anjia Yang, Qiao Hu, Gerhard P. Hancke 0002 |
Security Implications of Implementing Multistate Distance-Bounding Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019., pp. 99-108, 2019, ACM, 978-1-4503-6831-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
43 | David Lie, Mohammad Mannan (eds.) |
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![ACM, 978-1-4503-5992-4 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
43 | Peter Schneider 0002, Konstantin Böttinger |
High-Performance Unsupervised Anomaly Detection for Cyber-Physical System Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 1-12, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Chen Markman, Avishai Wool, Alvaro A. Cárdenas |
Temporal Phase Shifts in SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 84-89, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | |
Session details: Session 2: Intrusion and Anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
43 | |
Session details: Session 4: Industrial Control and SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
43 | Simon N. Foley, Fabien Autrel, Edwin Bourget, Thomas Clédel, Stephane Grunenwald, Jose Rubio-Hernan, Alexandre Kabil, Raphael Larsen, Vivien M. Rooney, Kirsten Vanhulst |
Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 102-107, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Vedanth Narayanan, Rakesh B. Bobba |
Learning Based Anomaly Detection for Industrial Arm Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 13-23, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Kiel Gordon, Matthew Davis, Zachary Birnbaum, Andrey M. Dolgikh |
ACE: Advanced CIP Evaluator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 90-101, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Matthias Eckhart, Andreas Ekelhart |
A Specification-based State Replication Approach for Digital Twins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 36-47, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 60-71, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Moshe Kravchik, Asaf Shabtai |
Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 72-83, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | |
Session details: Session 3: Security and Safety Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
43 | Ekta Aggarwal, Mehdi Karimibiuki, Karthik Pattabiraman, André Ivanov |
CORGIDS: A Correlation-based Generic Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 24-35, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Jed Liu, Joe Corbett-Davies, Andrew Ferraiuolo, Alexander Ivanov 0002, Mulong Luo, G. Edward Suh, Andrew C. Myers, Mark E. Campbell |
Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018, pp. 48-59, 2018, ACM, 978-1-4503-5992-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
43 | Edgar R. Weippl, Stefan Katzenbeisser 0001, Mathias Payer, Stefan Mangard, Alvaro A. Cárdenas, Rakesh B. Bobba (eds.) |
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![ACM, 978-1-4503-4568-2 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Prageeth Gunathilaka, Daisuke Mashima, Binbin Chen 0001 |
SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 113-124, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Yatin Wadhawan, Clifford Neuman |
Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 71-80, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Richard Baker 0008, Ivan Martinovic |
Secure Location Verification with a Mobile Receiver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 35-46, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Benjamin Green 0001, Marina Krotofil, David Hutchison 0001 |
Achieving ICS Resilience and Security through Granular Data Flow Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 93-101, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Antonio Lima, Francisco Rocha, Marcus Völp, Paulo Jorge Esteves Veríssimo |
Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 59-70, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Hamid Reza Ghaeini, Nils Ole Tippenhauer |
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 103-111, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Charalambos Konstantinou, Michail Maniatakos |
A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 81-92, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Daniele Antonioli, Anand Agrawal, Nils Ole Tippenhauer |
Towards High-Interaction Virtual ICS Honeypots-in-a-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 13-22, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Derrick Dominic, Sumeet Chhawri, Ryan M. Eustice, Di Ma, André Weimerskirch |
Risk Assessment for Cooperative Automated Driving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 47-58, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | Amit Kleinmann, Avishai Wool |
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 1-12, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
43 | William Jardine, Sylvain Frey, Benjamin Green 0001, Awais Rashid |
SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 23-34, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 405 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ >>] |
|