|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 51 publication records. Showing 51 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Hani Alturkostani, Anup Chitrakar, Robert Rinker, Axel W. Krings |
On the Design of Jamming-Aware Safety Applications in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 7:1-7:8, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xingsi Zhong, Paranietharan Arunagirinathan, Afshin Ahmadi, Richard R. Brooks, Ganesh Kumar Venayagamoorthy |
Side-Channels in Electric Power Synchrophasor Network Data Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 3:1-3:8, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael D. Iannacone, Shawn Bohn, Grant Nakamura, John Gerth, Kelly M. T. Huffer, Robert A. Bridges, Erik M. Ferragut, John R. Goodall |
Developing an Ontology for Cyber Security Knowledge Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 12:1-12:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald |
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 1:1-1:8, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Robinson-Mallett, Sebastian Hansack |
A Model of an Automotive Security Concept Phase. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 16:1-16:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Corinne L. Jones, Robert A. Bridges, Kelly M. T. Huffer, John R. Goodall |
Towards a Relation Extraction Framework for Cyber-Security Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 11:1-11:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dan Du, Lu Yu 0001, Richard R. Brooks |
Semantic Similarity Detection For Data Leak Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 4:1-4:6, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Susan M. Bridges, Ken Keiser, Nathan Sissom, Sara J. Graves |
Cyber Security for Additive Manufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 14:1-14:3, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lu Yu 0001, Juan Deng, Richard R. Brooks, SeokBae Yun |
Automobile ECU Design to Avoid Data Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 10:1-10:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yu Fu 0005, Benafsh Husain, Richard R. Brooks |
Analysis of Botnet Counter-Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 9:1-9:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joseph P. Trien, Stacy J. Prowell, Robert A. Bridges, John R. Goodall (eds.) |
Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![ACM, 978-1-4503-3345-0 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Zoleikha Abdollahi Biron, Pierluigi Pisu, Baisravan HomChaudhuri |
Observer Design Based Cyber Security for Cyber Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 6:1-6:6, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mark G. Pleszkoch, Rick Linger |
Controlling Combinatorial Complexity in Software and Malware Behavior Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 15:1-15:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher |
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 18:1-18:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Grandgenett, William R. Mahoney, Robin A. Gandhi |
Authentication Bypass and Remote Escalated I/O Command Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 2:1-2:7, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jarilyn M. Hernández, Aaron E. Ferber, Stacy J. Prowell, Lee M. Hively |
Phase-Space Detection of Cyber Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 13:1-13:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ashraf Hossain Sadi, Mohd. Hassan Ali, Dipankar Dasgupta, Robert K. Abercrombie |
OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 17:1-17:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Suzanna Schmeelk, Junfeng Yang, Alfred V. Aho |
Android Malware Static Analysis Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 5:1-5:8, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaewon Yang, Xiuwen Liu, Shamik Bose |
Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 8:1-8:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shaun-Inn Wu, Hieu Trong Ho |
Image enhanced CAPTCHA for web security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 29-32, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje |
Towards trust-based recommender systems for online software services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 61-64, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qian Chen 0019, Sherif Abdelwahed |
Towards realizing self-protecting SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 105-108, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sun-il Kim, William Edmonds, Nnamdi Nwanze |
On GPU accelerated tuning for a payload anomaly-based network intrusion detection scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 1-4, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | George Louthan, Michael Haney, Phoebe Hardwicke, Peter J. Hawrylak, John Hale |
Hybrid extensions for stateful attack graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 101-104, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | George Chin Jr., Sutanay Choudhury, John Feo, Lawrence B. Holder |
Predicting and detecting emerging cyberattack patterns using StreamWorks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 93-96, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Ponomarev, Nathan Wallace, Travis Atkison |
Detection of SSH host spoofing in control systems through network telemetry analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 21-24, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alaa Darabseh, Akbar Siami Namin |
The accuracy of user authentication through keystroke features using the most frequent words. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 85-88, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lakshmi Manohar Rao Velicheti, Dennis C. Feiock, Manjula Peiris, Rajeev R. Raje, James H. Hill |
Towards modeling the behavior of static code analysis tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 17-20, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohong Yuan, Emmanuel Borkor Nuakoh, Jodria S. Beal, Huiming Yu |
Retrieving relevant CAPEC attack patterns for secure software development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 33-36, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brian Lucas, Errin W. Fulp, David J. John, Daniel A. Cañas |
An initial framework for evolving computer configurations as a moving target defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 69-72, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Steven Noel, Sushil Jajodia |
Metrics suite for network attack graph analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 5-8, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Robinson-Mallett |
Coordinating security and safety engineering processes in automotive electronics development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 45-48, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili 0001, Frederick T. Sheldon |
Quantifying availability in SCADA environments using the cyber security metric MFC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 81-84, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Sherburne, Randy C. Marchany, Joseph G. Tront |
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 37-40, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Minzhe Guo, Prabir Bhattacharya |
Diverse virtual replicas for improving intrusion tolerance in cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 41-44, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Haney, Mauricio Papa |
A framework for the design and deployment of a SCADA honeynet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 121-124, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abhijit Kumar Nag, Dipankar Dasgupta |
An adaptive approach for continuous multi-factor authentication in an identity eco-system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 65-68, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Fazeen, Garima Bajwa, Ram Dantu |
Context-aware multimedia encryption in mobile platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 53-56, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhuang, Scott A. DeLoach, Xinming Ou |
A model for analyzing the effect of moving target defenses on enterprise networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 73-76, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liang Kong 0002, Gavin Bauer, John Hale |
Location-based device grouping for function restriction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 113-116, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bader Alwasel, Stephen D. Wolthusen |
Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 57-60, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lindsey N. Whitehurst, Todd R. Andel, Jeffrey Todd McDonald |
Exploring security in ZigBee networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 25-28, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Jeffrey Todd McDonald (eds.) |
Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![ACM, 978-1-4503-2812-8 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Ed Goff, Cliff Glantz, Rebecca Massello |
Cybersecurity procurement language for energy delivery systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 77-79, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nathan Wallace, Stanislav Ponomarev, Travis Atkison |
A dimensional transformation scheme for power grid cyber event detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 13-16, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall |
Integration of external data sources with cyber security data warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 49-52, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak |
Modeling and simulation of electric power substation employing an IEC 61850 network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 89-92, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder |
NICE: endpoint-based topology discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 97-100, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin |
Cyber-security analysis of smart grid SCADA systems with game models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 109-112, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Torrey |
MoRE: measurement of running executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 117-120, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jin Dong, Seddik M. Djouadi, James J. Nutaro, Phani Teja Kuruganti |
Secure control systems with application to cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 9-12, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #51 of 51 (100 per page; Change: )
|
|