default search action
CPSIOTSEC@CCS 2024: Salt Lake City, UT, USA
- Kassem Fawaz, Magnus Almgren:
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1244-9 - Alvaro A. Cárdenas:
Keynote: Physics and Security: Then and Now. 1 - Mohamed Ahzam Amanullah, Mohan Baruwal Chhetri, Seng W. Loke, Robin Doss:
IntelliMD: A Hybrid Approach for Local Misbehaviour Detection in Cooperative Intelligent Transport Systems. 2-13 - Andy Baldrian, Joseph Hallett:
RTFM: How Hard are IoT Platform Providers Making it for their Developers? 14-26 - Joseph Gardiner, Stanislav Abaimov, Jacob Williams, Feras Shahbi, Konstantinos Anastasakis, Partha Das Chowdhury, Winston Ellis, Maria Sameen, Emmanouil Samanis, Awais Rashid:
"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag Competitions. 27-40 - Michael P. Heinl, Victor Embacher:
BT2X: Multi-Leveled Binary Transparency to Protect the Software Supply Chain of Operational Technology. 41-54 - Davide Rusconi, Matteo Zoia, Luca Buccioli, Fabio Pierazzi, Danilo Bruschi, Lorenzo Cavallaro, Flavio Toffalini, Andrea Lanzi:
EmbedWatch: Fat Pointer Solution for Detecting Spatial Memory Errors in Embedded Systems. 55-67 - Luis E. Salazar, Efrén López-Morales, Juan Lozano, Carlos E. Rubio-Medrano, Alvaro A. Cárdenas:
ICSNet: A Hybrid-Interaction Honeynet for Industrial Control Systems. 68-79 - Jean Carlos Tonday Rodriguez, David Perry, Mohammad Ashiqur Rahman, Syed Bahauddin Alam:
An Intelligent Hierarchical Framework for Efficient Fault Detection and Diagnosis in Nuclear Power Plants. 80-92 - Muhammet Anil Yagiz, Pedram MohajerAnsari, Mert D. Pesé, Polat Goktas:
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI. 93-103 - Konstantinos Anastasakis, Awais Rashid:
Towards Linking Indicators of Compromise to Operational Resilience and Safety Requirements. 104-110 - Brennan Vanden Bos, Victor Calzada, Raghav Puri, Shrirang Mare:
Exploring Usability of Data Flow Visualizations in a Privacy-focused Smart Home Dashboard. 111-117 - Cihan Eryonucu, Panos Papadimitratos:
Detecting Mobile Crowdsensing Sybil Attackers via Presence Verification. 118-124 - Sibylle B. Fröschle, Martin Kubisch:
Three Taps for Secure Machine-to-Machine Communication: Towards High Assurance yet Fully Local Machine Pairing. 125-133 - Prathyusha Sagi, Arun Sankar, Utz Roedig:
Detection of Wake Word Jamming. 134-141 - Qingzhao Zhang, Z. Morley Mao:
Stealthy Data Fabrication in Collaborative Vehicular Perception. 142-149
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.