Number of items: 7.
Conference or Workshop Item (A Paper)
Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Hallgren, Per and Tippenhauer, Nils Ole and Ochoa, Martín
(2018)
Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies.
Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Martín and Tippenhauer, Nils Ole
(2017)
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Castellanos, John Henry and Antonioli, Daniele and Tippenhauer, Nils Ole and Ochoa, Martín
(2017)
Legacy-Compliant Data Authentication for Industrial Control System Traffic.
Meidan, Yair and Bohadana, Michael and Shabtai, Asaf and Guarnizo, Juan-David and Ochoa, Martín and Tippenhauer, Nils Ole and Elovici, Yuval
(2017)
ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster).
Guarnizo, Juan and Tambe, Amit and Bunia, Suman Sankar and Ochoa, Martín and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2017)
SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Tippenhauer, Nils Ole and Ochoa, Martín and Mathur, Aditya
(2016)
Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures.
Article
Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Tippenhauer, Nils Ole and Ochoa, Martín
(2022)
Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 25 (2).
This list was generated on Thu Nov 21 13:16:29 2024 CET.