A Comparison of ICS Datasets for Security Research Based on Attack Paths. Choi, S., Yun, J., & Kim, S. In Luiijf, E. A. M., Zutautaite, I., & Hämmerli, B. M., editors, CRITIS, volume 11260, of Lecture Notes in Computer Science, pages 154-166, 2018. Springer. Link Paper bibtex @inproceedings{conf/critis/ChoiYK18,
added-at = {2019-01-03T00:00:00.000+0100},
author = {Choi, Seungoh and Yun, Jeong-Han and Kim, Sin-Kyu},
biburl = {https://www.bibsonomy.org/bibtex/2258e3acf2e7d2361a8ba979a79b4d775/dblp},
booktitle = {CRITIS},
crossref = {conf/critis/2018},
editor = {Luiijf, Eric A. M. and Zutautaite, Inga and Hämmerli, Bernhard M.},
ee = {https://doi.org/10.1007/978-3-030-05849-4_12},
interhash = {9c5a6aa307a83dd46b892ffa07a209e4},
intrahash = {258e3acf2e7d2361a8ba979a79b4d775},
isbn = {978-3-030-05849-4},
keywords = {dblp},
pages = {154-166},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-01-04T11:38:00.000+0100},
title = {A Comparison of ICS Datasets for Security Research Based on Attack Paths.},
url = {http://dblp.uni-trier.de/db/conf/critis/critis2018.html#ChoiYK18},
volume = 11260,
year = 2018
}
Downloads: 0
{"_id":"gJche7DTyqsMhiQwM","bibbaseid":"choi-yun-kim-acomparisonoficsdatasetsforsecurityresearchbasedonattackpaths-2018","downloads":0,"creationDate":"2019-02-01T01:48:29.043Z","title":"A Comparison of ICS Datasets for Security Research Based on Attack Paths.","author_short":["Choi, S.","Yun, J.","Kim, S."],"year":2018,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/kim?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2019-01-03T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Choi"],"firstnames":["Seungoh"],"suffixes":[]},{"propositions":[],"lastnames":["Yun"],"firstnames":["Jeong-Han"],"suffixes":[]},{"propositions":[],"lastnames":["Kim"],"firstnames":["Sin-Kyu"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2258e3acf2e7d2361a8ba979a79b4d775/dblp","booktitle":"CRITIS","crossref":"conf/critis/2018","editor":[{"propositions":[],"lastnames":["Luiijf"],"firstnames":["Eric","A.","M."],"suffixes":[]},{"propositions":[],"lastnames":["Zutautaite"],"firstnames":["Inga"],"suffixes":[]},{"propositions":[],"lastnames":["Hämmerli"],"firstnames":["Bernhard","M."],"suffixes":[]}],"ee":"https://doi.org/10.1007/978-3-030-05849-4_12","interhash":"9c5a6aa307a83dd46b892ffa07a209e4","intrahash":"258e3acf2e7d2361a8ba979a79b4d775","isbn":"978-3-030-05849-4","keywords":"dblp","pages":"154-166","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2019-01-04T11:38:00.000+0100","title":"A Comparison of ICS Datasets for Security Research Based on Attack Paths.","url":"http://dblp.uni-trier.de/db/conf/critis/critis2018.html#ChoiYK18","volume":"11260","year":"2018","bibtex":"@inproceedings{conf/critis/ChoiYK18,\n added-at = {2019-01-03T00:00:00.000+0100},\n author = {Choi, Seungoh and Yun, Jeong-Han and Kim, Sin-Kyu},\n biburl = {https://www.bibsonomy.org/bibtex/2258e3acf2e7d2361a8ba979a79b4d775/dblp},\n booktitle = {CRITIS},\n crossref = {conf/critis/2018},\n editor = {Luiijf, Eric A. M. and Zutautaite, Inga and Hämmerli, Bernhard M.},\n ee = {https://doi.org/10.1007/978-3-030-05849-4_12},\n interhash = {9c5a6aa307a83dd46b892ffa07a209e4},\n intrahash = {258e3acf2e7d2361a8ba979a79b4d775},\n isbn = {978-3-030-05849-4},\n keywords = {dblp},\n pages = {154-166},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2019-01-04T11:38:00.000+0100},\n title = {A Comparison of ICS Datasets for Security Research Based on Attack Paths.},\n url = {http://dblp.uni-trier.de/db/conf/critis/critis2018.html#ChoiYK18},\n volume = 11260,\n year = 2018\n}\n\n","author_short":["Choi, S.","Yun, J.","Kim, S."],"editor_short":["Luiijf, E. A. M.","Zutautaite, I.","Hämmerli, B. M."],"key":"conf/critis/ChoiYK18","id":"conf/critis/ChoiYK18","bibbaseid":"choi-yun-kim-acomparisonoficsdatasetsforsecurityresearchbasedonattackpaths-2018","role":"author","urls":{"Link":"https://doi.org/10.1007/978-3-030-05849-4_12","Paper":"http://dblp.uni-trier.de/db/conf/critis/critis2018.html#ChoiYK18"},"keyword":["dblp"],"downloads":0},"search_terms":["comparison","ics","datasets","security","research","based","attack","paths","choi","yun","kim"],"keywords":["dblp"],"authorIDs":[],"dataSources":["bboPFacHd3A4uT9fM"]}