Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting. Gonzalez, C. A. & Hinton, A. In Critical Infrastructure Protection VIII - 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers, pages 15--27, 2014.
Paper doi bibtex @inproceedings{DBLP:conf/ifip11-10/GonzalezH14,
author = {Carlos Aguayo Gonzalez and
Alan Hinton},
title = {Detecting Malicious Software Execution in Programmable Logic Controllers
Using Power Fingerprinting},
booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10
International Conference, {ICCIP} 2014, Arlington, VA, USA, March
17-19, 2014, Revised Selected Papers},
pages = {15--27},
year = {2014},
crossref = {DBLP:conf/ifip11-10/2014},
url = {http://dx.doi.org/10.1007/978-3-662-45355-1_2},
doi = {10.1007/978-3-662-45355-1_2},
timestamp = {Mon, 13 Oct 2014 14:22:43 +0200},
biburl = {http://dblp.dagstuhl.de/rec/bib/conf/ifip11-10/GonzalezH14},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"jYGBm6JRGsNjoivGq","bibbaseid":"gonzalez-hinton-detectingmalicioussoftwareexecutioninprogrammablelogiccontrollersusingpowerfingerprinting-2014","downloads":0,"creationDate":"2016-10-26T08:43:42.879Z","title":"Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting","author_short":["Gonzalez, C. A.","Hinton, A."],"year":2014,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/h/Hinton:Alan","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Carlos","Aguayo"],"propositions":[],"lastnames":["Gonzalez"],"suffixes":[]},{"firstnames":["Alan"],"propositions":[],"lastnames":["Hinton"],"suffixes":[]}],"title":"Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting","booktitle":"Critical Infrastructure Protection VIII - 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers","pages":"15--27","year":"2014","crossref":"DBLP:conf/ifip11-10/2014","url":"http://dx.doi.org/10.1007/978-3-662-45355-1_2","doi":"10.1007/978-3-662-45355-1_2","timestamp":"Mon, 13 Oct 2014 14:22:43 +0200","biburl":"http://dblp.dagstuhl.de/rec/bib/conf/ifip11-10/GonzalezH14","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/ifip11-10/GonzalezH14,\n author = {Carlos Aguayo Gonzalez and\n Alan Hinton},\n title = {Detecting Malicious Software Execution in Programmable Logic Controllers\n Using Power Fingerprinting},\n booktitle = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10\n International Conference, {ICCIP} 2014, Arlington, VA, USA, March\n 17-19, 2014, Revised Selected Papers},\n pages = {15--27},\n year = {2014},\n crossref = {DBLP:conf/ifip11-10/2014},\n url = {http://dx.doi.org/10.1007/978-3-662-45355-1_2},\n doi = {10.1007/978-3-662-45355-1_2},\n timestamp = {Mon, 13 Oct 2014 14:22:43 +0200},\n biburl = {http://dblp.dagstuhl.de/rec/bib/conf/ifip11-10/GonzalezH14},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Gonzalez, C. A.","Hinton, A."],"key":"DBLP:conf/ifip11-10/GonzalezH14","id":"DBLP:conf/ifip11-10/GonzalezH14","bibbaseid":"gonzalez-hinton-detectingmalicioussoftwareexecutioninprogrammablelogiccontrollersusingpowerfingerprinting-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-662-45355-1_2"},"downloads":0},"search_terms":["detecting","malicious","software","execution","programmable","logic","controllers","using","power","fingerprinting","gonzalez","hinton"],"keywords":[],"authorIDs":[],"dataSources":["Ex5tuh4hgyu5RWemD"]}