On the use of watermark-based schemes to detect cyber-physical attacks. Rubio-Hernan, J., Cicco, L. D., & García, J. EURASIP J. Inf. Secur., 2017:8, 2017.
Paper doi bibtex @article{DBLP:journals/ejisec/Rubio-HernanCG17,
author = {Jose Rubio{-}Hernan and
Luca De Cicco and
Joaqu{\'{\i}}n Garc{\'{\i}}a},
title = {On the use of watermark-based schemes to detect cyber-physical attacks},
journal = {{EURASIP} J. Inf. Secur.},
volume = {2017},
pages = {8},
year = {2017},
url = {https://doi.org/10.1186/s13635-017-0060-9},
doi = {10.1186/s13635-017-0060-9},
timestamp = {Thu, 18 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ejisec/Rubio-HernanCG17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"t82iq8ij2ychiMAzP","bibbaseid":"rubiohernan-cicco-garca-ontheuseofwatermarkbasedschemestodetectcyberphysicalattacks-2017","authorIDs":[],"author_short":["Rubio-Hernan, J.","Cicco, L. D.","García, J."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Jose"],"propositions":[],"lastnames":["Rubio-Hernan"],"suffixes":[]},{"firstnames":["Luca","De"],"propositions":[],"lastnames":["Cicco"],"suffixes":[]},{"firstnames":["Joaquín"],"propositions":[],"lastnames":["García"],"suffixes":[]}],"title":"On the use of watermark-based schemes to detect cyber-physical attacks","journal":"EURASIP J. Inf. Secur.","volume":"2017","pages":"8","year":"2017","url":"https://doi.org/10.1186/s13635-017-0060-9","doi":"10.1186/s13635-017-0060-9","timestamp":"Thu, 18 Jun 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/ejisec/Rubio-HernanCG17.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ejisec/Rubio-HernanCG17,\n author = {Jose Rubio{-}Hernan and\n Luca De Cicco and\n Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a},\n title = {On the use of watermark-based schemes to detect cyber-physical attacks},\n journal = {{EURASIP} J. Inf. Secur.},\n volume = {2017},\n pages = {8},\n year = {2017},\n url = {https://doi.org/10.1186/s13635-017-0060-9},\n doi = {10.1186/s13635-017-0060-9},\n timestamp = {Thu, 18 Jun 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/ejisec/Rubio-HernanCG17.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Rubio-Hernan, J.","Cicco, L. D.","García, J."],"key":"DBLP:journals/ejisec/Rubio-HernanCG17","id":"DBLP:journals/ejisec/Rubio-HernanCG17","bibbaseid":"rubiohernan-cicco-garca-ontheuseofwatermarkbasedschemestodetectcyberphysicalattacks-2017","role":"author","urls":{"Paper":"https://doi.org/10.1186/s13635-017-0060-9"},"downloads":0},"bibtype":"article","biburl":"https://dblp.org/search/publ/api?format=bib&h=1000&q=author:José_R._Álvarez:|author:Margarita_Bachiller:|author:Margarita_Bachiller_Mayoral:|author:Enrique_J._Carmona:|author:José_Manuel_Cuadra_Troncoso:|author:José_Luis_Fernández-Vindel:|author:Carolina_Mañoso:|author:Rafael_Martínez-Tomás:|author:Félix_de_la_Paz:|author:Angel_Pérez_de_Madrid:|author:Mariano_Rincón:|author:Miguel_Romero_0003:|author:Miguel_Romero_Hortelano:","creationDate":"2020-09-24T15:30:19.964Z","downloads":0,"keywords":[],"search_terms":["use","watermark","based","schemes","detect","cyber","physical","attacks","rubio-hernan","cicco","garcía"],"title":"On the use of watermark-based schemes to detect cyber-physical attacks","year":2017,"dataSources":["jY3Qd7SvX7QP2zSXh"]}