-
1
-
-
84969210510
-
Compromising industrial facilities from 40 miles away
-
Nevada, USA, July
-
Apa, L. and Hollman, C. (2013) "Compromising Industrial Facilities from 40 Miles Away," Black Hat Conference, Nevada, USA, July.
-
(2013)
Black Hat Conference
-
-
Apa, L.1
Hollman, C.2
-
2
-
-
84951872109
-
Evaluating ITU-T G.9959 based wireless systems used in critical infrastructure assets
-
Shenoi, S. and Rice, M. Eds. Heidelberg, Germany: Springer International Publishing
-
Badenhop, C., Fuller, J., Hall, J., Ramsey, B., and Rice, M. (2015) "Evaluating ITU-T G.9959 Based Wireless Systems used in Critical Infrastructure Assets," in Critical Infrastructure Protection IX, Shenoi, S. and Rice, M. Eds. Heidelberg, Germany: Springer International Publishing, pp 209-227.
-
(2015)
Critical Infrastructure Protection IX
, pp. 209-227
-
-
Badenhop, C.1
Fuller, J.2
Hall, J.3
Ramsey, B.4
Rice, M.5
-
4
-
-
84962183588
-
Home invasion V2.0 - Attacking network-controlled hardware
-
Nevada, USA, July
-
Crowley, D., Bryan, D., and Savage, J. (2013) "Home Invasion V2.0 - Attacking Network-Controlled Hardware," Black Hat Conference, Nevada, USA, July.
-
(2013)
Black Hat Conference
-
-
Crowley, D.1
Bryan, D.2
Savage, J.3
-
5
-
-
84969186063
-
Security evaluation of the Z-wave wireless protocol
-
Nevada, USA, July
-
Fouladi, B. and Ghanoun, S. (2013) "Security Evaluation of the Z-Wave Wireless Protocol," Black Hat Conference, Nevada, USA, July.
-
(2013)
Black Hat Conference
-
-
Fouladi, B.1
Ghanoun, S.2
-
7
-
-
84863269702
-
Api-do: Tools for exploring the wireless attack surface in smart meters
-
January
-
Goodspeed, T., Bratus, S., Melgares, R., Speers, R., and Smith, W. (2012) "Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters," 45th Hawaii International Conference on System Sciences, January, pp 2133-2140.
-
(2012)
45th Hawaii International Conference on System Sciences
, pp. 2133-2140
-
-
Goodspeed, T.1
Bratus, S.2
Melgares, R.3
Speers, R.4
Smith, W.5
-
10
-
-
84931091579
-
Application of ensemble decision tree classifiers to ZigBee device network authentication using RF-DNA fingerprinting
-
March
-
Patel, H., Temple, M., Baldwin, R., and Ramsey, B. (2014) "Application of Ensemble Decision Tree Classifiers to ZigBee Device Network Authentication Using RF-DNA Fingerprinting," 9th International Conference on Cyber Warfare and Security, March, pp 176-186.
-
(2014)
9th International Conference on Cyber Warfare and Security
, pp. 176-186
-
-
Patel, H.1
Temple, M.2
Baldwin, R.3
Ramsey, B.4
-
11
-
-
84969265816
-
Bringing software defined radio to the penetration testing community
-
Nevada, USA, August
-
Picod, J., Lebrun, A., and Demay, J. (2014) "Bringing Software Defined Radio to the Penetration Testing Community," Black Hat Conference, Nevada, USA, August.
-
(2014)
Black Hat Conference
-
-
Picod, J.1
Lebrun, A.2
Demay, J.3
-
12
-
-
84993936186
-
Defensive rekeying strategies for physical-layer-monitored low-rate wireless personal area networks
-
J. Butts and S. Shenoi, Eds. Heidelberg, Germany: Springer, March
-
Ramsey, B. and Mullins, B. (2013) "Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks," Critical Infrastructure Protection VII, J. Butts and S. Shenoi, Eds. Heidelberg, Germany: Springer, March, pp 63-79.
-
(2013)
Critical Infrastructure Protection VII
, pp. 63-79
-
-
Ramsey, B.1
Mullins, B.2
-
14
-
-
84870338599
-
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
-
March
-
Reaves, B. and Morris, T. (2012) "Analysis and Mitigation of Vulnerabilities in Short-Range Wireless Communications for Industrial Control Systems," International Journal of Critical Infrastructure Protection, Vol 5, March, pp 154-174.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, pp. 154-174
-
-
Reaves, B.1
Morris, T.2
|