CORE
CO
nnecting
RE
positories
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Research partnership
About
About
About us
Our mission
Team
Blog
FAQs
Contact us
Community governance
Governance
Advisory Board
Board of supporters
Research network
Innovations
Our research
Labs
Filters
2 research outputs found
Detecting replay attacks against industrial robots via power fingerprinting
Author
Basseville Michèle
Bayens Christian
+14 more
Case Defense Use
Cerrudo Cesar
Chattopadhyay Rita
Chung Keywhan
Clark Shane S
Eisenbarth Thomas
Falliere Nicolas
Gujarati Damodar N
Hamilton Benjamin R
Montgomery Douglas C
Munawar Asim
Saeed BN
Sharp Michael
Siciliano Bruno
Publication venue
'Association for Computing Machinery (ACM)'
Publication date
Field of study
No full text
Crossref
SAMIIT: Spiral Attack Model in IIoT Mapping Security Alerts to Attack Life Cycle Phases
Author
Accenture Security
Assante M Lee R
+25 more
Bryant B Saiedian H
Cook A Janicke H, Smith R, Maglaras L
Cyberattacks G
Defense Use Case
Dragos Inc.
Falliere N Murchu L, Chien E
Feng C Wu S, Liu N
FireEye
Grant T Venter H, Eloff J
Hassanzadeh A Modi S, Mulchandani S
Hutchins E Cloppert M, Amin R
ICS-CERT
Malone S
Mandiant Intelligence Center
McElwee S Heaton J, Fraley J, Cannady J
Microsoft
Nelson N
Obregon L
Ponemon Institute
Rege A Obradovic Z, Asadi N, Singer B, Masceri N
Strom B Battaglia J, Kemmerer M, Kupersanin W, Miller D, Wampler C, Whitley S, Wolf R
Symantec
Torres A
US-CERT
Wueest C
Publication venue
'BCS Learning and Development Limited'
Publication date
Field of study
No full text
Crossref