Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/acisp/RodofileSSDRF17
%A Rodofile, Nicholas R.
%A Schmidt, Thomas
%A Sherry, Sebastian T.
%A Djamaludin, Christopher
%A Radke, Kenneth
%A Foo, Ernest
%B ACISP (2)
%D 2017
%E Pieprzyk, Josef
%E Suriadi, Suriadi
%I Springer
%K dblp
%P 452-459
%T Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.
%U http://dblp.uni-trier.de/db/conf/acisp/acisp2017-2.html#RodofileSSDRF17
%V 10343
%@ 978-3-319-59870-3
@inproceedings{conf/acisp/RodofileSSDRF17,
added-at = {2022-06-23T00:00:00.000+0200},
author = {Rodofile, Nicholas R. and Schmidt, Thomas and Sherry, Sebastian T. and Djamaludin, Christopher and Radke, Kenneth and Foo, Ernest},
biburl = {https://www.bibsonomy.org/bibtex/259a48d829c9a8b8ac663f0095efc04bc/dblp},
booktitle = {ACISP (2)},
crossref = {conf/acisp/2017-2},
editor = {Pieprzyk, Josef and Suriadi, Suriadi},
ee = {https://doi.org/10.1007/978-3-319-59870-3_30},
interhash = {686901f6a1058a88a25d2b6203f136e5},
intrahash = {59a48d829c9a8b8ac663f0095efc04bc},
isbn = {978-3-319-59870-3},
keywords = {dblp},
pages = {452-459},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-10T09:36:34.000+0200},
title = {Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.},
url = {http://dblp.uni-trier.de/db/conf/acisp/acisp2017-2.html#RodofileSSDRF17},
volume = 10343,
year = 2017
}