Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ics-csr/WolfWSHWH16
%A Wolf, Jan
%A Wieczorek, Felix
%A Schiller, Frank
%A Hansch, Gerhard
%A Wiedermann, Norbert
%A Hutle, Martin
%B ICS-CSR
%D 2016
%E Brandstetter, Thomas
%E Janicke, Helge
%I BCS
%K
%T Adaptive Modelling for Security Analysis of Networked Control Systems.
%U http://dblp.uni-trier.de/db/conf/ics-csr/ics-csr2016.html#WolfWSHWH16
@inproceedings{conf/ics-csr/WolfWSHWH16,
added-at = {2023-12-13T09:30:37.000+0100},
author = {Wolf, Jan and Wieczorek, Felix and Schiller, Frank and Hansch, Gerhard and Wiedermann, Norbert and Hutle, Martin},
biburl = {https://www.bibsonomy.org/bibtex/296e90ac6412259128689f4ffbf6b14b3/admin},
booktitle = {ICS-CSR},
crossref = {conf/ics-csr/2016},
editor = {Brandstetter, Thomas and Janicke, Helge},
ee = {http://ewic.bcs.org/content/ConWebDoc/56479},
interhash = {cef2d20c85cfc6af80bce9d72b8be245},
intrahash = {96e90ac6412259128689f4ffbf6b14b3},
keywords = {},
publisher = {BCS},
series = {Workshops in Computing},
timestamp = {2023-12-13T09:30:37.000+0100},
title = {Adaptive Modelling for Security Analysis of Networked Control Systems.},
url = {http://dblp.uni-trier.de/db/conf/ics-csr/ics-csr2016.html#WolfWSHWH16},
year = 2016
}