Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ifip11-10/KurkowskiSDTSS22
%A Kurkowski, Elizabeth
%A Stockum, Alyxandra Van
%A Dawson, Joel A.
%A Taylor, Curtis
%A Schulz, Tricia
%A Shenoi, Sujeet
%B Critical Infrastructure Protection
%D 2022
%E Staggs, Jason
%E Shenoi, Sujeet
%I Springer
%K dblp
%P 155-174
%T Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations.
%U http://dblp.uni-trier.de/db/conf/ifip11-10/iccip2022.html#KurkowskiSDTSS22
%V 666
%@ 978-3-031-20137-0
@inproceedings{conf/ifip11-10/KurkowskiSDTSS22,
added-at = {2023-09-30T00:00:00.000+0200},
author = {Kurkowski, Elizabeth and Stockum, Alyxandra Van and Dawson, Joel A. and Taylor, Curtis and Schulz, Tricia and Shenoi, Sujeet},
biburl = {https://www.bibsonomy.org/bibtex/2b57ee6f70e4f4069b11cce629cd9ad46/dblp},
booktitle = {Critical Infrastructure Protection},
crossref = {conf/ifip11-10/2022},
editor = {Staggs, Jason and Shenoi, Sujeet},
ee = {https://doi.org/10.1007/978-3-031-20137-0_6},
interhash = {9c6fb4eb5304d6bf1ca932fba5d2b006},
intrahash = {b57ee6f70e4f4069b11cce629cd9ad46},
isbn = {978-3-031-20137-0},
keywords = {dblp},
pages = {155-174},
publisher = {Springer},
series = {IFIP Advances in Information and Communication Technology},
timestamp = {2024-04-09T10:18:42.000+0200},
title = {Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations.},
url = {http://dblp.uni-trier.de/db/conf/ifip11-10/iccip2022.html#KurkowskiSDTSS22},
volume = 666,
year = 2022
}