Stop the war!
Остановите войну!
for scientists:
default search action
Cyber-Physical Systems Security 2018
- Çetin Kaya Koç:
Cyber-Physical Systems Security. Springer 2018, ISBN 978-3-319-98934-1 - Jackson R. Mayo, Robert C. Armstrong, Geoffrey C. Hulette, Maher Salloum, Andrew M. Smith:
Robust Digital Computation in the Physical World. 1-21 - Julien Alexandre Dit Sandretto, Alexandre Chapoutot, Olivier Mullier:
Constraint-Based Framework for Reasoning with Differential Equations. 23-41 - Weiqiang Liu, Chongyan Gu, Gang Qu, Máire O'Neill:
Approximate Computing and Its Application to Hardware Security. 43-67 - Sam Green, Craig M. Vineyard, Çetin Kaya Koç:
Mathematical Optimizations for Deep Learning. 69-92 - Elaine M. Raybourn, Michael Kunz, David Fritz, Vince Urias:
A Zero-Entry Cyber Range Environment for Future Learning Ecosystems. 93-109 - Sandro Bartolini, Biagio Peccerillo:
Parallel Programming in Cyber-Physical Systems. 111-134 - Nicolas Belleville, Karine Heydemann, Damien Couroussé, Thierno Barry, Bruno Robisson, Abderrahmane Seriai, Henri-Pierre Charles:
Automatic Application of Software Countermeasures Against Physical Attacks. 135-155 - Gianluca Bianchin, Fabio Pasqualetti:
Time-Delay Attacks in Network Systems. 157-174 - Khaled Karray, Jean-Luc Danger, Sylvain Guilley, M. Abdelaziz Elaabid:
Attack Tree Construction and Its Application to the Connected Vehicle. 175-190 - Jieliang Luo, Sam Green, Peter Feghali, George Legrady, Çetin Kaya Koç:
Reinforcement Learning and Trustworthy Autonomy. 191-217 - Khaled Karray, Jean-Luc Danger, Sylvain Guilley, M. Abdelaziz Elaabid:
Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks. 219-254 - Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public Key-Based Lightweight Swarm Authentication. 255-267 - Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Axel Legay, Ming Tang:
Physical Security Versus Masking Schemes. 269-284 - Jennifer Hasler:
Embedded Classifiers for Energy-Constrained IoT Network Security. 285-301 - Vlad-Raul Pasca, Emil Simion:
Challenges in Cyber Security: Ransomware Phenomenon. 303-330 - Elaine M. Raybourn, Ray Trechter:
Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems. 331-344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.