default search action
HiCoNS 2013: Philadelphia, PA, USA
- Linda Bushnell, Larry Rohrbough, Saurabh Amin, Xenofon D. Koutsoukos:
2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), HiCoNS 2013, Philadelphia, PA, USA, April 9-11, 2013. ACM 2013, ISBN 978-1-4503-1961-4 - Yusuke Aoki, Takafumi Kanazawa, Toshimitsu Ushio:
Mechanism design for robust resource management to false report in cloud computing systems. 1-8 - Aaron M. Bestick, Lillian J. Ratliff, Posu Yan, Ruzena Bajcsy, S. Shankar Sastry:
An inverse correlated equilibrium framework for utility learning in multiplayer, noncooperative settings. 9-16 - Alexander Georg Camek, Christian Buckl, Alois C. Knoll:
Future cars: necessity for an adaptive and distributed multiple independent levels of security architecture. 17-24 - Edward S. Canepa, Christian G. Claudel:
A framework for privacy and security analysis of probe-based traffic information systems. 25-32 - Chinwendu Enyioha, Victor M. Preciado, George J. Pappas:
Bio-inspired strategy for control of viral spreading in networks. 33-40 - Bin Hu, Michael D. Lemmon:
Using channel state feedback to achieve resilience to deep fades in wireless networked control systems. 41-48 - Jerome Le Ny, George J. Pappas:
Privacy-preserving release of aggregate dynamic models. 49-56 - Heath LeBlanc, Xenofon D. Koutsoukos:
Algorithms for determining network robustness. 57-64 - Sibin Mohan, Stanley Bak, Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo:
S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systems. 65-74 - Miroslav Pajic, Nicola Bezzo, James Weimer, Rajeev Alur, Rahul Mangharam, Nathan Michael, George J. Pappas, Oleg Sokolsky, Paulo Tabuada, Stephanie Weirich, Insup Lee:
Towards synthesis of platform-aware attack-resilient control systems: extended abstract. 75-76 - Pavithra Prabhakar, Boris Köpf:
Verifying information flow properties of hybrid systems. 77-84 - Zhijing Qin, Grit Denker, Carolyn L. Talcott, Nalini Venkatasubramanian:
Achieving resilience of heterogeneous networks through predictive, formal analysis. 85-92 - Yasser Shoukry, José Araujo, Paulo Tabuada, Mani B. Srivastava, Karl Henrik Johansson:
Minimax control for cyber-physical systems under network packet scheduling attacks. 93-100 - Richard William Skowyra, Andrei Lapets, Azer Bestavros, Assaf J. Kfoury:
Verifiably-safe software-defined networks for CPS. 101-110 - Danielle C. Tarraf:
Bounding the smallest robustly control invariant sets in networks with discrete disturbances and controls. 111-116 - Shaohui Wang, Anaheed Ayoub, Radoslav Ivanov, Oleg Sokolsky, Insup Lee:
Contract-based blame assignment by trace analysis. 117-126 - James Weimer, Damiano Varagnolo, Karl Henrik Johansson:
Distributed model-invariant detection of unknown inputs in networked systems. 127-134 - Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:
Taxonomy for description of cross-domain attacks on CPS. 135-142
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.