![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/books/collections/K2018.bht:"
@incollection{DBLP:books/sp/18/BartoliniP18, author = {Sandro Bartolini and Biagio Peccerillo}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel Programming in Cyber-Physical Systems}, booktitle = {Cyber-Physical Systems Security}, pages = {111--134}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_6}, doi = {10.1007/978-3-319-98935-8\_6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/BartoliniP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/BellevilleHCBRSC18, author = {Nicolas Belleville and Karine Heydemann and Damien Courouss{\'{e}} and Thierno Barry and Bruno Robisson and Abderrahmane Seriai and Henri{-}Pierre Charles}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Automatic Application of Software Countermeasures Against Physical Attacks}, booktitle = {Cyber-Physical Systems Security}, pages = {135--155}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_7}, doi = {10.1007/978-3-319-98935-8\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/BellevilleHCBRSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/BianchinP18, author = {Gianluca Bianchin and Fabio Pasqualetti}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Time-Delay Attacks in Network Systems}, booktitle = {Cyber-Physical Systems Security}, pages = {157--174}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_8}, doi = {10.1007/978-3-319-98935-8\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/BianchinP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/Cogliani0FGMNCW18, author = {Simon Cogliani and Feng Bao and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Rodrigo Portella do Canto and Guilin Wang}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Public Key-Based Lightweight Swarm Authentication}, booktitle = {Cyber-Physical Systems Security}, pages = {255--267}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_12}, doi = {10.1007/978-3-319-98935-8\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/Cogliani0FGMNCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/DangerGHLT18, author = {Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Axel Legay and Ming Tang}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Physical Security Versus Masking Schemes}, booktitle = {Cyber-Physical Systems Security}, pages = {269--284}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_13}, doi = {10.1007/978-3-319-98935-8\_13}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/DangerGHLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/GreenVK18, author = {Sam Green and Craig M. Vineyard and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Mathematical Optimizations for Deep Learning}, booktitle = {Cyber-Physical Systems Security}, pages = {69--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_4}, doi = {10.1007/978-3-319-98935-8\_4}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/GreenVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/Hasler18, author = {Jennifer Hasler}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Embedded Classifiers for Energy-Constrained IoT Network Security}, booktitle = {Cyber-Physical Systems Security}, pages = {285--301}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_14}, doi = {10.1007/978-3-319-98935-8\_14}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/Hasler18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Attack Tree Construction and Its Application to the Connected Vehicle}, booktitle = {Cyber-Physical Systems Security}, pages = {175--190}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_9}, doi = {10.1007/978-3-319-98935-8\_9}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18a, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks}, booktitle = {Cyber-Physical Systems Security}, pages = {219--254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_11}, doi = {10.1007/978-3-319-98935-8\_11}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/LiuGQO18, author = {Weiqiang Liu and Chongyan Gu and Gang Qu and M{\'{a}}ire O'Neill}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Approximate Computing and Its Application to Hardware Security}, booktitle = {Cyber-Physical Systems Security}, pages = {43--67}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_3}, doi = {10.1007/978-3-319-98935-8\_3}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/LiuGQO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/LuoGFLK18, author = {Jieliang Luo and Sam Green and Peter Feghali and George Legrady and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Reinforcement Learning and Trustworthy Autonomy}, booktitle = {Cyber-Physical Systems Security}, pages = {191--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_10}, doi = {10.1007/978-3-319-98935-8\_10}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/LuoGFLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/MayoAHSS18, author = {Jackson R. Mayo and Robert C. Armstrong and Geoffrey C. Hulette and Maher Salloum and Andrew M. Smith}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Robust Digital Computation in the Physical World}, booktitle = {Cyber-Physical Systems Security}, pages = {1--21}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_1}, doi = {10.1007/978-3-319-98935-8\_1}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/MayoAHSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/PascaS18, author = {Vlad{-}Raul Pasca and Emil Simion}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Challenges in Cyber Security: Ransomware Phenomenon}, booktitle = {Cyber-Physical Systems Security}, pages = {303--330}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_15}, doi = {10.1007/978-3-319-98935-8\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/PascaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/RaybournKFU18, author = {Elaine M. Raybourn and Michael Kunz and David Fritz and Vince Urias}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {A Zero-Entry Cyber Range Environment for Future Learning Ecosystems}, booktitle = {Cyber-Physical Systems Security}, pages = {93--109}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_5}, doi = {10.1007/978-3-319-98935-8\_5}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/RaybournKFU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/RaybournT18, author = {Elaine M. Raybourn and Ray Trechter}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems}, booktitle = {Cyber-Physical Systems Security}, pages = {331--344}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_16}, doi = {10.1007/978-3-319-98935-8\_16}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/RaybournT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/SandrettoCM18, author = {Julien Alexandre Dit Sandretto and Alexandre Chapoutot and Olivier Mullier}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Constraint-Based Framework for Reasoning with Differential Equations}, booktitle = {Cyber-Physical Systems Security}, pages = {23--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_2}, doi = {10.1007/978-3-319-98935-8\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/SandrettoCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/K2018, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Cyber-Physical Systems Security}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8}, doi = {10.1007/978-3-319-98935-8}, isbn = {978-3-319-98934-1}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/K2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.