default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 53 matches
- 2014
- Alvaro A. Cárdenas:
From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems. HiCoNS 2014: 125-126 - Roy Dong, Lillian J. Ratliff, Henrik Ohlsson, S. Shankar Sastry:
Fundamental limits of nonintrusive load monitoring. HiCoNS 2014: 11-18 - Katherine Rose Driggs-Campbell, Victor Shia, Ruzena Bajcsy:
Decisions for autonomous vehicles: integrating sensors, communication, and control. HiCoNS 2014: 59-60 - Emeka Eyisi, Xenofon D. Koutsoukos:
Energy-based attack detection in networked control systems. HiCoNS 2014: 115-124 - Bin Hu, Michael D. Lemmon:
Distributed switching control to achieve resilience to deep fades in leader-follower nonholonomic systems. HiCoNS 2014: 95-104 - Zhenqi Huang, Yu Wang, Sayan Mitra, Geir E. Dullerud:
On the cost of differential privacy in distributed control systems. HiCoNS 2014: 105-114 - Radoslav Ivanov, Miroslav Pajic, Insup Lee:
Resilient multidimensional sensor fusion using measurement history. HiCoNS 2014: 1-10 - Marina Krotofil, Alvaro A. Cárdenas:
Is this a good time?: deciding when to launch attacks on process control systems. HiCoNS 2014: 65-66 - Heath J. LeBlanc, Firas Hassan:
Resilient distributed parameter estimation in heterogeneous time-varying networks. HiCoNS 2014: 19-28 - Phillip Lee, Omar Saleh, Basel Alomair, Linda Bushnell, Radha Poovendran:
Graph-based verification and misbehavior detection in multi-agent networks. HiCoNS 2014: 77-84 - Matti Mantere, Mirko Sailio, Sami Noponen:
A module for anomaly detection in ICS networks. HiCoNS 2014: 49-56 - Erik Miehling, Demosthenis Teneketzis:
Multilateral trades in interconnected power systems: a local public goods approach. HiCoNS 2014: 127-134 - Lina Perelman, Saurabh Amin:
A network interdiction model for analyzing the vulnerability of water distribution systems. HiCoNS 2014: 135-144 - Radha Poovendran:
Passivity framework for modeling, mitigating, and composing attacks on networked systems. HiCoNS 2014: 29-30 - Lillian J. Ratliff, Roy Dong, Henrik Ohlsson, S. Shankar Sastry:
Energy efficiency via incentive design and utility learning. HiCoNS 2014: 57-58 - Dorsa Sadigh, Katherine Rose Driggs-Campbell, Ruzena Bajcsy, S. Shankar Sastry, Sanjit A. Seshia:
User interface design and verification for semi-autonomous driving. HiCoNS 2014: 63-64 - Galina A. Schwartz, S. Shankar Sastry:
Cyber-insurance framework for large scale interdependent networks. HiCoNS 2014: 145-154 - Tua Agustinus Tamba, Michael D. Lemmon:
Forecasting the resilience of networked dynamical systems under environmental perturbation. HiCoNS 2014: 61-62 - Curtis R. Taylor, Krishna K. Venkatasubramanian, Craig A. Shue:
Understanding the security of interoperable medical devices using attack graphs. HiCoNS 2014: 31-40 - Ashish Tiwari, Bruno Dutertre, Dejan Jovanovic, Thomas de Candia, Patrick Lincoln, John M. Rushby, Dorsa Sadigh, Sanjit A. Seshia:
Safety envelope for security. HiCoNS 2014: 85-94 - Nikola Trcka, Mark Moulin, Shaunak D. Bopardikar, Alberto Speranzon:
A formal verification approach to revealing stealth attacks on networked control systems. HiCoNS 2014: 67-76 - Mark Yampolskiy, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos, Péter Horváth, Heath J. LeBlanc, Janos Sztipanovits:
Resilient distributed consensus for tree topology. HiCoNS 2014: 41-48 - Linda Bushnell, Larry Rohrbough, Saurabh Amin, Xenofon D. Koutsoukos:
3rd International Conference on High Confidence Networked Systems (part of CPS Week), HiCoNS '14, Berlin, Germany, April 15-17, 2014. ACM 2014, ISBN 978-1-4503-2652-0 [contents] - 2013
- Yusuke Aoki, Takafumi Kanazawa, Toshimitsu Ushio:
Mechanism design for robust resource management to false report in cloud computing systems. HiCoNS 2013: 1-8 - Aaron M. Bestick, Lillian J. Ratliff, Posu Yan, Ruzena Bajcsy, S. Shankar Sastry:
An inverse correlated equilibrium framework for utility learning in multiplayer, noncooperative settings. HiCoNS 2013: 9-16 - Alexander Georg Camek, Christian Buckl, Alois C. Knoll:
Future cars: necessity for an adaptive and distributed multiple independent levels of security architecture. HiCoNS 2013: 17-24 - Edward S. Canepa, Christian G. Claudel:
A framework for privacy and security analysis of probe-based traffic information systems. HiCoNS 2013: 25-32 - Chinwendu Enyioha, Victor M. Preciado, George J. Pappas:
Bio-inspired strategy for control of viral spreading in networks. HiCoNS 2013: 33-40 - Bin Hu, Michael D. Lemmon:
Using channel state feedback to achieve resilience to deep fades in wireless networked control systems. HiCoNS 2013: 41-48 - Heath LeBlanc, Xenofon D. Koutsoukos:
Algorithms for determining network robustness. HiCoNS 2013: 57-64
skipping 23 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 16:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint