


default search action
1st CPS-SPC@CCS 2015: Denver, Colorado, USA
- Indrajit Ray, Roshan K. Thomas, Alvaro A. Cárdenas:

Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3827-1
Miscellaneous
- Martin Strohmeier

, Ivan Martinovic:
On Passive Data Link Layer Fingerprinting of Aircraft Transponders. 1-9 - Ivan Ruchkin

, Ashwini Rao, Dionisio de Niz, Sagar Chaki, David Garlan:
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach. 11-22 - Benjamin Green, Daniel Prince

, Jerry S. Busby, David Hutchison
:
The Impact of Social Engineering on Industrial Control System Security. 23-29
Control and Theoretical Foundations
- Zhiheng Xu, Quanyan Zhu:

Secure and Resilient Control Design for Cloud Enabled Networked Control Systems. 31-42 - Imran Sajjad, Daniel D. Dunn, Rajnikant Sharma, Ryan M. Gerdes:

Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control. 43-53 - Waseem Abbas, Aron Laszka

, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems. 55-66
Testbeds, Simulations, and Requirements
- Georgia Koutsandria

, Reinhard Gentz, Mahdi Jamei, Anna Scaglione, Sean Peisert
, Chuck McParland:
A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid. 67-78 - Xiaolong Wang, Masaaki Mizuno, Mitchell L. Neilsen, Xinming Ou, S. Raj Rajagopalan, Will G. Boldwin, Bryan Phillips:

Secure RTOS Architecture for Building Automation. 79-90 - Daniele Antonioli, Nils Ole Tippenhauer

:
MiniCPS: A Toolkit for Security Research on CPS Networks. 91-100
Security Assurance and Assessment
- William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra, Awais Rashid

:
Assurance Techniques for Industrial Control Systems (ICS). 101-112 - Eli Sohl, Curtis Fielding, Tyler Hanlon, Julian L. Rrushi, Hassan Farhangi, Clay Howey, Kelly Carmichael, Joey Dabell:

A Field Study of Digital Forensics of Intrusions in the Electrical Power Grid. 113-122

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














