


default search action
SAT-CPS@CODASPY 2021: Virtual Event, USA
- Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal:

SAT-CPS@CODASPY 2021, Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April 28, 2021. ACM 2021, ISBN 978-1-4503-8319-6 - Kalyan S. Perumalla:

Trust-but-Verify in Cyber-Physical Systems. 1-2 - Richard Heininger

, Chris Stary:
Capturing Autonomy in its Multiple Facets: A Digital Twin Approach. 3-12 - Denis A. Ulybyshev, Ibrahim Yilmaz

, Bradley Northern, Vadim Kholodilo, Michael Rogers:
Trustworthy Data Analysis and Sensor Data Protection in Cyber-Physical Systems. 13-22 - Philip Empl

, Günther Pernul:
A Flexible Security Analytics Service for the Industrial IoT. 23-32 - Ibrahim Yilmaz

, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef
:
Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning. 33-38 - Safwa Ameer, Ravi S. Sandhu:

The HABAC Model for Smart Home IoT and Comparison to EGRBAC. 39-48 - Mehrnoosh Shakarami, Ravi S. Sandhu:

Role-Based Administration of Role-Based Smart Home IoT. 49-58 - Sai Sree Laya Chukkapalli, Shaik Barakhat Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam:

Ontology driven AI and Access Control Systems for Smart Fisheries. 59-68 - Stephen Ly, Yuan Cheng

:
A Data-based Protocol for One-way Trust in Inter-vehicular Communication. 69-74 - Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal:

Artificial Intelligence Assisted Malware Analysis. 75-77 - Markus Dahlmanns

, Jan Pennekamp
, Ina Berenice Fink, Bernd Schoolmann, Klaus Wehrle
, Martin Henze
:
Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems. 78-87 - Michael Grabatin, Michael Steinke, Daniela Pöhn

, Wolfgang Hommel:
A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related Environments. 88-97 - Engla Rencelj Ling

, Mathias Ekstedt:
Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language. 98-103 - Loïc France, Maria Mushtaq, Florent Bruguier, David Novo, Pascal Benoit:

Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress. 104-109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














