


default search action
SAT-CPS@CODASPY 2022: Baltimore, MD, USA
- Maanak Gupta, Sajad Khorsandroo, Mahmoud Abdelsalam:

Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April 2022. ACM 2022, ISBN 978-1-4503-9229-7 - Nikhil Gupta:

Secure, Trustworthy and Scalable Digital Manufacturing Cyber-Physical System. 1 - Jamie Thorpe, Raymond Fasano, Meghan Galiardi Sahakian, Amanda Gonzales, Andrew Hahn, Joshua Morris, Timothy Ortiz, Hannah Reinbolt, Eric D. Vugrin:

A Cyber-Physical Experimentation Platform for Resilience Analysis. 3-12 - Matthew Jablonski, Duminda Wijesekera, Anoop Singhal:

Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory. 13-20 - Przemyslaw Buczkowski, Pasquale Malacaria, Chris Hankin

, Andrew Fielder:
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool. 21-30 - Danish Hudani, Muhammad Haseeb, Muhammad Taufiq, Muhammad Azmi Umer

, Nandha Kumar Kandasamy:
A Data-Centric Approach to Generate Invariants for a Smart Grid Using Machine Learning. 31-36 - Gaurav Goyal, Peng Liu, Shamik Sural

:
Securing Smart Home IoT Systems with Attribute-Based Access Control. 37-46 - Shwetha Gowdanakatte, Indrakshi Ray, Siv Hilde Houmb:

Attribute Based Access Control Model for Protecting Programmable Logic Controllers. 47-56 - Mehrnoosh Shakarami, James O. Benson

, Ravi S. Sandhu:
Blockchain-Based Administration of Access in Smart Home IoT. 57-66 - Paul Georg Wagner

, Jürgen Beyerer:
Quantifying Trustworthiness in Decentralized Trusted Applications. 67-76 - Max Landauer

, Maximilian Frank, Florian Skopik
, Wolfgang Hotwagner, Markus Wurzenberger
, Andreas Rauber:
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation. 77-86 - Felix Wruck

, Vasil Sarafov, Florian Jakobsmeier
, Michael Weiß
:
GyroidOS: Packaging Linux with a Minimal Surface. 87-96 - Marietheres Dietz

, Leon Hageman, Constantin von Hornung, Günther Pernul:
Employing Digital Twins for Security-by-Design System Testing. 97-106 - Ooi Sian En, Razvan Beuran, Yasuo Tan, Takayuki Kuroda, Takuya Kuwahara, Norihito Fujita:

SecureWeaver: Intent-Driven Secure System Designer. 107-116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














