


default search action
HiCoNS 2013: Philadelphia, PA, USA
- Linda Bushnell, Larry Rohrbough, Saurabh Amin, Xenofon D. Koutsoukos:

2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), HiCoNS 2013, Philadelphia, PA, USA, April 9-11, 2013. ACM 2013, ISBN 978-1-4503-1961-4 - Yusuke Aoki, Takafumi Kanazawa, Toshimitsu Ushio:

Mechanism design for robust resource management to false report in cloud computing systems. 1-8 - Aaron M. Bestick, Lillian J. Ratliff

, Posu Yan, Ruzena Bajcsy, S. Shankar Sastry:
An inverse correlated equilibrium framework for utility learning in multiplayer, noncooperative settings. 9-16 - Alexander Georg Camek, Christian Buckl

, Alois C. Knoll:
Future cars: necessity for an adaptive and distributed multiple independent levels of security architecture. 17-24 - Edward S. Canepa

, Christian G. Claudel
:
A framework for privacy and security analysis of probe-based traffic information systems. 25-32 - Chinwendu Enyioha, Victor M. Preciado, George J. Pappas

:
Bio-inspired strategy for control of viral spreading in networks. 33-40 - Bin Hu, Michael D. Lemmon:

Using channel state feedback to achieve resilience to deep fades in wireless networked control systems. 41-48 - Jerome Le Ny, George J. Pappas

:
Privacy-preserving release of aggregate dynamic models. 49-56 - Heath LeBlanc, Xenofon D. Koutsoukos:

Algorithms for determining network robustness. 57-64 - Sibin Mohan

, Stanley Bak, Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo:
S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systems. 65-74 - Miroslav Pajic

, Nicola Bezzo, James Weimer, Rajeev Alur, Rahul Mangharam, Nathan Michael, George J. Pappas
, Oleg Sokolsky
, Paulo Tabuada
, Stephanie Weirich
, Insup Lee:
Towards synthesis of platform-aware attack-resilient control systems: extended abstract. 75-76 - Pavithra Prabhakar, Boris Köpf:

Verifying information flow properties of hybrid systems. 77-84 - Zhijing Qin, Grit Denker, Carolyn L. Talcott, Nalini Venkatasubramanian:

Achieving resilience of heterogeneous networks through predictive, formal analysis. 85-92 - Yasser Shoukry

, José Araujo
, Paulo Tabuada
, Mani B. Srivastava
, Karl Henrik Johansson
:
Minimax control for cyber-physical systems under network packet scheduling attacks. 93-100 - Richard William Skowyra, Andrei Lapets

, Azer Bestavros
, Assaf J. Kfoury:
Verifiably-safe software-defined networks for CPS. 101-110 - Danielle C. Tarraf:

Bounding the smallest robustly control invariant sets in networks with discrete disturbances and controls. 111-116 - Shaohui Wang, Anaheed Ayoub, Radoslav Ivanov, Oleg Sokolsky

, Insup Lee:
Contract-based blame assignment by trace analysis. 117-126 - James Weimer, Damiano Varagnolo

, Karl Henrik Johansson
:
Distributed model-invariant detection of unknown inputs in networked systems. 127-134 - Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:

Taxonomy for description of cross-domain attacks on CPS. 135-142

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














