


default search action
HiCoNS 2013: Philadelphia, PA, USA
- Linda Bushnell, Larry Rohrbough, Saurabh Amin, Xenofon D. Koutsoukos:
2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), HiCoNS 2013, Philadelphia, PA, USA, April 9-11, 2013. ACM 2013, ISBN 978-1-4503-1961-4 - Yusuke Aoki, Takafumi Kanazawa, Toshimitsu Ushio:
Mechanism design for robust resource management to false report in cloud computing systems. 1-8 - Aaron M. Bestick, Lillian J. Ratliff
, Posu Yan, Ruzena Bajcsy, S. Shankar Sastry:
An inverse correlated equilibrium framework for utility learning in multiplayer, noncooperative settings. 9-16 - Alexander Georg Camek, Christian Buckl
, Alois C. Knoll:
Future cars: necessity for an adaptive and distributed multiple independent levels of security architecture. 17-24 - Edward S. Canepa
, Christian G. Claudel
:
A framework for privacy and security analysis of probe-based traffic information systems. 25-32 - Chinwendu Enyioha, Victor M. Preciado, George J. Pappas
:
Bio-inspired strategy for control of viral spreading in networks. 33-40 - Bin Hu, Michael D. Lemmon:
Using channel state feedback to achieve resilience to deep fades in wireless networked control systems. 41-48 - Jerome Le Ny, George J. Pappas
:
Privacy-preserving release of aggregate dynamic models. 49-56 - Heath LeBlanc, Xenofon D. Koutsoukos:
Algorithms for determining network robustness. 57-64 - Sibin Mohan
, Stanley Bak, Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo:
S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systems. 65-74 - Miroslav Pajic
, Nicola Bezzo, James Weimer, Rajeev Alur, Rahul Mangharam, Nathan Michael, George J. Pappas
, Oleg Sokolsky, Paulo Tabuada
, Stephanie Weirich
, Insup Lee:
Towards synthesis of platform-aware attack-resilient control systems: extended abstract. 75-76 - Pavithra Prabhakar, Boris Köpf:
Verifying information flow properties of hybrid systems. 77-84 - Zhijing Qin, Grit Denker, Carolyn L. Talcott, Nalini Venkatasubramanian:
Achieving resilience of heterogeneous networks through predictive, formal analysis. 85-92 - Yasser Shoukry
, José Araujo
, Paulo Tabuada
, Mani B. Srivastava
, Karl Henrik Johansson
:
Minimax control for cyber-physical systems under network packet scheduling attacks. 93-100 - Richard William Skowyra, Andrei Lapets
, Azer Bestavros
, Assaf J. Kfoury:
Verifiably-safe software-defined networks for CPS. 101-110 - Danielle C. Tarraf:
Bounding the smallest robustly control invariant sets in networks with discrete disturbances and controls. 111-116 - Shaohui Wang, Anaheed Ayoub, Radoslav Ivanov, Oleg Sokolsky, Insup Lee:
Contract-based blame assignment by trace analysis. 117-126 - James Weimer, Damiano Varagnolo
, Karl Henrik Johansson
:
Distributed model-invariant detection of unknown inputs in networked systems. 127-134 - Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:
Taxonomy for description of cross-domain attacks on CPS. 135-142

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.