-
1
-
-
77956894867
-
Specification, Analyzing Challenges and Approaches for Cyber-Physical Systems (CPS)
-
EL-18-3-14
-
Kaiyu Wan,K.L. Man,D. Hughes, "Specification, Analyzing Challenges and Approaches for Cyber-Physical Systems (CPS)", Engineering Letters,issue3, EL-18-3-14, 2010.
-
(2010)
Engineering Letters
, Issue.3
-
-
Kaiyu Wan, K.L.1
Man, D.H.2
-
2
-
-
79953074153
-
Hackers broke into FAA air traffic control system
-
Elinor Mills, "Hackers broke into FAA air traffic control system", TheWall Street Journal, page A6, 2009.
-
(2009)
TheWall Street Journal
-
-
Mills, E.1
-
3
-
-
77956045650
-
Researchers Fight to Keep Implanted Medical Devices Safe from Hackers
-
August
-
Leavitt, Neal, "Researchers Fight to Keep Implanted Medical Devices Safe from Hackers", Computer, Volume 43, Issue 8, Pages: 11-14, August 2010.
-
(2010)
Computer
, vol.43
, Issue.8
, pp. 11-14
-
-
Leavitt, N.1
-
5
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson,H. Shacham, and S. Savage. "Experimental security analysis of a modern automobile", In Proceedings of the 31st IEEE Symposium on Security and Privacy, May 2010.
-
Proceedings of the 31st IEEE Symposium on Security and Privacy, May 2010
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
6
-
-
79953669812
-
Virus Attacks Siemens Plant-Control Systems
-
july 22
-
Vanessa Fuhrmans, "Virus Attacks Siemens Plant-Control Systems", TheWall Street Journal, july 22, 2010.
-
(2010)
TheWall Street Journal
-
-
Fuhrmans, V.1
-
7
-
-
28244490207
-
Opportunities and obligations for physical computing systems
-
November
-
J. A. Stankovic, I. Lee, A. Mok, and R. Rajkumar, "Opportunities and obligations for physical computing systems", IEEE Computer, 38(11):23-31, November 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.11
, pp. 23-31
-
-
Stankovic, J.A.1
Lee, I.2
Mok, A.3
Rajkumar, R.4
-
8
-
-
51849117034
-
Don't sweat your privacy:Using humidity to detect human presence
-
J. Han, A. Jain, M. Luk, and A. Perrig, "Don't sweat your privacy:Using humidity to detect human presence", In Proceedings of 5th International Workshop on Privacy in UbiComp(UbiPriv'07), September 2007.
-
Proceedings of 5th International Workshop on Privacy in UbiComp(UbiPriv'07), September 2007
-
-
Han, J.1
Jain, A.2
Luk, M.3
Perrig, A.4
-
9
-
-
77958529680
-
On Bounding Data Stream Privacy in Distributed Cyber-physical Systems
-
Nam Pham, Tarek Abdelzaher, Suman Nath, "On Bounding Data Stream Privacy in Distributed Cyber-physical Systems", 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010.
-
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010
-
-
Pham, N.1
Abdelzaher, T.2
Nath, S.3
-
11
-
-
84910667791
-
Automotive Cyber Physical Systems in the Context of Human Mobility
-
Daniel Work, Alexandre Bayen and Quinn Jacobson, "Automotive Cyber Physical Systems in the Context of Human Mobility", National Workshop on High-Confidence Automotive Cyber-Physical Systems, Troy, MI, 2008.
-
National Workshop on High-Confidence Automotive Cyber-Physical Systems, Troy, MI, 2008
-
-
Work, D.1
Bayen, A.2
Jacobson, Q.3
-
14
-
-
78349295585
-
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
-
K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis and G. Stephanides, "Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols", Communications in Computer and Information Science, Volume 23, Part 3, 227-238, 2009.
-
(2009)
Communications in Computer and Information Science
, vol.23
, Issue.PART 3
, pp. 227-238
-
-
Chalkias, K.1
Baldimtsi, F.2
Hristu-Varsakelis, D.3
Stephanides, G.4
-
15
-
-
79953121832
-
-
A whitepaper from IBM Rational Application Security Group, February 27
-
Roi Saltzman,Adi Sharabani, "Active Man in the Middle Attacks, A Security Advisory", A whitepaper from IBM Rational Application Security Group, February 27, 2009.
-
(2009)
Active Man in the middle Attacks, A Security Advisory
-
-
Saltzman, R.1
Sharabani, A.2
-
21
-
-
79953117191
-
Trusted Wireless Sensor Node Platform
-
WCE 2010, June 30-July 2, London, U.K.
-
Yusnani Mohd Yussoff, Habibah Hashim, "Trusted Wireless Sensor Node Platform", In Proceedings of the World Congress on Engineering ,Vol I,WCE 2010, June 30-July 2, London, U.K., 2010.
-
(2010)
Proceedings of the World Congress on Engineering
, vol.1
-
-
Yussoff, Y.M.1
Hashim, H.2
|