-
1
-
-
78751504208
-
Networked control system: Overview and research trends
-
Gupta R., Chow M.-Y., "Networked Control System: Overview and Research Trends," Industrial Electronics, IEEE Transactions on , vol.PP, no.99, pp.1-1, 2009
-
(2009)
Industrial Electronics, IEEE Transactions on
, vol.PP
, Issue.99
, pp. 1-1
-
-
Gupta, R.1
Chow, M.-Y.2
-
2
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
17-20 June
-
Cardenas A.A., Amin S., Sastry S., "Secure Control: Towards Survivable Cyber-Physical Systems," Distributed Computing Systems Workshops, 2008. ICDCS08. 28th International Conference on, pp.495-500, 17-20 June 2008
-
(2008)
Distributed Computing Systems Workshops, 2008. ICDCS08. 28th International Conference on
, pp. 495-500
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
3
-
-
50649118126
-
A modeling framework for evaluating effectiveness of smart-infrastructure crises management systems
-
12-13 May
-
Mukherjee, T., Gupta, S.K.S., "A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems," Technologies for Homeland Security, 2008 IEEE Conference on, pp.549-554, 12-13 May 2008
-
(2008)
Technologies for Homeland Security, 2008 IEEE Conference on
, pp. 549-554
-
-
Mukherjee, T.1
Gupta, S.K.S.2
-
4
-
-
33847299487
-
Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
14-17 Dec.
-
Tsang C-H, Kwong S., "Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction", IEEE International Conference on Industrial Technology, 14-17 Dec. 2005 Page(s):51-56.
-
(2005)
IEEE International Conference on Industrial Technology
, pp. 51-56
-
-
Tsang, C.-H.1
Kwong, S.2
-
6
-
-
28444465910
-
Distributed device networks with security constraints
-
November
-
Xu Y, Song R, Korba L, Wang L, Shen W, Lang S, "Distributed Device Networks With Security Constraints", IEEE Transactions on Industrial Informatics, Vol. 1, No. 4, November 2005.
-
(2005)
IEEE Transactions on Industrial Informatics
, vol.1
, Issue.4
-
-
Xu, Y.1
Song, R.2
Korba, L.3
Wang, L.4
Shen, W.5
Lang, S.6
-
7
-
-
49949106761
-
Information security with real-time operation: Performance assessment for next generation wireless distributed networked-control-systems
-
Taipei, Taiwan
-
Gupta R. A., Chow M.-Y., Agarwal A., Wang W., "Information security with real-time operation: performance assessment for next generation wireless distributed networked-control-systems", 33rd Annual Conference of the IEEE Industrial Electronics Society, November 5-8, 2007, Taipei, Taiwan.
-
(2007)
33rd Annual Conference of the IEEE Industrial Electronics Society
, Issue.5-8
-
-
Gupta, R.A.1
Chow, M.-Y.2
Agarwal, A.3
Wang, W.4
-
8
-
-
47949094967
-
Performance assessment of data and time-sensitive wireless distributed networked-control-systems in presence of information security
-
October 29-31
-
Gupta R. A., Agarwal A., Chow M.-Y., Wang W., "Performance assessment of data and time-sensitive wireless distributed networked-control- systems in presence of information security", Military Communication Conference, October 29-31 2007.
-
(2007)
Military Communication Conference
-
-
Gupta, R.A.1
Agarwal, A.2
Chow, M.-Y.3
Wang, W.4
-
9
-
-
70049103826
-
Optimal stabilizing gain selection for networked control systems with time delays and packet losses
-
Sept.
-
Li Hongbo, Chow Mo-Yuen, Sun Zengqi, "Optimal Stabilizing Gain Selection for Networked Control Systems With Time Delays and Packet Losses," Control Systems Technology, IEEE Transactions on , vol.17, no.5, pp.1154-1162, Sept. 2009
-
(2009)
Control Systems Technology, IEEE Transactions on
, vol.17
, Issue.5
, pp. 1154-1162
-
-
Hongbo, L.1
Mo-Yuen, C.2
Zengqi, S.3
-
10
-
-
66149117916
-
EDA-based speed control of a networked DC motor system with time delays and packet losses
-
May
-
Li Hongbo, Chow Mo-Yuen, Sun Zengqi, "EDA-Based Speed Control of a Networked DC Motor System With Time Delays and Packet Losses," Industrial Electronics, IEEE Transactions on, vol.56, no.5, pp.1727-1735, May 2009
-
(2009)
Industrial Electronics, IEEE Transactions on
, vol.56
, Issue.5
, pp. 1727-1735
-
-
Hongbo, L.1
Mo-Yuen, C.2
Zengqi, S.3
-
11
-
-
0004216472
-
-
Prentice Hall, Englewood Cliffs, New Jersey, (ISBN 0-13-061466-1)
-
Kaufman C., Perlman R, Speciner M., "Network Security: Private Communication in a Public World", Prentice Hall, Englewood Cliffs, New Jersey, 1995. 504 pp. (ISBN 0-13-061466-1).
-
(1995)
Network Security: Private Communication in A Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
12
-
-
63149119832
-
Performance assessment and compensation for secure networked control systems
-
10-13 Nov.
-
Gupta R.A., Chow M.-Y., "Performance assessment and compensation for secure networked control systems," Industrial Electronics, 2008. IECON 2008. 34th Annual Conference of IEEE, pp.2929-2934, 10-13 Nov. 2008
-
(2008)
Industrial Electronics, 2008. IECON 2008. 34th Annual Conference of IEEE
, pp. 2929-2934
-
-
Gupta, R.A.1
Chow, M.-Y.2
-
13
-
-
21644435323
-
Reasoning about complementary intrusion evidence
-
6-10 Dec.
-
Zhai Y., Ning P., Iyer P., Reeves D.S., "Reasoning about complementary intrusion evidence," Computer Security Applications Conference, 2004. 20th Annual, pp. 39- 48, 6-10 Dec. 2004
-
(2004)
Computer Security Applications Conference, 2004. 20th Annual
, pp. 39-48
-
-
Zhai, Y.1
Ning, P.2
Iyer, P.3
Reeves, D.S.4
-
14
-
-
70449501104
-
An adaptive tradeoff model for service performance and security in service-based systems
-
6-10 July
-
Yau S.S., Yin Yin, An H.G., "An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems," Web Services, 2009. ICWS 2009. IEEE International Conference on, pp.287-294, 6-10 July 2009
-
(2009)
Web Services, 2009. ICWS 2009. IEEE International Conference on
, pp. 287-294
-
-
Yau, S.S.1
Yin, Y.2
An, H.G.3
-
15
-
-
36248956628
-
Opportunistic encryption: A trade-off between security and throughput in wireless networks
-
Oct.-Dec.
-
Haleem M.A., Mathur C.N., Chandramouli R., Subbalakshmi K.P., "Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks," Dependable and Secure Computing, IEEE Transactions on, vol.4, no.4, pp.313-324, Oct.-Dec. 2007
-
(2007)
Dependable and Secure Computing, IEEE Transactions on
, vol.4
, Issue.4
, pp. 313-324
-
-
Haleem, M.A.1
Mathur, C.N.2
Chandramouli, R.3
Subbalakshmi, K.P.4
|