-
1
-
-
70350038038
-
Co-simulation tools for networked control systems
-
Berlin, Heidelberg, Springer-Verlag
-
A. T. Al-Hammouri, M. S. Branicky, and V. Liberatore. Co-simulation tools for networked control systems. In Proceedings of the 11th international workshop on Hybrid Systems: Computation and Control, HSCC'08, pages 16-29, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 11th International Workshop on Hybrid Systems: Computation and Control, HSCC'08
, pp. 16-29
-
-
Al-Hammouri, A.T.1
Branicky, M.S.2
Liberatore, V.3
-
2
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
R. Majumdar and P. Tabuada, editors, volume 5469 of Lecture Notes in Computer Science, Springer
-
S. Amin, A. A. Cárdenas, and S. Sastry. Safe and secure networked control systems under denial-of-service attacks. In R. Majumdar and P. Tabuada, editors, HSCC, volume 5469 of Lecture Notes in Computer Science, pages 31-45. Springer, 2009.
-
(2009)
HSCC
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.A.2
Sastry, S.3
-
3
-
-
84855701737
-
The science of cyber security experimentation: The DETER project
-
December
-
T. Benzel. The science of cyber security experimentation: The DETER project. Annual Computer Security Applications Conference, December 2011.
-
(2011)
Annual Computer Security Applications Conference
-
-
Benzel, T.1
-
4
-
-
84860603953
-
-
Master's thesis, University of Illinois at Urbana-Champaign, Urbana, Illinois, May
-
D. C. Bergman. Power grid simulation, evaluation, and test framework. Master's thesis, University of Illinois at Urbana-Champaign, Urbana, Illinois, May 2010.
-
(2010)
Power Grid Simulation, Evaluation, and Test Framework
-
-
Bergman, D.C.1
-
7
-
-
84860603946
-
-
DETER Resources. https://trac.deterlab.net/wiki/DeterResources.
-
DETER Resources
-
-
-
8
-
-
84891752381
-
A taxonomy of attacks on the DNP3 protocol
-
S. East, J. Butts, M. Papa, and S. Shenoi. A taxonomy of attacks on the DNP3 protocol. IFIP International Federation for Information Processing, pages 67-81, 2009.
-
(2009)
IFIP International Federation for Information Processing
, pp. 67-81
-
-
East, S.1
Butts, J.2
Papa, M.3
Shenoi, S.4
-
9
-
-
1642499093
-
Internet research needs better models
-
29-34, January
-
S. Floyd and E. Kohler. Internet research needs better models. SIGCOMM Comput. Commun. Rev., 33:29-34, January 2003.
-
(2003)
SIGCOMM Comput. Commun. Rev.
, vol.33
-
-
Floyd, S.1
Kohler, E.2
-
10
-
-
77954796687
-
A testbed for secure and robust scada systems
-
July
-
A. Giani, G. Karsai, T. Roosta, A. Shah, B. Sinopoli, and J. Wiley. A testbed for secure and robust scada systems. SIGBED Rev., 5:4:1-4:4, July 2008.
-
(2008)
SIGBED Rev.
, vol.5
, pp. 41-44
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
11
-
-
79953130034
-
Optimal control in the presence of an intelligent jammer with limited actions
-
IEEE
-
A. Gupta, C. Langbort, and T. Basar. Optimal control in the presence of an intelligent jammer with limited actions. In CDC, pages 1096-1101. IEEE, 2010.
-
(2010)
CDC
, pp. 1096-1101
-
-
Gupta, A.1
Langbort, C.2
Basar, T.3
-
12
-
-
78349259735
-
Development of the powercyber scada security testbed
-
New York, NY, USA, ACM
-
A. Hahn, B. Kregel, M. Govindarasu, J. Fitzpatrick, R. Adnan, S. Sridhar, and M. Higdon. Development of the powercyber scada security testbed. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW'10, pages 21:1-21:4, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW'10
, pp. 211-214
-
-
Hahn, A.1
Kregel, B.2
Govindarasu, M.3
Fitzpatrick, J.4
Adnan, R.5
Sridhar, S.6
Higdon, M.7
-
13
-
-
84860612406
-
Rapid synthesis of high-level architecture-based heterogeneous simulation: A model-based integration approach
-
G. Hemingway, H. Neema, H. Nine, J. Sztipanovits, and G. Karsai. Rapid synthesis of high-level architecture-based heterogeneous simulation: A model-based integration approach. SIMULATION, page 16, 03 2011.
-
(2011)
SIMULATION
, vol.3
, pp. 16
-
-
Hemingway, G.1
Neema, H.2
Nine, H.3
Sztipanovits, J.4
Karsai, G.5
-
14
-
-
1242287724
-
A framework for classifying denial of service attacks
-
A. Hussain, J. Heidemann, and C. Papadopoulos. A Framework For Classifying Denial of Service Attacks. Proc. of the Conf. on Applications, Technologies, Architectures, and Protocols for Comp. Comm. - SIGCOMM, page 99, 2003.
-
(2003)
Proc. of the Conf. on Applications, Technologies, Architectures, and Protocols for Comp. Comm. - SIGCOMM
, pp. 99
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
15
-
-
84860612408
-
DDOS experiment methodology
-
A. Hussain, S. Schwab, R. Thomas, S. Fahmy, and J. Mirkovic. DDOS experiment methodology. DETER Workshop Proceedings, 2006.
-
(2006)
DETER Workshop Proceedings
-
-
Hussain, A.1
Schwab, S.2
Thomas, R.3
Fahmy, S.4
Mirkovic, J.5
-
18
-
-
33646393232
-
RINSE: The Real-Time Immersive Network Simulation Environment for network security exercises (extended version)
-
DOI 10.1177/0037549706065544
-
M. Liljenstam, J. Liu, D. M. Nicol, Y. Yuan, G. Yan, and C. Grier. Rinse: The real-time immersive network simulation environment for network security exercises (extended version). Simulation, 82:43-59, January 2006. (Pubitemid 43676689)
-
(2006)
Simulation
, vol.82
, Issue.1
, pp. 43-59
-
-
Liljenstam, M.1
Liu, J.2
Nicol, D.M.3
Yuan, Y.4
Yan, G.5
Grier, C.6
-
20
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry. Foundations of control and estimation over lossy networks. Proceedings of the IEEE, 95:163-187, 2007.
-
(2007)
Proceedings of the IEEE
, vol.95
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.S.5
|