-
1
-
-
0000050873
-
Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems
-
R. Alur, C. Courcoubetis, T. Henzinger, and P. Ho. Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems. Hybrid systems, pages 209-229, 1993.
-
(1993)
Hybrid Systems
, pp. 209-229
-
-
Alur, R.1
Courcoubetis, C.2
Henzinger, T.3
Ho, P.4
-
2
-
-
33745468784
-
Wireless sensor network denial of sleep attack
-
IEEE
-
M. Brownfield, Y. Gupta, and N. Davis. Wireless sensor network denial of sleep attack. In Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, pages 356-364. IEEE, 2005.
-
(2005)
Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC
, pp. 356-364
-
-
Brownfield, M.1
Gupta, Y.2
Davis, N.3
-
3
-
-
33845933985
-
Battery-sensing intrusion protection system
-
IEEE
-
T. Buennemeyer, G. Jacoby, W. Chiang, R. Marchany, and J. Tront. Battery-sensing intrusion protection system. In Information Assurance Workshop, 2006 IEEE, pages 176-183. IEEE, 2006.
-
(2006)
Information Assurance Workshop, 2006 IEEE
, pp. 176-183
-
-
Buennemeyer, T.1
Jacoby, G.2
Chiang, W.3
Marchany, R.4
Tront, J.5
-
5
-
-
84904319424
-
On Modeling Computer Networks for Vulnerability Analysis
-
C. Campbell, J. Dawkins, B. Pollet, K. Fitch, J. Hale, and M. Papa. On Modeling Computer Networks for Vulnerability Analysis. DBSec, pages 233-244, 2002.
-
(2002)
DBSec
, pp. 233-244
-
-
Campbell, C.1
Dawkins, J.2
Pollet, B.3
Fitch, K.4
Hale, J.5
Papa, M.6
-
6
-
-
77953219235
-
A Radiofrequency Identification (RFID) Temperature-Monitoring System for Extended Maintenance of Nuclear Materials Packaging
-
K. Chen, H. Tsai, Y. Liu, and J. Shuler. A Radiofrequency Identification (RFID) Temperature-Monitoring System for Extended Maintenance of Nuclear Materials Packaging. In Proceedings of 2009 ASME Pressure Vessels and Piping Division Conference, Prague, Czech Republic, 2009.
-
Proceedings of 2009 ASME Pressure Vessels and Piping Division Conference, Prague, Czech Republic, 2009
-
-
Chen, K.1
Tsai, H.2
Liu, Y.3
Shuler, J.4
-
7
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. Managing Cyber Threats, pages 247-266, 2005.
-
(2005)
Managing Cyber Threats
, pp. 247-266
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
10
-
-
84866944011
-
-
Technical report, National Science Foundation
-
Report: Cyber-physical systems summit. Technical report, National Science Foundation, 2008.
-
(2008)
Report: Cyber-physical Systems Summit
-
-
-
13
-
-
59649125973
-
Effects of denial-of-sleep attacks on wireless sensor network MAC protocols
-
D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff. Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. Vehicular Technology, IEEE Transactions on, 58(1):367-380, 2009.
-
(2009)
Vehicular Technology, IEEE Transactions on
, vol.58
, Issue.1
, pp. 367-380
-
-
Raymond, D.1
Marchany, R.2
Brownfield, M.3
Midkiff, S.4
-
14
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
IEEE Computer Society
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
|