-
1
-
-
0027634119
-
An investigation of the Therac-25 accidents
-
July
-
N.G. Leveson and C.S. Turner. An investigation of the Therac-25 accidents. IEEE Computer, Vol. 26(7), pp. 18-41, July 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.7
, pp. 18-41
-
-
Leveson, N.G.1
Turner, C.S.2
-
3
-
-
27544516111
-
-
03-06 Jan.
-
F. Sheldon, S. Batsell, S. Prowell, and M. A. Langston, Position statement: Methodology to support dependable survivable cyber-secure infrastructure. Proc. 38th Annual Hawaii International Conference on System Sciences, Vol. 9, pp. 110, 03-06 Jan. 2005.
-
(2005)
Position Statement: Methodology to Support Dependable Survivable Cyber-secure Infrastructure. Proc. 38th Annual Hawaii International Conference on System Sciences
, vol.9
, pp. 110
-
-
Sheldon, F.1
Batsell, S.2
Prowell, S.3
Langston, M.A.4
-
4
-
-
50649100814
-
-
USCERT Control Systems Security Center, Idaho Falls, Idaho 83415, INL/EXT-05-00671, Oct.
-
R. J. Turk. Cyber Incidents Involving Control Systems. USCERT Control Systems Security Center, Idaho Falls, Idaho 83415, INL/EXT-05-00671, Oct. 2005.
-
(2005)
Cyber Incidents Involving Control Systems
-
-
Turk, R.J.1
-
5
-
-
33846199593
-
A self-aware approach to denial of service defence
-
April
-
E. Gelenbe and G. Loukas. A Self-Aware Approach to Denial of Service Defence. Computer Networks, 51(5):1299-1314, April 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1299-1314
-
-
Gelenbe, E.1
Loukas, G.2
-
6
-
-
84881520793
-
Cyber terrorism: Problems, perspectives and prescription
-
F. Schmallager and M. Pittaro (Eds.),. Upper Saddle River, NJ: Prentice Hall
-
S.S.P. Madhava and K. Jaishankar. Cyber Terrorism: Problems, Perspectives and Prescription. In F. Schmallager and M. Pittaro (Eds.), Crimes of the Internet, pp.593-611. Upper Saddle River, NJ: Prentice Hall, 2008.
-
(2008)
Crimes of the Internet
, pp. 593-611
-
-
Madhava, S.S.P.1
Jaishankar, K.2
-
7
-
-
78149231253
-
Emergency response simulation using wireless sensor networks
-
Quebec City, Canada, Feb.
-
A. Filippoupolitis, L. Hey, G. Loukas, E. Gelenbe, and S. Timotheou. Emergency response simulation using wireless sensor networks. The 1st International Conference on Ambient Media and Systems, Quebec City, Canada, Feb. 2008.
-
(2008)
The 1st International Conference on Ambient Media and Systems
-
-
Filippoupolitis, A.1
Hey, L.2
Loukas, G.3
Gelenbe, E.4
Timotheou, S.5
-
8
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May
-
D. Halperin, T.S. Heydt-Benjamin, S.S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W.H. Maisel. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. IEEE Symp. on Security and Privacy, pp. 129-142, May 2008.
-
(2008)
IEEE Symp. on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Clark, S.S.3
Defend, B.4
Morgan, W.5
Fu, K.6
Kohno, T.7
Maisel, W.H.8
-
9
-
-
69949156439
-
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer
-
Institute of Navigation, Savanna, GA, Sep.
-
T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O'Hanlon, and P.M. Kintner, Jr. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proc. ION GNSS Conference, Institute of Navigation, Savanna, GA, Sep. 2008.
-
(2008)
Proc. ION GNSS Conference
-
-
Humphreys, T.E.1
Ledvina, B.M.2
Psiaki, M.L.3
O'Hanlon, B.W.4
Kintner Jr., P.M.5
-
10
-
-
72949084378
-
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
-
Hawaii, USA, 8-12 Mar.
-
S. Timotheou and G. Loukas. Autonomous Networked Robots for the Establishment of Wireless Communication in Uncertain Emergency Response Scenarios. Proc. ACM Symp. on Applied Computing, pp. 1171-1175, Hawaii, USA, 8-12 Mar. 2009.
-
(2009)
Proc. ACM Symp. on Applied Computing
, pp. 1171-1175
-
-
Timotheou, S.1
Loukas, G.2
-
11
-
-
78149263145
-
Emergency response systems for disaster management in buildings
-
Bucharest, May
-
A. Filippoupolitis, G. Loukas, S. Timotheou, N. Dimakis, and E. Gelenbe. Emergency response systems for disaster management in buildings. NATO Symp. on C3I for Crisis, Emergency and Consequence Management, Bucharest, May 2009.
-
(2009)
NATO Symp. on C3I for Crisis, Emergency and Consequence Management
-
-
Filippoupolitis, A.1
Loukas, G.2
Timotheou, S.3
Dimakis, N.4
Gelenbe, E.5
-
14
-
-
84889742206
-
Disaster management and community warning systems: Inter-organisational collaboration and ICT innovation
-
10-12 July
-
D. Bunker and S. Smith. Disaster management and community warning systems: inter-organisational collaboration and ICT innovation. Proc. Pacific Asia Conference on Information Systems, 10-12 July 2009.
-
(2009)
Proc. Pacific Asia Conference on Information Systems
-
-
Bunker, D.1
Smith, S.2
-
15
-
-
67651183943
-
Mitigation of control channel jamming under node capture attacks
-
Sep.
-
P. Tague, M. Li and R. Poovendran. Mitigation of Control Channel Jamming under Node Capture Attacks, IEEE Transactions on Mobile Computing, 8(9), pp. 1221-1234, Sep. 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.9
, pp. 1221-1234
-
-
Tague, P.1
Li, M.2
Poovendran, R.3
-
17
-
-
77955201139
-
Experimental Security Analysis of a Modern Automobile
-
Oakland, USA, May
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental Security Analysis of a Modern Automobile. Proc. IEEE Symposium on Security and Privacy, pp. 447-462, Oakland, USA, May 2010.
-
(2010)
Proc. IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
18
-
-
78650012077
-
Demonstrating cognitive packet network resilience to worm attacks
-
ISBN 978-1-4503-0245-6, Chicago, Il, USA, 4 - 8 Oct.
-
G. Sakellari and E. Gelenbe. Demonstrating cognitive packet network resilience to worm attacks. Proc. 17th ACM conference on Computer and communications security, pp. 636-638, ISBN 978-1-4503-0245-6, Chicago, Il, USA, 4 - 8 Oct. 2010.
-
(2010)
Proc. 17th ACM Conference on Computer and Communications Security
, pp. 636-638
-
-
Sakellari, G.1
Gelenbe, E.2
-
19
-
-
78651501030
-
Cyber security for emergency management
-
ISBN 978-1-4244-6047-2, Waltham, MA, USA, 8-10 Nov.
-
J. Walker, B.J. Williams, and G.W. Skelton. Cyber security for emergency management. IEEE International Conference on Technologies for Homeland Security (HST), pp. 476-480, ISBN 978-1-4244-6047-2, Waltham, MA, USA, 8-10 Nov. 2010.
-
(2010)
IEEE International Conference on Technologies for Homeland Security (HST)
, pp. 476-480
-
-
Walker, J.1
Williams, B.J.2
Skelton, G.W.3
-
20
-
-
78649632175
-
Analysis of information flow security in cyber-physical systems
-
Elsevier, Dec.
-
R. Akella, H. Tang and B.M. McMillin. Analysis of Information Flow Security in Cyber-Physical Systems. International Journal of Critical Infrastructure Protection, Elsevier, Vol. 3-4, pp. 157-173, Dec. 2010.
-
(2010)
International Journal of Critical Infrastructure Protection
, vol.3-4
, pp. 157-173
-
-
Akella, R.1
Tang, H.2
McMillin, B.M.3
-
22
-
-
80052411765
-
A survey on SQL injection: Vulnerabilities attacks and prevention techniques
-
Singapore, 14 - 17 June
-
D.A. Kindy and A.K. Pathan. A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques. Proc. IEEE International Symposium on Consumer Electronics, pp. 468 471, Singapore, 14 - 17 June 2011.
-
(2011)
Proc. IEEE International Symposium on Consumer Electronics
, pp. 468-471
-
-
Kindy, D.A.1
Pathan, A.K.2
-
23
-
-
80052477688
-
Survivability analysis of mobile cyber physical systems with voting-based intrusion detection
-
ISBN 978-1-4244-9539-9, IEEE Istanbul, Turkey, 4-8 July
-
R. Mitchell and I.-R. Chen. Survivability analysis of mobile cyber physical systems with voting-based intrusion detection. Proc. 7th International Wireless Communications and Mobile Computing Conference (IWCMC), ISBN 978-1-4244-9539-9, IEEE, Istanbul, Turkey, 4-8 July 2011.
-
(2011)
Proc. 7th International Wireless Communications and Mobile Computing Conference (IWCMC)
-
-
Mitchell, R.1
Chen, I.-R.2
-
24
-
-
80052533692
-
Mission cyber security situation assessment using impact dependency graphs
-
Chicago, Il, USA, 5-8 July
-
G. Jakobson. Mission cyber security situation assessment using impact dependency graphs. 14th International Conference on Information Fusion, Chicago, Il, USA, 5-8 July 2011.
-
(2011)
14th International Conference on Information Fusion
-
-
Jakobson, G.1
-
25
-
-
83755207008
-
A cyber-physical integrated security framework with fuzzy logic assessment for cultural heritages
-
ISBN 978-1-4577-0652-3, Anchorage, AK, USA, 9-12 Oct.
-
Y.-J. Chen, J.-S. Shih and S.-T. Cheng. A Cyber-Physical Integrated Security Framework with Fuzzy Logic Assessment for Cultural Heritages. Proc. of IEEE International Conference on Systems, Man and Cybernetics, pp. 1843-1847, ISBN 978-1-4577-0652-3, Anchorage, AK, USA, 9-12 Oct. 2011.
-
(2011)
Proc. of IEEE International Conference on Systems, Man and Cybernetics
, pp. 1843-1847
-
-
Chen, Y.-J.1
Shih, J.-S.2
Cheng, S.-T.3
-
26
-
-
84881530503
-
A fault-tolerant emergency-aware access control scheme for cyber-physical systems
-
abs/1201.0205
-
G. Wu, D. Lu, F. Xia and L. Yao. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems. CORR, abs/1201.0205, 2012.
-
(2012)
CORR
-
-
Wu, G.1
Lu, D.2
Xia, F.3
Yao, L.4
-
27
-
-
80755144040
-
On the requirements for successful gps spoofing attacks
-
ISBN: 978-1-4503-0948-6, Chicago, USA, 17-21 Oct.
-
N.O. Tippenhauer, C. Popper, K.B. Rasmussen, and S. Capkun. On the Requirements for Successful GPS Spoofing Attacks. Proc. 18th ACM conference on Computer and communications security, ISBN: 978-1-4503-0948-6, pp. 75-86, Chicago, USA, 17-21 Oct. 2011.
-
(2011)
Proc. 18th ACM Conference on Computer and Communications Security
, pp. 75-86
-
-
Tippenhauer, N.O.1
Popper, C.2
Rasmussen, K.B.3
Capkun, S.4
-
28
-
-
84879602248
-
Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation
-
Springer, DOI: 10.1007/s11235-011-9573-6, Dec.
-
J.P.G. Sterbenz, E.K. Cetinkaya, M.A. Hameed, A. Jabbar, S. Qian, and J.P. Rohrer. Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation. Telecommunication Systems, Springer, DOI: 10.1007/s11235-011-9573-6, Dec. 2011.
-
(2011)
Telecommunication Systems
-
-
Sterbenz, J.P.G.1
Cetinkaya, E.K.2
Hameed, M.A.3
Jabbar, A.4
Qian, S.5
Rohrer, J.P.6
-
29
-
-
84861506150
-
On false data injection attacks against distributed energy routing in smart grid
-
Apr.
-
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao. On false data injection attacks against distributed energy routing in smart grid. ACM/IEEE Third International Conference on Cyber-Physical Systems, Apr. 2012.
-
(2012)
ACM/IEEE Third International Conference on Cyber-Physical Systems
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
30
-
-
79952182106
-
-
Guest Editors' Introduction, IEEE Software, March
-
P. Falcarin, C. Collberg, M. Atallah, and M. Jakubowski. Software Protection, Guest Editors' Introduction, IEEE Software, pp. 24-27, March 2011.
-
(2011)
Software Protection
, pp. 24-27
-
-
Falcarin, P.1
Collberg, C.2
Atallah, M.3
Jakubowski, M.4
-
32
-
-
84869786899
-
Towards an adaptive QoS-oriented and secure framework for wireless sensor networks in emergency situations
-
10-12 May
-
R. Haji, A. Hasbi, M. Ghallali, and B. El Ouahidi. Towards an adaptive QoS-oriented and secure framework for wireless sensor networks in emergency situations. International Conference on Multimedia Computing and Systems, pp. 1007-1011, 10-12 May 2012.
-
(2012)
International Conference on Multimedia Computing and Systems
, pp. 1007-1011
-
-
Haji, R.1
Hasbi, A.2
Ghallali, M.3
El Ouahidi, B.4
-
33
-
-
84860380324
-
Characterizing the security implications of third-party emergency alert systems over cellular text messaging services
-
June
-
P. Traynor. Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. IEEE Transactions on Mobile Computing, 11(6), pp. 983 - 994, June 2012.
-
(2012)
IEEE Transactions on Mobile Computing
, vol.11
, Issue.6
, pp. 983-994
-
-
Traynor, P.1
-
36
-
-
84878271783
-
Research on urban public safety emergency management early warning system based on technologies for the internet of things
-
C. Du and S. Zhu. Research on urban public safety emergency management early warning system based on technologies for the internet of things. 2012 International Symposium on Safety Science and Technology. Procedia Engineering, 45, pp. 748-754, 2012.
-
(2012)
2012 International Symposium on Safety Science and Technology. Procedia Engineering
, vol.45
, pp. 748-754
-
-
Du, C.1
Zhu, S.2
-
38
-
-
84881487006
-
Resilience of cyber-physical system: A case study of safe school environment
-
10.1109/EISIC.2012.10 Odense, 22-24 Aug.
-
J. Rajamaki, P. Rathod, A. Ahlgren, J. Aho, M. Takari and S. Ahlgren. Resilience of Cyber-physical System: A Case Study of Safe School Environment. Intelligence and Security Informatics Conference (EISIC), 10.1109/EISIC.2012.10, Odense, 22-24 Aug. 2012.
-
(2012)
Intelligence and Security Informatics Conference (EISIC)
-
-
Rajamaki, J.1
Rathod, P.2
Ahlgren, A.3
Aho, J.4
Takari, M.5
Ahlgren, S.6
|