-
2
-
-
84869073557
-
-
Accessed 24 Feb 2012
-
Baheti R, Gill H Cyber-physical Systems. http://ieeecss.org/sites/ ieeecss.org/files/documents/IoCT-Part3-02CyberphysicalSystems.pdf. Accessed 24 Feb 2012
-
Cyber-physical Systems
-
-
Baheti, R.1
Gill, H.2
-
3
-
-
80055028776
-
Challenges for securing cyber physical systems
-
Gateway Center, Newark, NJ
-
Cardenas A, Amin S, Sinopoli B, Giani A, Perrig A, Sastry SS (2009) Challenges for securing cyber physical systems. In: Proceedings of Workshop on future directions in cyber-physical systems security, Gateway Center, Newark, NJ
-
(2009)
Proceedings of Workshop on Future Directions in Cyber-physical Systems Security
-
-
Cardenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.S.6
-
4
-
-
83755207008
-
A cyber-physical integrated security framework with fuzzy logic assessment for cultural heritages
-
Anchorage, Alaska
-
Chen Y-J, Shih J-S, Cheng S-T (2011) A cyber-physical integrated security framework with fuzzy logic assessment for cultural heritages. In: Proceedings of the conference on systems, man, and cybernetics, Anchorage, Alaska, pp 1843-1847
-
(2011)
Proceedings of the Conference on Systems, Man, and Cybernetics
, pp. 1843-1847
-
-
Chen, Y.-J.1
Shih, J.-S.2
Cheng, S.-T.3
-
5
-
-
84863023833
-
A survey on security issues of M2M communications in cyber-physical systems
-
Chen D, Hang G (2012) A survey on security issues of M2M communications in cyber-physical systems. KSII Transact Internet and Inf Sys 6:24-45
-
(2012)
KSII Transact Internet and Inf Sys
, vol.6
, pp. 24-45
-
-
Chen, D.1
Hang, G.2
-
7
-
-
85029602140
-
-
Accessed 12 May 2010
-
Cyber Physical Systems Summit (2010) http://varma.ece.cmu.edu/Summit/. Accessed 12 May 2010
-
(2010)
Cyber Physical Systems Summit
-
-
-
8
-
-
78751534019
-
Web-of-things framework for cyberphysical systems
-
10.1002/cpe.1629
-
Dillon T, Zhuge H, Wu C, Singh J, Chang E (2011) Web-of-things framework for cyberphysical systems. J Concurr Comput Pract Exp 23(9):905-923
-
(2011)
J Concurr Comput Pract Exp
, vol.23
, Issue.9
, pp. 905-923
-
-
Dillon, T.1
Zhuge, H.2
Wu, C.3
Singh, J.4
Chang, E.5
-
9
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
10.1016/S1570-8705(03)00008-8
-
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2 - 3):293-315
-
(2003)
Ad Hoc Netw
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
10
-
-
84863162296
-
Reconfigurable and parallelized network coding decoder for VANETs
-
Kim S, Ro WW (2012) Reconfigurable and parallelized network coding decoder for VANETs. Mobile Inf Sys 8(1):45-59
-
(2012)
Mobile Inf Sys
, vol.8
, Issue.1
, pp. 45-59
-
-
Kim, S.1
Ro, W.W.2
-
12
-
-
70449623243
-
A general framework for quantitative modeling of dependability in cyber-physical systems: A proposal for doctoral research
-
Seattle,US
-
Lin J, Sedigh S, Miller A (2009) A general framework for quantitative modeling of dependability in cyber-physical systems: a proposal for doctoral research. In: Proceedings of the conference on computer software and applications, Seattle,US, pp 668-671
-
(2009)
Proceedings of the Conference on Computer Software and Applications
, pp. 668-671
-
-
Lin, J.1
Sedigh, S.2
Miller, A.3
-
15
-
-
84885632136
-
S3A: Secure system simplex architecture for enhanced security of cyber-physical systems
-
Mohan S, Bak S, Betti E, Yun H, Sha L, Caccamo M, S3A: secure system simplex architecture for enhanced security of cyber-physical systems. In: Proceedings of CoRR.2012. http://arxiv.org/pdf/1202.5722.pdf
-
(2012)
Proceedings of CoRR
-
-
Mohan, S.1
Bak, S.2
Betti, E.3
Yun, H.4
Sha, L.5
Caccamo, M.6
-
16
-
-
84859448699
-
Cooperation as a service in VANET: Implementation and simulation results
-
Mousannif H, Khalil I, Olariu S (2012) Cooperation as a service in VANET: implementation and simulation results. Mobile Inf Sys 8(2):153-172
-
(2012)
Mobile Inf Sys
, vol.8
, Issue.2
, pp. 153-172
-
-
Mousannif, H.1
Khalil, I.2
Olariu, S.3
-
18
-
-
4243082091
-
Security in wireless sensor networks
-
10.1145/990680.990707
-
Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Mag Commun ACM 47(6):53-57
-
(2004)
Mag Commun ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
19
-
-
77954320949
-
Towards a trust aware cognitive radio architecture, ACM SIGMOBILE
-
10.1145/1621076.1621085
-
Qin T, Yu H, Leung C, Shen Z, Miao C (2009) Towards a trust aware cognitive radio architecture, ACM SIGMOBILE. Mobile Comput Commun 13(2):86-95
-
(2009)
Mobile Comput Commun
, vol.13
, Issue.2
, pp. 86-95
-
-
Qin, T.1
Yu, H.2
Leung, C.3
Shen, Z.4
Miao, C.5
-
20
-
-
50949110438
-
Cyber-physical systems: A new frontier
-
Taichung
-
Sha L, Gopalakrishnan S, Liu X, Wang Q (2008) Cyber-physical systems: a new frontier: In: Proceedings of the conference on sensor networks, Ubiquitous and Trustworthy Computing, Taichung, pp 1-9
-
(2008)
Proceedings of the Conference on Sensor Networks, Ubiquitous and Trustworthy Computing
, pp. 1-9
-
-
Sha, L.1
Gopalakrishnan, S.2
Liu, X.3
Wang, Q.4
-
21
-
-
84555177840
-
A survey of cyber-physical systems
-
Nanjing
-
Shi J, Wan J, Yan H, Suo H (2011) A survey of cyber-physical systems. In: Proceedings of the conference on wireless communications and signal processing, Nanjing, pp 1 - 6
-
(2011)
Proceedings of the Conference on Wireless Communications and Signal Processing
, pp. 1-6
-
-
Shi, J.1
Wan, J.2
Yan, H.3
Suo, H.4
-
22
-
-
65249174979
-
Availability analysis of application servers using software rejuvenation and virtualization
-
10.1007/s11390-009-9228-1
-
Thein T, Park JS (2009) Availability analysis of application servers using software rejuvenation and virtualization. J Comput Sci Technol 24(2):339-346
-
(2009)
J Comput Sci Technol
, vol.24
, Issue.2
, pp. 339-346
-
-
Thein, T.1
Park, J.S.2
-
23
-
-
19544394594
-
Privacy-preserving outlier detection
-
IEEE Computer Society, Washington, DC, USA
-
Vaidya J, Clifton C (2004) Privacy-preserving outlier detection. In: Proceedings of the fourth IEEE international conference on data mining (ICDM 04). IEEE Computer Society, Washington, DC, USA, pp.233-240
-
(2004)
Proceedings of the Fourth IEEE International Conference on Data Mining (ICDM 04)
, pp. 233-240
-
-
Vaidya, J.1
Clifton, C.2
-
24
-
-
84855303509
-
A secured health care application architecture for cyber-physical systems
-
Wang J, Abid H, Lee S, Shu L, Xia F (2011) A secured health care application architecture for cyber-physical systems. J Control Eng Appl Inform 13(3):101-108
-
(2011)
J Control Eng Appl Inform
, vol.13
, Issue.3
, pp. 101-108
-
-
Wang, J.1
Abid, H.2
Lee, S.3
Shu, L.4
Xia, F.5
-
26
-
-
79960924365
-
From wireless sensor networks towards cyber physical systems
-
10.1016/j.pmcj.2011.03.003
-
Wu FJ, Kao YF, Tseng YC (2011) From wireless sensor networks towards cyber physical systems. Pervasive Mobile Comput 7(4):397-413
-
(2011)
Pervasive Mobile Comput
, vol.7
, Issue.4
, pp. 397-413
-
-
Wu, F.J.1
Kao, Y.F.2
Tseng, Y.C.3
-
27
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
Urbana-Champaign, IL, USA
-
Yang H, Ye F, Yuan Y, Lu S, Arbaugh W (2005) Toward resilient security in wireless sensor networks. In: Proceedings of the conference on mobile ad hoc networking and computing, Urbana-Champaign, IL, USA, pp 34 - 45
-
(2005)
Proceedings of the Conference on Mobile Ad Hoc Networking and Computing
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
28
-
-
84876734605
-
Quality-of-service in cognitive radio networks with collaborative sensing
-
Honolulu, HI
-
Zhang C, Wang X, Guan X, Chen HH (2009) Quality-of-service in cognitive radio networks with collaborative sensing. In: Proceedings of the conferenc on global telecommunications, Honolulu, HI, pp 1 - 5
-
(2009)
Proceedings of the Conferenc on Global Telecommunications
, pp. 1-5
-
-
Zhang, C.1
Wang, X.2
Guan, X.3
Chen, H.H.4
|