-
1
-
-
84990987405
-
A review of cyber threats and defence approaches in emergency management
-
G. Loukas, D. Gan, and T. Vuong, A review of cyber threats and defence approaches in emergency management, Future Internet, vol. 5, no. 2, pp. 205-236, 2013.
-
(2013)
Future Internet
, vol.5
, Issue.2
, pp. 205-236
-
-
Loukas, G.1
Gan, D.2
Vuong, T.3
-
2
-
-
84901329715
-
A taxonomy of cyber attack and defence mechanisms for emergency management networks
-
IEEE PerNem 2013, San Diego, CA, USA
-
A taxonomy of cyber attack and defence mechanisms for emergency management networks, in Proceedings of the Third International Workshop on Pervasive Networks for Emergency Management (IEEE PerNem 2013), San Diego, CA, USA, 2013, pp. 18-22.
-
(2013)
Proceedings of the Third International Workshop on Pervasive Networks for Emergency Management
, pp. 18-22
-
-
-
3
-
-
70349997490
-
A distributed decision support system for building evacuation
-
ania, Italy: IEEE, New York, NY, USA, May 21-23
-
A. Filippoupolitis and E. Gelenbe, A distributed decision support system for building evacuation, in Proceedings of the 2nd IEEE International Conference on Human System Interaction. Catania, Italy: IEEE, New York, NY, USA, May 21-23 2009, pp. 323-330.
-
(2009)
Proceedings of the 2nd IEEE International Conference on Human System Interaction
, pp. 323-330
-
-
Filippoupolitis, A.1
Gelenbe, E.2
-
4
-
-
78149258952
-
Distributed building evacuation simulator for smart emergency management
-
N. Dimakis, A. Filippoupolitis, and E. Gelenbe, Distributed building evacuation simulator for smart emergency management, The Computer Journal, vol. 53, no. 9, pp. 1384-1400, 2010.
-
(2010)
The Computer Journal
, vol.53
, Issue.9
, pp. 1384-1400
-
-
Dimakis, N.1
Filippoupolitis, A.2
Gelenbe, E.3
-
5
-
-
85015486985
-
Future research on cyber-physical emergency management systems
-
E. Gelenbe and F.-J. Wu, Future research on cyber-physical emergency management systems, Future Internet, vol. 5, no. 3, pp. 336-354, 2013.
-
(2013)
Future Internet
, vol.5
, Issue.3
, pp. 336-354
-
-
Gelenbe, E.1
Wu, F.-J.2
-
6
-
-
84867753779
-
Emergency cyberphysical-human systems
-
IEEE
-
E. Gelenbe, G. Gorbil, and F.-J. Wu, Emergency cyberphysical-human systems, in Computer Communications and Networks (ICCCN), 2012 21st International Conference on. IEEE, 2012, pp. 1-7.
-
(2012)
Computer Communications and Networks (ICCCN) 2012 21st International Conference on
, pp. 1-7
-
-
Gelenbe, E.1
Gorbil, G.2
Wu, F.-J.3
-
7
-
-
78149263145
-
Emergency response systems for disaster management in buildings
-
A. Filippoupolitis, G. Loukas, S. Timotheou, N. Dimakis, and E. Gelenbe, Emergency response systems for disaster management in buildings, in Proceedings of the NATO Symposium on C3I for Crisis, Emergency and Consequence Management, Bucharest, Romania, 2009, pp. 1-14.
-
(2009)
Proceedings of the NATO Symposium on C3I for Crisis, Emergency and Consequence Management, Bucharest, Romania
, pp. 1-14
-
-
Filippoupolitis, A.1
Loukas, G.2
Timotheou, S.3
Dimakis, N.4
Gelenbe, E.5
-
8
-
-
72949084378
-
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
-
ACM
-
S. Timotheou and G. Loukas, Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios, in Proceedings of the 2009 ACM symposium on Applied Computing. ACM, 2009, pp. 1171-1175.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 1171-1175
-
-
Timotheou, S.1
Loukas, G.2
-
9
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, Experimental security analysis of a modern automobile, in Security and Privacy (SP), 2010 IEEE Symposium on, 2010, pp. 447-462.
-
(2010)
Security and Privacy (SP) 2010 IEEE Symposium on
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
11
-
-
84879715340
-
Evaluation of smart grid and civilian uav vulnerability to gps spoofing attacks
-
D. P. Shepard, J. A. Bhatti, T. E. Humphreys, and A. A. Fansler, Evaluation of smart grid and civilian uav vulnerability to gps spoofing attacks, in Proceedings of the ION GNSS Meeting, 2012.
-
(2012)
Proceedings of the ION GNSS Meeting
-
-
Shepard, D.P.1
Bhatti, J.A.2
Humphreys, T.E.3
Fansler, A.A.4
-
12
-
-
85088338101
-
Cyber attack vulnerabilities analysis for unmanned aerial vehicles
-
A. Kim, B. Wampler, J. Goppert, I. Hwang, and H. Aldridge, Cyber attack vulnerabilities analysis for unmanned aerial vehicles, The American Institute of Aeronautics and Astronautics: Reston, VA, USA, 2012.
-
(2012)
The American Institute of Aeronautics and Astronautics: Reston, VA, USA
-
-
Kim, A.1
Wampler, B.2
Goppert, J.3
Hwang, I.4
Aldridge, H.5
-
13
-
-
84901321692
-
A preliminary cyber-physical security assessment of the robot operating system (ros)
-
D. D. Mascarenas, J. McClean, C. J. Stull, and C. R. Farrar, A preliminary cyber-physical security assessment of the robot operating system (ros), Los Alamos National Laboratory (LANL), Tech. Rep., 2013.
-
(2013)
Los Alamos National Laboratory (LANL), Tech. Rep
-
-
Mascarenas, D.D.1
McClean, J.2
Stull, C.J.3
Farrar, C.R.4
-
14
-
-
81855183273
-
Cyberphysical systems security applied to telesurgical robotics
-
G. S. Lee and B. Thuraisingham, Cyberphysical systems security applied to telesurgical robotics, Computer Standards & Interfaces, vol. 34, no. 1, pp. 225-229, 2012.
-
(2012)
Computer Standards & Interfaces
, vol.34
, Issue.1
, pp. 225-229
-
-
Lee, G.S.1
Thuraisingham, B.2
-
15
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Verlag
-
S. Amin, A. A. Cardenas, and S. S. Sastry, Safe and secure networked control systems under denial-of-service attacks, in Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control, ser. HSCC 09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 31-45.
-
(2009)
Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control, Ser. HSCC 09. Berlin, Heidelberg: Springer
, pp. 31-45
-
-
Amin, S.1
Cardenas, A.A.2
Sastry, S.S.3
-
16
-
-
77949601382
-
Secure control against replay attacks
-
Y. Mo and B. Sinopoli, Secure control against replay attacks, in Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, 2009, pp. 911-918.
-
(2009)
Communication, Control, and Computing 2009. Allerton 2009. 47th Annual Allerton Conference on
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
17
-
-
79952527986
-
On SCADA control system command and response injection and intrusion detection
-
W. Gao, T. Morris, B. Reaves, and D. Richey, On SCADA control system command and response injection and intrusion detection, in eCrime Researchers Summit (eCrime), 2010, 2010, pp. 1-9.
-
(2010)
ECrime Researchers Summit (ECrime)
, vol.2010
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
18
-
-
72449158666
-
Discovery, infiltration, and denial of service in a process control system wireless network
-
B. Reaves and T. Morris, Discovery, infiltration, and denial of service in a process control system wireless network, in eCrime Researchers Summit, 2009. eCRIME 09., 2009, pp. 1-9.
-
(2009)
ECrime Researchers Summit 2009. ECRIME 09
, pp. 1-9
-
-
Reaves, B.1
Morris, T.2
-
19
-
-
85116480404
-
Configurable middleware-level intrusion detection for embedded systems
-
E. Naess, D. Frincke, A. McKinnon, and D. Bakken, Configurable middleware-level intrusion detection for embedded systems, in Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on, 2005, pp. 144-151.
-
(2005)
Distributed Computing Systems Workshops 2005. 25th IEEE International Conference on
, pp. 144-151
-
-
Naess, E.1
Frincke, D.2
McKinnon, A.3
Bakken, D.4
-
20
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
ser. LISA 99. Berkeley, CA, USA: USENIX Association
-
M. Roesch, Snort-lightweight intrusion detection for networks, in Proceedings of the 13th USENIX Conference on System Administration, ser. LISA 99. Berkeley, CA, USA: USENIX Association, 1999, pp. 229-238. [Online]. Available: http://dl.acm.org/citation.cfm?id=1039834.1039864
-
(1999)
Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
21
-
-
33846199593
-
A self-aware approach to denial of service defence
-
Apr
-
E. Gelenbe and G. Loukas, A self-aware approach to denial of service defence, Comput. Netw., vol. 51, no. 5, pp. 1299-1314, Apr. 2007. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2006.09.009
-
(2007)
Comput. Netw
, vol.51
, Issue.5
, pp. 1299-1314
-
-
Gelenbe, E.1
Loukas, G.2
|