-
1
-
-
85044215660
-
-
Aug., Leadership Under Challenge: Information Technology R&D in a Competitive World. An Assessment of the Federal Networking and Information Technology R&D Program, Washington, DC, USA. [Online]
-
President's Council of Advisers on Science and Technology. (2007, Aug.). Leadership Under Challenge: Information Technology R&D in a Competitive World. An Assessment of the Federal Networking and Information Technology R&D Program, Washington, DC, USA. [Online]. Available: http://www.nsf.gov/ geo/geo-data-policies/pcast-nit-final.pdf.
-
(2007)
President's Council of Advisers on Science and Technology.
-
-
-
2
-
-
84903211566
-
-
St. Louis, MO, USA, Apr. 24-25, Accessed 25-. [Online]
-
Cyber-Physical Systems Executive Summary: Cyber-Physical Systems Summit, St. Louis, MO, USA, Apr. 24-25, 2008, Accessed 25-09-2012. [Online]. Available: http://varma.ece.cmu.edu/Summit/CPS-Executive-Summary.pdf.
-
(2008)
Cyber-Physical Systems Executive Summary: Cyber-Physical Systems Summit
, pp. 09-2012
-
-
-
3
-
-
49649119406
-
Cyber physical systems: Design challenges
-
E.A. Lee, "Cyber Physical Systems: Design Challenges," in Proc. 11th IEEE ISORC, 2008, pp. 363-369.
-
(2008)
Proc. 11th IEEE ISORC
, pp. 363-369
-
-
Lee, E.A.1
-
4
-
-
84903200563
-
-
CPS Week 2011, Chicago, IL, USA, Apr. [Online]
-
"Workshop OverviewVWorkshop on Foundations of Dependable and Secure Cyber-Physical Systems," in CPS Week 2011, Chicago, IL, USA, Apr. 11, 2011. [Online]. Available: https://www.truststc.org/conferences/11/CPSWeek/index.htm.
-
(2011)
Workshop Overview -Workshop on Foundations of Dependable and Secure Cyber-Physical Systems
, vol.11
-
-
-
5
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Jan.
-
Y. Mo, T.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-Physical Security of a Smart Grid Infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.-J.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
6
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
Jan.
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-Physical System Security for the Electric Power Grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
7
-
-
79956366049
-
Smart distribution: Coupled microgrids
-
June
-
R.H. Lassetter, "Smart Distribution: Coupled Microgrids," Proc. IEEE, vol. 99, no. 6, pp. 1074-1082, June 2011.
-
(2011)
Proc. IEEE
, vol.99
, Issue.6
, pp. 1074-1082
-
-
Lassetter, R.H.1
-
8
-
-
33947709561
-
-
in Plant Systematics, 2nd ed. New York, NY, USA: Academic
-
M.G. Simpson, "Chapter 1 Plant Systematics: An Overview," in Plant Systematics, 2nd ed. New York, NY, USA: Academic, 2010.
-
(2010)
Chapter 1 Plant Systematics: An Overview
-
-
Simpson, M.G.1
-
9
-
-
15744370034
-
A taxonomy of network and computer attacks
-
DOI 10.1016/j.cose.2004.06.011, PII S0167404804001804
-
S. Hansman and R. Hunt, "A Taxonomy of Network and Computer Attacks," Comput. Security, vol. 24, no. 1, pp. 31-43, Feb. 2005. (Pubitemid 40415398)
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
10
-
-
68949196337
-
A program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
Nov.
-
X.D. Hoang, J. Hu, and P. Bertok, "A Program Based Anomaly Intrusion Detection Scheme Using Multiple Detection Engines and Fuzzy Inference," J. Netw. Comput. Appl., vol. 32, no. 6, pp. 1219-1228, Nov. 2009.
-
(2009)
J. Netw. Comput. Appl.
, vol.32
, Issue.6
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
11
-
-
79956118096
-
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy
-
July
-
J. Hu, I. Khalil, S. Han, and A. Mahmood, "Seamless Integration of Dependability and Security Concepts in SOA: A Feedback Control System Based Framework and Taxonomy," J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1150-1159, July 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.4
, pp. 1150-1159
-
-
Hu, J.1
Khalil, I.2
Han, S.3
Mahmood, A.4
-
12
-
-
68949173234
-
Taxonomies of attacks and vulnerabilities in computer systems
-
Apr.
-
V.M. Igure and R.D. Williams, "Taxonomies of Attacks and Vulnerabilities in Computer Systems," IEEE Commun. Surveys Tuts., vol. 10, no. 1, pp. 6-19, Apr. 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.1
, pp. 6-19
-
-
Igure, V.M.1
Williams, R.D.2
-
13
-
-
79952918124
-
-
Univ. Memphis, Memphis, TN, USA, Tech. Rep. CS-09-003, Aug.
-
C. Simmons, C. Ellis, S. Shiva, D. Dasgupta, and Q. Wu, "AVOIDIT: A Cyber Attack Taxonomy," Univ. Memphis, Memphis, TN, USA, Tech. Rep. CS-09-003, Aug. 2009.
-
(2009)
AVOIDIT: A Cyber Attack Taxonomy
-
-
Simmons, C.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Wu, Q.5
-
14
-
-
65249152919
-
Taxonomy and framework for integrating dependability and security
-
Amsterdam The Netherlands: Elsevier
-
J. Hu, P. Bertok, and Z. Tari, "Taxonomy and Framework for Integrating Dependability and Security," in Information Assurance: Dependability and Security in Networked Systems. Amsterdam, The Netherlands: Elsevier, 2008, pp. 149-170.
-
(2008)
Information Assurance: Dependability and Security in Networked Systems
, pp. 149-170
-
-
Hu, J.1
Bertok, P.2
Tari, Z.3
-
15
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
B. Zhu, A. Joseph, and S. Sastry, "A Taxonomy of Cyber Attacks on SCADA Systems," in Proc. Int'l Conf. Cyber, Phys. Social Comput., Oct. 19-22, 2011, pp. 380-388.
-
(2011)
Proc. Int'l Conf. Cyber, Phys. Social Comput., Oct.
, vol.19-22
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
16
-
-
55549097482
-
Towards a taxonomy of attacks against energy control systems
-
Berlin, Germany: Springer-Verlag, ch. 1
-
T. Fleury, H. Khurana, and V. Welch, "Towards a Taxonomy of Attacks Against Energy Control Systems," in Critical Infrastructure Protection II IFIP International Federation for Information Processing, vol. 290. Berlin, Germany: Springer-Verlag, 2009, pp. 71-85, ch. 1.
-
(2009)
Critical Infrastructure Protection II IFIP International Federation for Information Processing
, vol.290
, pp. 71-85
-
-
Fleury, T.1
Khurana, H.2
Welch, V.3
-
17
-
-
84903180852
-
-
Int'l Trans. Elect. Energy Syst., to be published
-
N.K. Roy, H.R. Pota, M.A. Mahmud, and M.J. Hossain, "Voltage Control of Emerging Distribution Systems With Induction Motor Loads Using Robust LQG Approach," Int'l Trans. Elect. Energy Syst., to be published.
-
Voltage Control of Emerging Distribution Systems with Induction Motor Loads Using Robust LQG Approach
-
-
Roy, N.K.1
Pota, H.R.2
Mahmud, M.A.3
Hossain, M.J.4
-
18
-
-
78249237761
-
Network traffic monitoring: Application to SCADA security
-
New York NY USA: Springer-Verlag
-
A.N. Mahmood, C. Leckie, J. Hu, Z. Tari, and M. Atiq, "Network Traffic Monitoring: Application to SCADA Security," in Springer Handbook of Information and Communication Security. NewYork, NY, USA: Springer-Verlag, 2010.
-
(2010)
Springer Handbook of Information and Communication Security
-
-
Mahmood, A.N.1
Leckie, C.2
Hu, J.3
Tari, Z.4
Atiq, M.5
-
19
-
-
65249107163
-
A simple and efficient data processing scheme for HMM based anomaly intrusion detection
-
Jan./Feb.
-
J. Hu, D. Qiu, H.H. Chen, and X. Yu, "A Simple and Efficient Data Processing Scheme for HMM Based Anomaly Intrusion Detection," IEEE Netw., vol. 23, no. 1, pp. 42-47, Jan./Feb. 2009.
-
(2009)
IEEE Netw.
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Qiu, D.2
Chen, H.H.3
Yu, X.4
-
20
-
-
84897137099
-
A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
-
Apr.
-
G. Creech and J. Hu, "A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns," IEEE Trans. Comput., vol. 63, no. 4, pp. 807-819, Apr. 2014.
-
(2014)
IEEE Trans. Comput.
, vol.63
, Issue.4
, pp. 807-819
-
-
Creech, G.1
Hu, J.2
-
21
-
-
83755229749
-
-
Springer Handbook of Information and Communication Security. NewYork NY USA: Springer-Verlag
-
K. Xi and J. Hu, "Introduction to Bio-Cryptography," in Springer Handbook of Information and Communication Security. NewYork, NY, USA: Springer-Verlag, 2010.
-
(2010)
Introduction to Bio-Cryptography
-
-
Xi, K.1
Hu, J.2
-
22
-
-
84864281081
-
Alignment-free cancellable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
-
Dec.
-
S. Wang and J. Hu, "Alignment-Free Cancellable Fingerprint Template Design: A Densely Infinite-to-One Mapping (DITOM) Approach," Pattern Recognit., vol. 45, no. 12, pp. 4129-4137, Dec. 2012.
-
(2012)
Pattern Recognit.
, vol.45
, Issue.12
, pp. 4129-4137
-
-
Wang, S.1
Hu, J.2
-
23
-
-
79958822548
-
Pair-polar coordinate based cancellable fingerprint templates
-
Oct./Nov.
-
T. Ahmad, J. Hu, and S. Wang, "Pair-Polar Coordinate Based Cancellable Fingerprint Templates," Patter Recognit., vol. 44, no. 10/11, pp. 2555-2564, Oct./Nov. 2011.
-
(2011)
Patter Recognit.
, vol.44
, Issue.10-11
, pp. 2555-2564
-
-
Ahmad, T.1
Hu, J.2
Wang, S.3
|