-
4
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces", in Usenix Security Symposium, 2011.
-
(2011)
Usenix Security Symposium
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
5
-
-
84902274711
-
Unmanned aircraft capture and control via GPS spoofing
-
A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, "Unmanned aircraft capture and control via GPS spoofing", Journal of Field Robotics, vol. 31, pp. 617-636, 2014.
-
(2014)
Journal of Field Robotics
, vol.31
, pp. 617-636
-
-
Kerns, A.J.1
Shepard, D.P.2
Bhatti, J.A.3
Humphreys, T.E.4
-
7
-
-
84901348921
-
Physical indicators of cyber attacks against a rescue robot
-
IEEE
-
T. Vuong, A. Filippoupolitis, G. Loukas, and D. Gan, "Physical indicators of cyber attacks against a rescue robot", in IEEE International Conference on Pervasive Computing and Communications, pp. 338-343, IEEE, 2014.
-
(2014)
IEEE International Conference on Pervasive Computing and Communications
, pp. 338-343
-
-
Vuong, T.1
Filippoupolitis, A.2
Loukas, G.3
Gan, D.4
-
8
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems", ACM Computing Surveys (CSUR), vol. 46, no. 4, p. 55, 2014.
-
(2014)
ACM Computing Surveys (CSUR)
, vol.46
, Issue.4
, pp. 55
-
-
Mitchell, R.1
Chen, I.-R.2
-
9
-
-
84921466887
-
Sensory channel threats to cyber physical systems: A wake-up call
-
IEEE
-
A. S. Uluagac, V. Subramanian, and R. Beyah, "Sensory channel threats to cyber physical systems: A wake-up call", in 2014 IEEE Conference on Communications and Network Security (CNS), pp. 301-309, IEEE, 2014.
-
(2014)
2014 IEEE Conference on Communications and Network Security (CNS)
, pp. 301-309
-
-
Uluagac, A.S.1
Subramanian, V.2
Beyah, R.3
-
10
-
-
84964247703
-
-
T. Bonaci, J. Herron, T. Yusuf, J. Yan, T. Kohno, and H. J. Chizeck, "To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics", pp. 1-11, 2015.
-
(2015)
To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics
, pp. 1-11
-
-
Bonaci, T.1
Herron, J.2
Yusuf, T.3
Yan, J.4
Kohno, T.5
Chizeck, H.J.6
-
12
-
-
84929743589
-
Distributed intrusion detection for the security of industrial cooperative robotic systems
-
A. Fagiolini, G. Dini, and A. Bicchi, "Distributed intrusion detection for the security of industrial cooperative robotic systems", in World Congress, vol. 19, pp. 7610-7615, 2014.
-
(2014)
World Congress
, vol.19
, pp. 7610-7615
-
-
Fagiolini, A.1
Dini, G.2
Bicchi, A.3
-
13
-
-
84900600082
-
Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications
-
R. Mitchell and I.-R. Chen, "Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications", IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. PP, no. 99, p. 1, 2013.
-
(2013)
IEEE Transactions on Systems, Man, and Cybernetics: Systems
, vol.PP
, Issue.99
, pp. 1
-
-
Mitchell, R.1
Chen, I.-R.2
-
14
-
-
84913552985
-
The behavioral approach to diagnostics of cyber-physical systems
-
IEEE
-
V. Skormin, A. Dolgikh, and Z. Birnbaum, "The behavioral approach to diagnostics of cyber-physical systems", in AUTOTESTCON, 2014 IEEE, pp. 26-30, IEEE, 2014.
-
(2014)
AUTOTESTCON, 2014 IEEE
, pp. 26-30
-
-
Skormin, V.1
Dolgikh, A.2
Birnbaum, Z.3
-
16
-
-
84888315965
-
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
-
G. Kim, S. Lee, and S. Kim, "A novel hybrid intrusion detection method integrating anomaly detection with misuse detection", Expert Systems with Applications, vol. 41, no. 4, pp. 1690-1700, 2014.
-
(2014)
Expert Systems with Applications
, vol.41
, Issue.4
, pp. 1690-1700
-
-
Kim, G.1
Lee, S.2
Kim, S.3
-
18
-
-
35048886560
-
Detecting distributed denial of service (ddos) attacks through inductive learning
-
S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting distributed denial of service (ddos) attacks through inductive learning", Intelligent Data Engineering and Automated Learning, pp. 286-295, 2003.
-
(2003)
Intelligent Data Engineering and Automated Learning
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
22
-
-
27544491192
-
Rocr: Visualizing classifier performance in r
-
T. Sing, O. Sander, N. Beerenwinkel, and T. Lengauer, "Rocr: visualizing classifier performance in r", Bioinformatics, vol. 21, no. 20, pp. 3940-3941, 2005.
-
(2005)
Bioinformatics
, vol.21
, Issue.20
, pp. 3940-3941
-
-
Sing, T.1
Sander, O.2
Beerenwinkel, N.3
Lengauer, T.4
-
23
-
-
84901228893
-
Quantifying resiliency and detection latency of intrusion detection structures
-
IEEE
-
M. Striki, K. Manousakis, D. Kindred, D. Sterne, G. Lawler, N. Ivanic, and G. Tran, "Quantifying resiliency and detection latency of intrusion detection structures", in Military Communications Conference, 2009. MILCOM 2009. IEEE, pp. 1-8, IEEE, 2009.
-
(2009)
Military Communications Conference, 2009. MILCOM 2009. IEEE
, pp. 1-8
-
-
Striki, M.1
Manousakis, K.2
Kindred, D.3
Sterne, D.4
Lawler, G.5
Ivanic, N.6
Tran, G.7
-
24
-
-
84921442302
-
Latency of collaborative target detection for surveillance sensor networks
-
T.-L. Chin and W.-C. Chuang, "Latency of collaborative target detection for surveillance sensor networks", Parallel and Distributed Systems, IEEE Transactions on, vol. 26, no. 2, pp. 467-477, 2015.
-
(2015)
Parallel and Distributed Systems, IEEE Transactions on
, vol.26
, Issue.2
, pp. 467-477
-
-
Chin, T.-L.1
Chuang, W.-C.2
-
25
-
-
84990987405
-
A review of cyber threats and defence approaches in emergency management
-
G. Loukas, D. Gan, and T. Vuong, "A review of cyber threats and defence approaches in emergency management", Future Internet, vol. 5, no. 2, pp. 205-236, 2013.
-
(2013)
Future Internet
, vol.5
, Issue.2
, pp. 205-236
-
-
Loukas, G.1
Gan, D.2
Vuong, T.3
|