-
1
-
-
84919418788
-
Analysis of security threats and vulnerability for cyber-physical systems
-
Oct.
-
Y. Gao, Y. Peng, F. Xie, W. Zhao, D. Wang, X. Han, T. Lu, and Z. Li, "Analysis of security threats and vulnerability for cyber-physical systems, " in 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT), Oct. 2013, pp. 50-55
-
(2013)
2013 3rd International Conference on Computer Science and Network Technology (ICCSNT)
, pp. 50-55
-
-
Gao, Y.1
Peng, Y.2
Xie, F.3
Zhao, W.4
Wang, D.5
Han, X.6
Lu, T.7
Li, Z.8
-
4
-
-
80052996550
-
Security requirements analysis, specification, prioritization and policy development in cyber-physical systems
-
Jun.
-
K. Fletcher and X. Liu, "Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems, " in 2011 5th International Conference on Secure Software Integration Reliability Improvement Companion (SSIRI-C), Jun. 2011, pp. 106-113
-
(2011)
2011 5th International Conference on Secure Software Integration Reliability Improvement Companion (SSIRI-C)
, pp. 106-113
-
-
Fletcher, K.1
Liu, X.2
-
5
-
-
84926031676
-
Maximizing smart factory systems by incrementally updating point clouds
-
Mar
-
E. Shellshear, R. Berlin, and J. Carlson, "Maximizing Smart Factory Systems by Incrementally Updating Point Clouds, " IEEE Computer Graphics and Applications, vol. 35, no. 2, pp. 62-69, Mar. 2015
-
(2015)
IEEE Computer Graphics and Applications
, vol.35
, Issue.2
, pp. 62-69
-
-
Shellshear, E.1
Berlin, R.2
Carlson, J.3
-
6
-
-
84983156630
-
Building industrial CPS with the IEC 61499 standard on low-cost hardware platforms
-
Sep.
-
M. Garcia, F. Perez, I. Calvo, and G. Moran, "Building industrial CPS with the IEC 61499 standard on low-cost hardware platforms, " in 2014 IEEE Emerging Technology and Factory Automation (ETFA), Sep. 2014, pp. 1-4
-
(2014)
2014 IEEE Emerging Technology and Factory Automation (ETFA)
, pp. 1-4
-
-
Garcia, M.1
Perez, F.2
Calvo, I.3
Moran, G.4
-
7
-
-
84931079713
-
Securing software cryptographic primitives for embedded systems against side channel attacks
-
Oct.
-
G. Agosta, A. Barenghi, and G. Pelosi, "Securing software cryptographic primitives for embedded systems against side channel attacks, " in 2014 International Carnahan Conference on Security Technology (ICCST), Oct. 2014, pp. 1-6
-
(2014)
2014 International Carnahan Conference on Security Technology (ICCST)
, pp. 1-6
-
-
Agosta, G.1
Barenghi, A.2
Pelosi, G.3
-
9
-
-
84904467113
-
Security analysis on cyber-physical system using attack tree
-
Oct.
-
F. Xie, T. Lu, X. Guo, J. Liu, Y. Peng, and Y. Gao, "Security Analysis on Cyber-physical System Using Attack Tree, " in 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct. 2013, pp. 429-432
-
(2013)
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 429-432
-
-
Xie, F.1
Lu, T.2
Guo, X.3
Liu, J.4
Peng, Y.5
Gao, Y.6
-
11
-
-
78650956193
-
Exploitation and threat analysis of open mobile devices
-
New York, NY, USA: ACM
-
L. Liu, X. Zhang, G. Yan, and S. Chen, "Exploitation and Threat Analysis of Open Mobile Devices, " in Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ser. ANCS '09. New York, NY, USA: ACM, 2009, pp. 20-29
-
(2009)
Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, Ser. ANCS '09
, pp. 20-29
-
-
Liu, L.1
Zhang, X.2
Yan, G.3
Chen, S.4
-
12
-
-
84893489777
-
A threat to mobile cyber-physical systems: Sensor-based privacy theft attacks on android smartphones
-
Jul.
-
L. Lei, Y. Wang, J. Zhou, D. Zha, and Z. Zhang, "A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones, " in 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Jul. 2013, pp. 126-133
-
(2013)
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 126-133
-
-
Lei, L.1
Wang, Y.2
Zhou, J.3
Zha, D.4
Zhang, Z.5
-
15
-
-
84924706348
-
Stealthy denial of service strategy in cloud computing
-
Jan
-
-, "Stealthy Denial of Service Strategy in Cloud Computing, " IEEE Transactions on Cloud Computing, vol. 3, no. 1, pp. 80-94, Jan. 2015
-
(2015)
IEEE Transactions on Cloud Computing
, vol.3
, Issue.1
, pp. 80-94
-
-
Ficco, M.1
Rak, M.2
-
17
-
-
84875053957
-
A noninvasive threat analyzer for advanced metering infrastructure in smart grid
-
Mar
-
M. Rahman, E. Al-Shaer, and P. Bera, "A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid, " IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 273-287, Mar. 2013
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.1
, pp. 273-287
-
-
Rahman, M.1
Al-Shaer, E.2
Bera, P.3
-
18
-
-
84906076041
-
Context-aware vehicular cyber-physical systems with cloud support: Architecture, challenges, and solutions
-
Aug
-
J. Wan, D. Zhang, S. Zhao, L. Yang, and J. Lloret, "Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions, " IEEE Communications Magazine, vol. 52, no. 8, pp. 106-113, Aug. 2014
-
(2014)
IEEE Communications Magazine
, vol.52
, Issue.8
, pp. 106-113
-
-
Wan, J.1
Zhang, D.2
Zhao, S.3
Yang, L.4
Lloret, J.5
-
19
-
-
33847276520
-
-
F. Jammes, H. Smit, J. Martinez Lastra, and I. Delamer, "Orchestration of service-oriented manufacturing processes, " vol. 1 2 VOLS, 2005, pp. 617-624
-
(2005)
Orchestration of Service-oriented Manufacturing Processes
, vol.1-2
, pp. 617-624
-
-
Jammes, F.1
Smit, H.2
Martinez Lastra, J.3
Delamer, I.4
-
20
-
-
84960827959
-
-
Dr. Tech. thesis, Tampere University of Technology, Tampere, Finland, Aug. [Online]
-
J. Puttonen, "A Semantically Enhanced Approach for Orchestration of Web Services in Factory Automation Systems, " Dr. Tech. thesis, Tampere University of Technology, Tampere, Finland, Aug. 2014. [Online]. Available: http://dspace.cc.tut.fi/dpub/handle/123456789/22371
-
(2014)
A Semantically Enhanced Approach for Orchestration of Web Services in Factory Automation Systems
-
-
Puttonen, J.1
-
21
-
-
84964489285
-
An approach to service deployment to the service cloud
-
St. Maarten, The Netherlands Antilles, Jan.
-
J. Puttonen, A. Lobov, and J. L. Martinez Lastra, "An Approach to Service Deployment to the Service Cloud, " in ICONS 2011 : The Sixth International Conference on Systems, St. Maarten, The Netherlands Antilles, Jan. 2011, pp. 122-127
-
(2011)
ICONS 2011 : The Sixth International Conference on Systems
, pp. 122-127
-
-
Puttonen, J.1
Lobov, A.2
Martinez Lastra, J.L.3
-
22
-
-
84969792687
-
Towards self-protective multi-cloud applications-MUSA a holistic framework to support the security-intelligent lifecycle management of multi-cloud applications
-
Lisbon, Portugal, May
-
Erkuden Rios, Eider Iturbe, Leire Orue-Echevarria, Massimiliano Rak, and Valentina Casola, "Towards Self-Protective Multi-Cloud Applications-MUSA a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications, " in The 5th International Conference on Cloud Computing and Services Science (CLOSER), Lisbon, Portugal, May 2015
-
(2015)
The 5th International Conference on Cloud Computing and Services Science (CLOSER)
-
-
Rios, E.1
Iturbe, E.2
Orue-Echevarria, L.3
Rak, M.4
Casola, V.5
|