-
2
-
-
85057090145
-
-
Boston Transportation Department
-
Boston Transportation Department. The benefits of retiming/rephasing traffic signals in the Back Bay, 2010. www.cityofboston.gov/images_documents/ The%20Benefits%20of%20Traffic%20Signal% 20Retiming%20Report_tcm3-18554.pdf.
-
(2010)
The Benefits of Retiming/Rephasing Traffic Signals in the Back Bay
-
-
-
4
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
6
-
-
84893332184
-
-
Department of Homeland Security
-
Department of Homeland Security. National infrastructure protection plan, 2013. www.dhs.gov/sites/default/files/publications/NIPP%202013_Partnering% 20for%20Critical%20Infrastructure%20Security% 20and%20Resilience_508_0.pdf.
-
(2013)
National Infrastructure Protection Plan
-
-
-
8
-
-
85030423492
-
-
PhD thesis, Marquette University, Milwaukee, Wisconsion, Dec
-
M. M. Dobersek. An Operational Comparison of Pre-Timed, Semi-Actuated, and Fully Actuated Interconnected Traffic Control Signal Systems. PhD thesis, Marquette University, Milwaukee, Wisconsion, Dec. 1998.
-
(1998)
An Operational Comparison of Pre-Timed, Semi-Actuated, and Fully Actuated Interconnected Traffic Control Signal Systems
-
-
Dobersek, M.M.1
-
9
-
-
35048904497
-
Fast de-hopping and frequency hopping pattern (FHP) estimation for DS/FHSS using neural networks
-
Springer
-
T. Elhabian, B. Zhang, and D. Shao. Fast de-hopping and frequency hopping pattern (FHP) estimation for DS/FHSS using neural networks. In Advances in Neural Networks-ISNN 2004, pages 248–253. Springer, 2004.
-
(2004)
Advances in Neural Networks-ISNN 2004
, pp. 248-253
-
-
Elhabian, T.1
Zhang, B.2
Shao, D.3
-
10
-
-
84886837301
-
-
ENCOM Wireless Data Solutions
-
ENCOM Wireless Data Solutions. Success stories. www.encomwireless.com/about-encom-wireless/ success-stories.
-
Success Stories
-
-
-
12
-
-
85030422654
-
Reversing the econolite ASC/3 traffic light controller
-
T. Goodspeed. Reversing the Econolite ASC/3 traffic light controller. In ToorCon Seattle, 2008.
-
(2008)
ToorCon Seattle
-
-
Goodspeed, T.1
-
13
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
IEEE
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy (SP), pages 129–142. IEEE, 2008.
-
(2008)
IEEE Symposium on Security and Privacy (SP)
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
14
-
-
85080492267
-
Yes it is too Wi-Fi, and no its not inherently secure
-
Mar
-
R. Havelt. Yes it is too Wi-Fi, and no its not inherently secure. Black Hat Europe, Mar. 2009.
-
(2009)
Black Hat Europe
-
-
Havelt, R.1
-
16
-
-
84905454210
-
Project shine
-
ICS-CERT. October-December
-
ICS-CERT. Project shine. ICS-CERT Newsletter Monthly Monitor, October-December, 2012.
-
(2012)
ICS-CERT Newsletter Monthly Monitor
-
-
-
17
-
-
85080562244
-
-
Institute of Transportation Engineers
-
Institute of Transportation Engineers. Detection trends, 2003. ite.org/standards/SignalSurvey.xls.
-
(2003)
Detection Trends
-
-
-
19
-
-
3543102147
-
Analysis of an electronic voting system
-
IEEE
-
T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. Analysis of an electronic voting system. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, pages 27–40. IEEE, 2004.
-
(2004)
Proceedings of the 2004 IEEE Symposium on Security and Privacy
, pp. 27-40
-
-
Kohno, T.1
Stubblefield, A.2
Rubin, A.D.3
Wallach, D.S.4
-
20
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, et al. Experimental security analysis of a modern automobile. In 2010 IEEE Symposium on Security and Privacy (SP), pages 447–462, 2010.
-
(2010)
2010 IEEE Symposium on Security and Privacy (SP)
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
-
22
-
-
84893572193
-
Cyber security and privacy issues in smart grids
-
J. Liu, Y. Xiao, S. Li, W. Liang, and C. Chen. Cyber security and privacy issues in smart grids. Communications Surveys & Tutorials, 14(4):981–997, 2012.
-
(2012)
Communications Surveys & Tutorials
, vol.14
, Issue.4
, pp. 981-997
-
-
Liu, J.1
Xiao, Y.2
Li, S.3
Liang, W.4
Chen, C.5
-
24
-
-
85080525379
-
-
Minnesota Department of Transportation. Jan
-
Minnesota Department of Transportation. Traffic signals 101 - controller operations, Jan. 2014. www.dot.state.mn.us/trafficeng/publ/signals101/2014/06_Controller_Ops.pdf.
-
(2014)
Traffic Signals 101 - Controller Operations
-
-
-
25
-
-
85076270954
-
Security analysis of a full-body scanner
-
Aug
-
K. Mowery, E. Wustrow, T. Wypych, C. Singleton, C. Comfort, E. Rescorla, S. Checkoway, J. A. Halderman, and H. Shacham. Security analysis of a full-body scanner. In 23rd USENIX Security Symposium (USENIX Security 14), Aug. 2014.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
-
-
Mowery, K.1
Wustrow, E.2
Wypych, T.3
Singleton, C.4
Comfort, C.5
Rescorla, E.6
Checkoway, S.7
Halderman, J.A.8
Shacham, H.9
-
27
-
-
85080604300
-
-
National Transportation Communications for ITS Protocol
-
National Transportation Communications for ITS Protocol. 1202 - NTCIP object definitions for ASC, 2007. www.ntcip.org/library/standards/default.asp?documents=yes&qreport=no&standard=1202.
-
(2007)
1202 - NTCIP Object Definitions for ASC
-
-
-
29
-
-
85080559082
-
-
Office of the City Auditor Austin, Texas. Mar
-
Office of the City Auditor - Austin, Texas. Traffic signal security audit, Mar. 2011. www.austintexas.gov/sites/default/files/files/Auditor/au11109.pdf.
-
(2011)
Traffic Signal Security Audit
-
-
-
32
-
-
85080527390
-
-
Mar
-
Siemens. Traffic control via the Siemens private cloud, Mar. 2014. www.siemens.com/press/pool/de/events/2014/infrastructure-cities/2014-03-intertraffic/ background-private-cloud-e.pdf.
-
(2014)
Traffic Control Via the Siemens Private Cloud
-
-
-
33
-
-
85080480599
-
-
Tennessee Department of Transportation
-
Tennessee Department of Transportation. TDOT smartway. www.tdot.state.tn.us/tdotsmartway/.
-
TDOT Smartway
-
-
-
34
-
-
85080495554
-
-
University of Michigan Transportation Research Institute. Aug. safetypilot
-
University of Michigan Transportation Research Institute. What is the safety pilot model deployment?, Aug. 2012. safetypilot.umtri.umich.edu/index.php.
-
(2012)
What Is the Safety Pilot Model Deployment?
-
-
-
35
-
-
84857542903
-
Exploiting trunked radio to support ITS network expansion and redundancy
-
E. Vorakitolan, J. P. Havlicek, M. Atiquzzaman, and R. D. Barnes. Exploiting trunked radio to support ITS network expansion and redundancy. In 22nd IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pages 761–766, 2011.
-
(2011)
22nd IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC)
, pp. 761-766
-
-
Vorakitolan, E.1
Havlicek, J.P.2
Atiquzzaman, M.3
Barnes, R.D.4
-
37
-
-
35348868785
-
Protecting transportation infrastructure
-
D. Zeng, S. S. Chawathe, H. Huang, and F. Y. Wang. Protecting transportation infrastructure. Intelligent Systems, IEEE, 22(5):8–11, 2007.
-
(2007)
Intelligent Systems, IEEE
, vol.22
, Issue.5
, pp. 8-11
-
-
Zeng, D.1
Chawathe, S.S.2
Huang, H.3
Wang, F.Y.4
-
38
-
-
84973447258
-
Hackers can mess with traffic lights to jam roads and reroute cars
-
Apr
-
K. Zetter. Hackers can mess with traffic lights to jam roads and reroute cars. Wired, Apr. 2014. www.wired.com/2014/04/traffic-lights-hacking/.
-
(2014)
Wired
-
-
Zetter, K.1
|