Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Hicons 13 Proceedings of the 2nd International Conference on High Confidence Networked Systems
Ort / Verlag
[Place of publication not identified] : Association for Computing Machinery
Erscheinungsjahr
2013
Beschreibungen/Notizen
Bibliographic Level Mode of Issuance: Monograph
Mechanism design for robust resource management to false report in cloud computing systems / Yusuke Aoki [and others] -- An inverse correlated equilibrium framework for utility learning in multiplayer, noncooperative settings / Aaron Bestick [and others] -- Future cars : necessity for an adaptive and distributed multiple independent levels of security architecture / Alexander Camek [and others] -- A framework for privacy and security analysis of probe-based traffic information systems / Edward S. Canepa [and others] -- Bio-inspired strategy for control of viral spreading in networks / Chinwendu Enyioha [and others] -- Using channel state feedback to achieve resilience to deep fades in wireless networked control systems / Bin Hu [and others] -- Privacy-preserving release of aggregate dynamic models / Jerome Le Ny, George J. Pappas -- Algorithms for determining network robustness / Heath J. LeBlanc, Xenofon Koutsoukos -- S3A : secure system simplex architecture for enhanced security and robustness of cyber-physical systems / Sibin Mohan [and others] -- Towards synthesis of platform-aware attack-resilient control systems : extended abstract / Miroslav Pajic [and others] -- Verifying information flow properties of hybrid systems / Pavithra Prabjakar [and others] -- Achieving resilience of heterogeneous networks through predictive, formal analysis / Zhijing Qin [and others] -- Minimax control for cyber-physical systems under network packet scheduling attacks / Yasser Shoukry [and others] -- Verifiably-safe software-defined networks for CPS / Richard Skowyra [and others] -- Bounding the smallest robustly control invariant sets in networks with discrete disturbances and controls / Danielle C. Tarraf -- Contract-based blame assignment by trace analysis / Shaohui Wang [and others] -- Distributed model-invariant detection of unknown inputs in networked systems / James Weimer [and others] -- Taxonomy for description of cross-domain attacks on CPS / Mark Yampolskiy [and others].