default search action
SAT-CPS@CODASPY 2022: Baltimore, MD, USA
- Maanak Gupta, Sajad Khorsandroo, Mahmoud Abdelsalam:
Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April 2022. ACM 2022, ISBN 978-1-4503-9229-7 - Nikhil Gupta:
Secure, Trustworthy and Scalable Digital Manufacturing Cyber-Physical System. 1 - Jamie Thorpe, Raymond Fasano, Meghan Galiardi Sahakian, Amanda Gonzales, Andrew Hahn, Joshua Morris, Timothy Ortiz, Hannah Reinbolt, Eric D. Vugrin:
A Cyber-Physical Experimentation Platform for Resilience Analysis. 3-12 - Matthew Jablonski, Duminda Wijesekera, Anoop Singhal:
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory. 13-20 - Przemyslaw Buczkowski, Pasquale Malacaria, Chris Hankin, Andrew Fielder:
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool. 21-30 - Danish Hudani, Muhammad Haseeb, Muhammad Taufiq, Muhammad Azmi Umer, Nandha Kumar Kandasamy:
A Data-Centric Approach to Generate Invariants for a Smart Grid Using Machine Learning. 31-36 - Gaurav Goyal, Peng Liu, Shamik Sural:
Securing Smart Home IoT Systems with Attribute-Based Access Control. 37-46 - Shwetha Gowdanakatte, Indrakshi Ray, Siv Hilde Houmb:
Attribute Based Access Control Model for Protecting Programmable Logic Controllers. 47-56 - Mehrnoosh Shakarami, James O. Benson, Ravi S. Sandhu:
Blockchain-Based Administration of Access in Smart Home IoT. 57-66 - Paul Georg Wagner, Jürgen Beyerer:
Quantifying Trustworthiness in Decentralized Trusted Applications. 67-76 - Max Landauer, Maximilian Frank, Florian Skopik, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber:
A Framework for Automatic Labeling of Log Datasets from Model-driven Testbeds for HIDS Evaluation. 77-86 - Felix Wruck, Vasil Sarafov, Florian Jakobsmeier, Michael Weiß:
GyroidOS: Packaging Linux with a Minimal Surface. 87-96 - Marietheres Dietz, Leon Hageman, Constantin von Hornung, Günther Pernul:
Employing Digital Twins for Security-by-Design System Testing. 97-106 - Ooi Sian En, Razvan Beuran, Yasuo Tan, Takayuki Kuroda, Takuya Kuwahara, Norihito Fujita:
SecureWeaver: Intent-Driven Secure System Designer. 107-116
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.