Hicons 13 Proceedings of the 2nd International Conference on High Confidence Networked Systems
Corporate Authors: | , |
---|---|
Other Authors: | , , , , |
Format: | eBook |
Language: | Inglés |
Published: |
[Place of publication not identified]
Association for Computing Machinery
2013
|
Series: | ACM Conferences
|
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009714108406719 |
Table of Contents:
- Mechanism design for robust resource management to false report in cloud computing systems / Yusuke Aoki [and others]
- An inverse correlated equilibrium framework for utility learning in multiplayer, noncooperative settings / Aaron Bestick [and others]
- Future cars : necessity for an adaptive and distributed multiple independent levels of security architecture / Alexander Camek [and others]
- A framework for privacy and security analysis of probe-based traffic information systems / Edward S. Canepa [and others]
- Bio-inspired strategy for control of viral spreading in networks / Chinwendu Enyioha [and others]
- Using channel state feedback to achieve resilience to deep fades in wireless networked control systems / Bin Hu [and others]
- Privacy-preserving release of aggregate dynamic models / Jerome Le Ny, George J. Pappas
- Algorithms for determining network robustness / Heath J. LeBlanc, Xenofon Koutsoukos
- S3A : secure system simplex architecture for enhanced security and robustness of cyber-physical systems / Sibin Mohan [and others]
- Towards synthesis of platform-aware attack-resilient control systems : extended abstract / Miroslav Pajic [and others]
- Verifying information flow properties of hybrid systems / Pavithra Prabjakar [and others]
- Achieving resilience of heterogeneous networks through predictive, formal analysis / Zhijing Qin [and others]
- Minimax control for cyber-physical systems under network packet scheduling attacks / Yasser Shoukry [and others]
- Verifiably-safe software-defined networks for CPS / Richard Skowyra [and others]
- Bounding the smallest robustly control invariant sets in networks with discrete disturbances and controls / Danielle C. Tarraf
- Contract-based blame assignment by trace analysis / Shaohui Wang [and others]
- Distributed model-invariant detection of unknown inputs in networked systems / James Weimer [and others]
- Taxonomy for description of cross-domain attacks on CPS / Mark Yampolskiy [and others].