default search action
HiCoNS 2014: Berlin, Germany
- Linda Bushnell, Larry Rohrbough, Saurabh Amin, Xenofon D. Koutsoukos:
3rd International Conference on High Confidence Networked Systems (part of CPS Week), HiCoNS '14, Berlin, Germany, April 15-17, 2014. ACM 2014, ISBN 978-1-4503-2652-0
Monitoring and estimation
- Radoslav Ivanov, Miroslav Pajic, Insup Lee:
Resilient multidimensional sensor fusion using measurement history. 1-10 - Roy Dong, Lillian J. Ratliff, Henrik Ohlsson, S. Shankar Sastry:
Fundamental limits of nonintrusive load monitoring. 11-18 - Heath J. LeBlanc, Firas Hassan:
Resilient distributed parameter estimation in heterogeneous time-varying networks. 19-28
Invited talk
- Radha Poovendran:
Passivity framework for modeling, mitigating, and composing attacks on networked systems. 29-30
Application security
- Curtis R. Taylor, Krishna K. Venkatasubramanian, Craig A. Shue:
Understanding the security of interoperable medical devices using attack graphs. 31-40 - Mark Yampolskiy, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos, Péter Horváth, Heath J. LeBlanc, Janos Sztipanovits:
Resilient distributed consensus for tree topology. 41-48 - Matti Mantere, Mirko Sailio, Sami Noponen:
A module for anomaly detection in ICS networks. 49-56
Poster/demo session
- Lillian J. Ratliff, Roy Dong, Henrik Ohlsson, S. Shankar Sastry:
Energy efficiency via incentive design and utility learning. 57-58 - Katherine Rose Driggs-Campbell, Victor Shia, Ruzena Bajcsy:
Decisions for autonomous vehicles: integrating sensors, communication, and control. 59-60 - Tua Agustinus Tamba, Michael D. Lemmon:
Forecasting the resilience of networked dynamical systems under environmental perturbation. 61-62 - Dorsa Sadigh, Katherine Rose Driggs-Campbell, Ruzena Bajcsy, S. Shankar Sastry, Sanjit A. Seshia:
User interface design and verification for semi-autonomous driving. 63-64 - Marina Krotofil, Alvaro A. Cárdenas:
Is this a good time?: deciding when to launch attacks on process control systems. 65-66
Verification
- Nikola Trcka, Mark Moulin, Shaunak D. Bopardikar, Alberto Speranzon:
A formal verification approach to revealing stealth attacks on networked control systems. 67-76 - Phillip Lee, Omar Saleh, Basel Alomair, Linda Bushnell, Radha Poovendran:
Graph-based verification and misbehavior detection in multi-agent networks. 77-84 - Ashish Tiwari, Bruno Dutertre, Dejan Jovanovic, Thomas de Candia, Patrick Lincoln, John M. Rushby, Dorsa Sadigh, Sanjit A. Seshia:
Safety envelope for security. 85-94
Networked and distributed control systems
- Bin Hu, Michael D. Lemmon:
Distributed switching control to achieve resilience to deep fades in leader-follower nonholonomic systems. 95-104 - Zhenqi Huang, Yu Wang, Sayan Mitra, Geir E. Dullerud:
On the cost of differential privacy in distributed control systems. 105-114 - Emeka Eyisi, Xenofon D. Koutsoukos:
Energy-based attack detection in networked control systems. 115-124
Invited talk
- Alvaro A. Cárdenas:
From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems. 125-126
On improving CPS resilience by integrating robust control and theory of incentives
- Erik Miehling, Demosthenis Teneketzis:
Multilateral trades in interconnected power systems: a local public goods approach. 127-134 - Lina Perelman, Saurabh Amin:
A network interdiction model for analyzing the vulnerability of water distribution systems. 135-144 - Galina A. Schwartz, S. Shankar Sastry:
Cyber-insurance framework for large scale interdependent networks. 145-154
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.