


default search action
HiCoNS 2014: Berlin, Germany
- Linda Bushnell, Larry Rohrbough, Saurabh Amin, Xenofon D. Koutsoukos:

3rd International Conference on High Confidence Networked Systems (part of CPS Week), HiCoNS '14, Berlin, Germany, April 15-17, 2014. ACM 2014, ISBN 978-1-4503-2652-0
Monitoring and estimation
- Radoslav Ivanov, Miroslav Pajic

, Insup Lee:
Resilient multidimensional sensor fusion using measurement history. 1-10 - Roy Dong, Lillian J. Ratliff, Henrik Ohlsson, S. Shankar Sastry:

Fundamental limits of nonintrusive load monitoring. 11-18 - Heath J. LeBlanc, Firas Hassan:

Resilient distributed parameter estimation in heterogeneous time-varying networks. 19-28
Invited talk
- Radha Poovendran:

Passivity framework for modeling, mitigating, and composing attacks on networked systems. 29-30
Application security
- Curtis R. Taylor

, Krishna K. Venkatasubramanian, Craig A. Shue:
Understanding the security of interoperable medical devices using attack graphs. 31-40 - Mark Yampolskiy, Yevgeniy Vorobeychik

, Xenofon D. Koutsoukos, Péter Horváth, Heath J. LeBlanc, Janos Sztipanovits:
Resilient distributed consensus for tree topology. 41-48 - Matti Mantere

, Mirko Sailio
, Sami Noponen
:
A module for anomaly detection in ICS networks. 49-56
Poster/demo session
- Lillian J. Ratliff

, Roy Dong, Henrik Ohlsson, S. Shankar Sastry:
Energy efficiency via incentive design and utility learning. 57-58 - Katherine Rose Driggs-Campbell, Victor Shia, Ruzena Bajcsy:

Decisions for autonomous vehicles: integrating sensors, communication, and control. 59-60 - Tua Agustinus Tamba

, Michael D. Lemmon:
Forecasting the resilience of networked dynamical systems under environmental perturbation. 61-62 - Dorsa Sadigh, Katherine Rose Driggs-Campbell, Ruzena Bajcsy, S. Shankar Sastry, Sanjit A. Seshia:

User interface design and verification for semi-autonomous driving. 63-64 - Marina Krotofil, Alvaro A. Cárdenas:

Is this a good time?: deciding when to launch attacks on process control systems. 65-66
Verification
- Nikola Trcka, Mark Moulin, Shaunak D. Bopardikar, Alberto Speranzon:

A formal verification approach to revealing stealth attacks on networked control systems. 67-76 - Phillip Lee, Omar Saleh, Basel Alomair

, Linda Bushnell
, Radha Poovendran
:
Graph-based verification and misbehavior detection in multi-agent networks. 77-84 - Ashish Tiwari, Bruno Dutertre, Dejan Jovanovic, Thomas de Candia, Patrick Lincoln, John M. Rushby, Dorsa Sadigh, Sanjit A. Seshia:

Safety envelope for security. 85-94
Networked and distributed control systems
- Bin Hu, Michael D. Lemmon:

Distributed switching control to achieve resilience to deep fades in leader-follower nonholonomic systems. 95-104 - Zhenqi Huang, Yu Wang

, Sayan Mitra
, Geir E. Dullerud:
On the cost of differential privacy in distributed control systems. 105-114 - Emeka Eyisi, Xenofon D. Koutsoukos:

Energy-based attack detection in networked control systems. 115-124
Invited talk
- Alvaro A. Cárdenas:

From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems. 125-126
On improving CPS resilience by integrating robust control and theory of incentives
- Erik Miehling, Demosthenis Teneketzis:

Multilateral trades in interconnected power systems: a local public goods approach. 127-134 - Lina Perelman, Saurabh Amin:

A network interdiction model for analyzing the vulnerability of water distribution systems. 135-144 - Galina A. Schwartz, S. Shankar Sastry:

Cyber-insurance framework for large scale interdependent networks. 145-154

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














