


default search action
HiCoNS 2012: Beijing, China
- S. Shankar Sastry, Tamer Basar, Saurabh Amin, Gabor Karsai:
1st International Conference on High Confidence Networked Systems (HiCoNS - at CPS Week 2012), HiCoNS '12, Beijing, China, April 17-18, 2012. ACM 2012, ISBN 978-1-4503-1263-9
Resilient networks
- Heath LeBlanc, Haotian Zhang, Shreyas Sundaram
, Xenofon D. Koutsoukos:
Consensus of multi-agent networks in the presence of adversaries using only local information. 1-10 - Jian Chang, Krishna K. Venkatasubramanian, Chinwendu Enyioha, Shreyas Sundaram
, George J. Pappas
, Insup Lee:
HMM-based characterization of channel behavior for networked control systems. 11-20 - Shan Liu, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
Coordinated variable structure switching in smart power systems: attacks and mitigation. 21-30
Security games
- Andrew Clark, Linda Bushnell
, Radha Poovendran
:
Leader selection games under link noise injection attacks. 31-40 - Quanyan Zhu, Tamer Basar:
A dynamic game-theoretic approach to resilient control system design for cascading failures. 41-46
Attack diagnosis
- Yilin Mo
, Bruno Sinopoli:
Integrity attacks on cyber-physical systems. 47-54 - André Teixeira
, Daniel Pérez, Henrik Sandberg
, Karl Henrik Johansson
:
Attack models and scenarios for networked control systems. 55-64 - James Weimer, Soummya Kar
, Karl Henrik Johansson
:
Distributed detection and isolation of topology attacks in power networks. 65-72
Security experimentation
- Alefiya Hussain, Saurabh Amin:
NCS security experimentation using DETER. 73-80 - Wei Yan, Yuan Xue, Xiaowei Li, Jiannian Weng, Timothy Busch, Janos Sztipanovits:
Integrated simulation and emulation platform for cyber-physical system security experimentation. 81-88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.