Cyber

Results: 13321



#Item
351

Verifying Cyber-Physical Systems by Combining Software Model Checking with Hybrid Systems Reachability Sagar Chaki, SEI/CMU

Add to Reading List

Source URL: mys5.org

- Date: 2016-07-21 00:38:00
    352

    Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller Sibin Mohan Dept. of Computer Science Dept. of Computer Science North Carolina State University, Raleigh, NC

    Add to Reading List

    Source URL: moss.csc.ncsu.edu

    - Date: 2010-03-29 18:00:23
      353

      Mullings An American Cyber-Column A Red Queen Rich Galen

      Add to Reading List

      Source URL: www.mullings.com

      - Date: 2016-12-11 22:29:29
        354

        Medieninformation  –  19.  August  2016   Kontakt:  Oseon  |  Carolin  Nillert  &  Tapio  Liller  |    |  069-­25  73  80  22-­16  &  -­11   Deutsche  Cyber-­Sicherheitsorganisa

        Add to Reading List

        Source URL: mb.cision.com

        - Date: 2016-08-18 16:31:41
          355

          Hatrick: A System for Real-time Threat Detection in Cyber Physical Systems Charith Wickramaarachchi, Alok Kumbhare Charalampos Chelmis, Marc Frincu and Viktor K. Prasanna

          Add to Reading List

          Source URL: ganges.usc.edu

          - Date: 2016-02-11 18:13:02
            356

            Cyber Exercise Playbook The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designat

            Add to Reading List

            Source URL: www.mitre.org

            - Date: 2015-01-21 17:21:20
              357

              SafeConfig’16 Testing and Evaluation for Active & Resilient Cyber Systems AGENDA •

              Add to Reading List

              Source URL: www.cyberdna.uncc.edu

              - Date: 2016-10-19 15:51:52
                358

                C Consiglio Nazionale delle Ricerche A Survey on Cyber-Insurance A. Marotta, F. Martinelli, S. Nanni, A. Yautsiukhin

                Add to Reading List

                Source URL: www.iit.cnr.it

                - Date: 2015-11-27 04:33:54
                  359

                  Formal Verification of Stability Properties of Cyber-physical Systems Matthew Chan, Daniel Ricketts, Sorin Lerner, Gregory Malecha University of California, San Diego , ,

                  Add to Reading List

                  Source URL: ucsd-pl.github.io

                  - Date: 2016-10-03 11:54:14
                    360

                    When cyber gets physical: why we need the NSA Cybersecurity is so important that Clinton and Trump were asked about it in last night’s debate Tech-savvy Americans often complain about our intelligence agencies. Privac

                    Add to Reading List

                    Source URL: 18798-presscdn-pagely.netdna-ssl.com

                    - Date: 2016-10-06 18:23:39
                      UPDATE