Cited By
View all- Liu JCorbett-Davies JFerraiuolo AIvanov ALuo MSuh GMyers ACampbell MLie DMannan MRashid ATippenhaeur N(2018)Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow ControlProceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy10.1145/3264888.3264889(48-59)Online publication date: 15-Oct-2018
- Agrawal SDas MMathuria ASrivastava S(2015)Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor NetworkProceedings of the 11th International Conference on Information Systems Security - Volume 947810.1007/978-3-319-26961-0_25(419-440)Online publication date: 16-Dec-2015
- Zage DNita-Rotaru C(2010)Robust Decentralized Virtual Coordinate Systems in Adversarial EnvironmentsACM Transactions on Information and System Security10.1145/1880022.188003213:4(1-34)Online publication date: 1-Dec-2010