Security Games for Cyber-Physical Systems (English)
- New search for: Vigo, Roberto
- New search for: Bruni, Alessandro
- New search for: Yüksel, Ender
- New search for: Vigo, Roberto
- New search for: Bruni, Alessandro
- New search for: Yüksel, Ender
In:
Secure IT Systems
1
;
17-32
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Security Games for Cyber-Physical Systems
-
Contributors:
-
Published in:Secure IT Systems , 1 ; 17-32Lecture Notes in Computer Science ; 8208, 1 ; 17-32
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNsMauro, Alessio / Fafoutis, Xenofon / Mödersheim, Sebastian / Dragoni, Nicola et al. | 2013
- 17
-
Security Games for Cyber-Physical SystemsVigo, Roberto / Bruni, Alessandro / Yüksel, Ender et al. | 2013
- 33
-
Prevent Session Hijacking by Binding the Session to the Cryptographic Network CredentialsBurgers, Willem / Verdult, Roel / Eekelen, Marko et al. | 2013
- 51
-
Inferring Required Permissions for Statically Composed ProgramsHasu, Tero / Bagge, Anya Helene / Haveraaen, Magne et al. | 2013
- 67
-
SafeScript: JavaScript Transformation for Policy EnforcementTer Louw, Mike / Phung, Phu H. / Krishnamurti, Rohini / Venkatakrishnan, Venkat N. et al. | 2013
- 84
-
A Logic for Information Flow Analysis of Distributed ProgramsBalliu, Musard et al. | 2013
- 100
-
Dynamics and Secure Information Flow for a Higher-Order Pi-CalculusPettai, Martin / Laud, Peeter et al. | 2013
- 116
-
Lazy Programs Leak SecretsBuiras, Pablo / Russo, Alejandro et al. | 2013
- 123
-
High-Performance Qualified Digital Signatures for X-RoadAnsper, Arne / Buldas, Ahto / Freudenthal, Margus / Willemson, Jan et al. | 2013
- 139
-
Identification and Evaluation of Security Activities in Agile ProjectsAyalew, Tigist / Kidane, Tigist / Carlsson, Bengt et al. | 2013
- 154
-
PeerShare: A System Secure Distribution of Sensitive Data among Social ContactsNagy, Marcin / Asokan, N. / Ott, Jörg et al. | 2013
- 166
-
Resilience of Process Control Systems to Cyber-Physical AttacksKrotofil, Marina / Cárdenas, Alvaro A. et al. | 2013
- 183
-
Femtocell Security in Theory and PracticeBroek, Fabian / Wichers Schreur, Ronny et al. | 2013
- 199
-
Security Analysis of Building Automation NetworksAntonini, Alessio / Barenghi, Alessandro / Pelosi, Gerardo et al. | 2013
- 215
-
Controlling Data Flow with a Policy-Based Programming Language for the WebSans, Thierry / Cervesato, Iliano / Hussein, Soha et al. | 2013
- 231
-
A Survey on Control-Flow Integrity Means in Web Application FrameworksBraun, Bastian / Pollak, Christian v. / Posegga, Joachim et al. | 2013
- 247
-
Incremental Hyperproperty Model Checking via GamesMilushev, Dimiter / Clarke, Dave et al. | 2013
- 263
-
Graph k-Anonymity through k-Means and as Modular DecompositionStokes, Klara et al. | 2013
- 279
-
Domain-Based Storage Protection (DBSP) in Public Infrastructure CloudsPaladi, Nicolae / Gehrmann, Christian / Morenius, Fredric et al. | 2013
- 297
-
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS PoliciesHachem, Nabil / Garcia-Alfaro, Joaquin / Debar, Hervé et al. | 2013
- 313
-
Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-TreesBuldas, Ahto / Kroonmaa, Andres / Laanoja, Risto et al. | 2013