Security of interdependent and identical networked control systems
暂无分享,去创建一个
[1] T. S. Adams,et al. National Bureau of Economic Research, Inc. , 1920, Quarterly Publications of the American Statistical Association.
[2] H. Kunreuther,et al. Interdependent Security , 2003 .
[3] Peter Honeyman,et al. Interdependence of Reliability and Security , 2007, WEIS.
[4] Nicholas Bambos,et al. Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[5] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[6] Tyler Moore,et al. Security Economics and European Policy , 2008, WEIS.
[7] Marc Lelarge,et al. Network externalities and the deployment of security features and protocols in the internet , 2008, SIGMETRICS '08.
[8] Annette Hofmann,et al. Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks , 2007 .
[9] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[10] Marc Lelarge,et al. Economics of malware: Epidemic risks model, network externalities and incentives , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] Tansu Alpcan,et al. Dynamic Control and Mitigation of Interdependent IT Security Risks , 2010, 2010 IEEE International Conference on Communications.
[12] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[13] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[14] Rainer Böhme,et al. Modeling Cyber-Insurance: Towards a Unifying Framework , 2010, WEIS.
[15] Ross J. Anderson,et al. Security Economics and Critical National Infrastructure , 2009, WEIS.
[16] Herbert S. Lin,et al. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities , 2009 .
[17] Richard M. Murray,et al. Data Transmission Over Networks for Estimation and Control , 2009, IEEE Transactions on Automatic Control.
[18] Tamer Basar,et al. Optimal control of LTI systems over unreliable communication links , 2006, Autom..
[19] Panos J. Antsaklis,et al. Special Issue on Technology of Networked Control Systems , 2007 .
[20] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[21] Huseyin Cavusoglu,et al. The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..
[22] Tansu Alpcan,et al. Network Security , 2010 .
[23] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[24] N. Bambos,et al. Security investment games of interdependent organizations , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.