- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources1
- Resource Type
-
10
- Availability
-
10
- Author / Contributor
- Filter by Author / Creator
-
-
McMillin, Bruce (1)
-
Thudimilla, Anusha (1)
-
#Tyler Phillips, Kenneth E. (0)
-
& *Soto, E. (0)
-
& Ahmed, Khadija. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Andrews-Larson, C. (0)
-
& Archibald, J. (0)
-
& Attari, S. Z. (0)
-
& Ayala, O. (0)
-
& Babbitt, W. (0)
-
& Baek, Y. (0)
-
& Bai, F. (0)
-
& Barth-Cohen, L. (0)
-
& Bassett, L. (0)
-
& Beaulieu, C (0)
-
& Bein, E. (0)
-
& Bevis, T. (0)
-
& Biswas, G. (0)
-
- Filter by Editor
-
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Ruiz-Arias, P.M. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
A. Beygelzimer (0)
-
A. Ghate, K. Krishnaiyer (0)
-
A. I. Sacristán, J. C. (0)
-
A. Weinberg, D. Moore-Russo (0)
-
A. Weinberger (0)
-
A.I. Sacristán, J.C. Cortés-Zavala (0)
-
ACS (0)
-
AIAA (0)
-
AIAA Propulsion and Energy 2021 (0)
-
AIAA SciTech (0)
-
ASEE Manufacturing Division (0)
-
ASME (0)
-
ASME ICEF (0)
-
ASSOCIATE EDITORS: Bahar, Ivet (Department (0)
-
Aardal, Karen (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Cyber-physical system security is a significant concern in the critical infrastructure. Strong interdependencies between cyber and physical components render cyber-physical systems highly susceptible to integrity attacks such as injecting malicious data and projecting fake sensor measurements. Traditional security models partition cyber-physical systems into just two domains – high and low. This absolute partitioning is not well suited to cyber-physical systems because they comprise multiple overlapping partitions. Information flow properties, which model how inputs to a system affect its outputs across security partitions, are important considerations in cyber-physical systems. Information flows support traceability analysis that helps detect vulnerabilities and anomalous sources,more »