Author:
Chung Keywhan,Li Xiao,Tang Peicheng,Zhu Zeran,Kalbarczyk Zbigniew T.,Kesavadas Thenkurussi,Iyer Ravishankar K.
Reference44 articles.
1. HomaAlemzadeh.Data‐driven resiliency assessment of medical cyber‐physical systems. PhD thesis University of Illinois at Urbana‐Champaign 2016.
2. HomaAlemzadeh DanielChen XiaoLi ThenkurussiKesavadas Zbigniew T.Kalbarczyk andRavishankar K.Iyer.Targeted attacks on teleoperated surgical robots: Dynamic model‐based detection and mitigation. InProc. of the IEEE Intl. Conf. on Dependable Systems and Networks Toulouse France 28 June–1 July 2016 pp.395–406 2016.
3. ManosAntonakakis TimApril MichaelBailey MattBernhard ElieBursztein JaimeCochran ZakirDurumeric J.Alex Halderman LucaInvernizzi MichalisKallitsis DeepakKumar ChazLever ZaneMa JoshuaMason DamianMenscher ChadSeaman NickSullivan KurtThomas andYiZhou.Understanding the Mirai Botnet. InProc. of the USENIX Security Symp. Vancouver BC Canada 16–18 August 2017 pp.1093–1110. USENIX Association 2017.
4. Applied Dexterity Website.Applied dexterity—driving innovation in surgical robotics 2019.http://applieddexterity.com(accessed 1 May 2019).
5. RachadAtat LingjiaLiu JinsongWu GuangyuLi ChunxuanYe andYangYi.Big data meet cyber‐physical systems: A panoramic survey.CoRR abs/1810.12399 2018.http://arxiv.org/abs/1810.12399.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. stealthML: Data-driven Malware for Stealthy Data Exfiltration;2023 IEEE International Conference on Cyber Security and Resilience (CSR);2023-07-31
2. An Overview of Artificial Intelligence Used in Malware;Communications in Computer and Information Science;2022