• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 69
Next 10 →

A Connection Pattern-based Approach to Detect Network Traffic Anomalies in Critical Infrastructures

by Béla Genge, Dorin Adrian Rusu, Piroska Haller
"... Recent trends in Critical Infrastructures (CIs), e.g., power plants and energy smart grids, showed an increased use of commodity, off-the-shelf Information and Communication Technologies (ICT) hardware and software. Although this enabled the implementation of a broad palette of new fea-tures, the pe ..."
Abstract - Add to MetaCart
-tures, the pervasive use of ICT, especially within the core of CIs, i.e., in Industrial Control Systems (ICSs), attracted a new class of attacks in which cyber disturbances propagate to the physical dimension of CIs. To ensure a more effective detection of cyber attacks against the ICS of CIs, we have de-veloped SPEAR

Managing the Risks of Cyber-Physical Systems

by Ph.D C Warren Axelrod
"... Abstract-We are increasingly seeing the merging of information systems and industrial control systems into so-called cyberphysical systems; the smart grid being a prime example. This trend leads to major risk issues because the viewpoint of those designing and developing security-critical informati ..."
Abstract - Add to MetaCart
resulting from successful attacks and believed that the worst that might happen would be financial losses. In the new cyber-physical systems world, designers and developers have to be concerned about the possibility of their systems being used as a conduit to controlling systems that have national security

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machinesiii Synthesis Lectures on Computer Architecture Editor

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

The FREEDM Architecture of Fault Tolerant Network Routing through Software Overlays ∗

by Christopher Zimmer, Frank Mueller
"... Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is available is crucial in making informed decisions. Such considerations are becoming increasingly important in today’s cyber-physi ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is available is crucial in making informed decisions. Such considerations are becoming increasingly important in today’s cyber-physical

c Copyright by

by Paul Sivilotti, Dong Xuan, Xiaodong Zhang, Hongwei Zhang
"... Messaging is a basic service in sensornets. Yet the unique system and application prop-erties of sensornets pose substantial challenges for the messaging design: Firstly, dynamic wireless links, constrained resources, and application diversity challenge the architecture and protocol design of sensor ..."
Abstract - Add to MetaCart
Messaging is a basic service in sensornets. Yet the unique system and application prop-erties of sensornets pose substantial challenges for the messaging design: Firstly, dynamic wireless links, constrained resources, and application diversity challenge the architecture and protocol design

3esis Supervisor Accepted by

by Audio-based Localisation, Benjamin Christopher Dalton, V. Michael, Benjamin Christopher Dalton , 2005
"... in partial ful2llment of the requirements for the degree of ..."
Abstract - Add to MetaCart
in partial ful2llment of the requirements for the degree of

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system
Next 10 →
Results 11 - 20 of 69
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University