Abstract is missing.
- Resilient multidimensional sensor fusion using measurement historyRadoslav Ivanov, Miroslav Pajic, Insup Lee. 1-10 [doi]
- Fundamental limits of nonintrusive load monitoringRoy Dong, Lillian J. Ratliff, Henrik Ohlsson, S. Shankar Sastry. 11-18 [doi]
- Resilient distributed parameter estimation in heterogeneous time-varying networksHeath J. LeBlanc, Firas Hassan. 19-28 [doi]
- Passivity framework for modeling, mitigating, and composing attacks on networked systemsRadha Poovendran. 29-30 [doi]
- Understanding the security of interoperable medical devices using attack graphsCurtis R. Taylor, Krishna Venkatasubramanian, Craig A. Shue. 31-40 [doi]
- Resilient distributed consensus for tree topologyMark Yampolskiy, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos, Péter Horváth, Heath J. LeBlanc, Janos Sztipanovits. 41-48 [doi]
- A module for anomaly detection in ICS networksMatti Mantere, Mirko Sailio, Sami Noponen. 49-56 [doi]
- Energy efficiency via incentive design and utility learningLillian J. Ratliff, Roy Dong, Henrik Ohlsson, S. Shankar Sastry. 57-58 [doi]
- Decisions for autonomous vehicles: integrating sensors, communication, and controlKatherine Rose Driggs-Campbell, Victor Shia, Ruzena Bajcsy. 59-60 [doi]
- Forecasting the resilience of networked dynamical systems under environmental perturbationTua Agustinus Tamba, Michael D. Lemmon. 61-62 [doi]
- User interface design and verification for semi-autonomous drivingDorsa Sadigh, Katherine Driggs-Campbell, Ruzena Bajcsy, S. Shankar Sastry, Sanjit A. Seshia. 63-64 [doi]
- Is this a good time?: deciding when to launch attacks on process control systemsMarina Krotofil, Alvaro A. Cárdenas. 65-66 [doi]
- A formal verification approach to revealing stealth attacks on networked control systemsNikola Trcka, Mark Moulin, Shaunak D. Bopardikar, Alberto Speranzon. 67-76 [doi]
- Graph-based verification and misbehavior detection in multi-agent networksPhillip Lee, Omar Saleh, Basel Alomair, Linda Bushnell, Radha Poovendran. 77-84 [doi]
- Safety envelope for securityAshish Tiwari, Bruno Dutertre, Dejan Jovanovic, Thomas de Candia, Patrick Lincoln, John M. Rushby, Dorsa Sadigh, Sanjit Seshia. 85-94 [doi]
- Distributed switching control to achieve resilience to deep fades in leader-follower nonholonomic systemsBin Hu, Michael D. Lemmon. 95-104 [doi]
- On the cost of differential privacy in distributed control systemsZhenqi Huang, Yu Wang, Sayan Mitra, Geir E. Dullerud. 105-114 [doi]
- Energy-based attack detection in networked control systemsEmeka Eyisi, Xenofon D. Koutsoukos. 115-124 [doi]
- From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systemsAlvaro A. Cárdenas. 125-126 [doi]
- Multilateral trades in interconnected power systems: a local public goods approachErik Miehling, Demosthenis Teneketzis. 127-134 [doi]
- A network interdiction model for analyzing the vulnerability of water distribution systemsLina Perelman, Saurabh Amin. 135-144 [doi]
- Cyber-insurance framework for large scale interdependent networksGalina A. Schwartz, S. Shankar Sastry. 145-154 [doi]