Login / Signup

Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions.

Sunandan AdhikaryIpsita KoleySaurav Kumar GhoshSumana GhoshSoumyajit DeyDebdeep Mukhopadhyay
Published in: CPSIOTSEC@CCS (2020)
Keyphrases
  • cyber physical
  • cyber physical systems
  • social networks
  • identity management
  • control system
  • situation awareness
  • real time
  • data warehouse
  • physical world