Cyber University

Results: 576



#Item
11

Automated Abstraction of Labeled Petri Nets Kevin Jones University of Utah Abstract- Due to the increasing use and complexity of embedded and cyber-physical systems, proper validation of the

Add to Reading List

Source URL: www.async.ece.utah.edu

Language: English - Date: 2015-11-04 17:38:56
    12

    Internet Governance, and Freedom in Turkey By Dr. Yaman Akdeniz, Lecturer in CyberLaw, University of Leeds, United Kingdom. Director, Cyber-Rights & CyberLiberties (UK), and a 2003 Fellow of the International Policy and

    Add to Reading List

    Source URL: www.cyber-rights.org

    Language: English - Date: 2016-08-23 02:45:25
      13

      Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

      Add to Reading List

      Source URL: cyber.harvard.edu

      - Date: 2016-01-31 21:23:48
        14

        Cyber Compellence: Applying Coercion in the Information Age Benjamin M. Jensen American University, School of International Service Marine Corps University Brandon Valeriano Cardiff University

        Add to Reading List

        Source URL: www.brandonvaleriano.com

        - Date: 2017-03-07 18:06:00
          15

          Invariant Synthesis for Verification of Parameterized Cyber-Physical Systems with Applications to Aerospace Systems Taylor T. Johnson∗ University of Texas at Arlington, Arlington, TX 76010, USA

          Add to Reading List

          Source URL: www.taylortjohnson.com

          - Date: 2013-08-02 07:12:08
            16

            The Unmasking Option: A Thought Experiment James Grimmelmann Cyber Civil Rights Symposium University of Denver Sturm College of Law 20 November 2009

            Add to Reading List

            Source URL: james.grimmelmann.net

            - Date: 2014-12-30 08:35:37
              17

              SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit (demo: https://www.youtube.com/watch?v=ez3o8aIZCDM) Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici Ben-Gurion University of the Negev Cyber Se

              Add to Reading List

              Source URL: arxiv.org

              - Date: 2016-11-22 20:06:31
                18

                Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller Sibin Mohan Dept. of Computer Science Dept. of Computer Science North Carolina State University, Raleigh, NC

                Add to Reading List

                Source URL: moss.csc.ncsu.edu

                - Date: 2010-03-29 18:00:23
                  19

                  Formal Verification of Stability Properties of Cyber-physical Systems Matthew Chan, Daniel Ricketts, Sorin Lerner, Gregory Malecha University of California, San Diego , ,

                  Add to Reading List

                  Source URL: ucsd-pl.github.io

                  - Date: 2016-10-03 11:54:14
                    20

                    University employees are an important line of defense against cyber-criminal attacks. The university has contracted with SANS, an organization that specializes in security training and research, to deliver a series of on

                    Add to Reading List

                    Source URL: hrs.missouri.edu

                    - Date: 2016-08-16 14:09:55
                      UPDATE