Sign in
Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System
Conference proceeding

Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System

Stephen Hopkins, Carolyn Henry, Sikha Bagui, Amitabh Mishra, Ezhil Kalaimannan and Caroline Sangeetha John
IEEE SoutheastCon 2020
IEEE SoutheastCon (Raleigh, NC, 2020)
2020

Metrics

147 Record Views

Abstract

Details

Logo image