Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System
Keyword(s):
2013 ◽
Vol 7
(1)
◽
pp. 82-89
◽
Keyword(s):
2013 ◽
Vol 13
(21)
◽
pp. 4530-4534
◽
Keyword(s):
2016 ◽
Vol 461
◽
pp. 795-801
◽
2015 ◽
Vol 1
◽
pp. 26
◽