Team for Research in
Ubiquitous Secure Technology

Integrated Modeling, Simulation and Emulation Environment for Security Assessment of Cyber-Physical Systems
Yuan Xue

Citation
Yuan Xue. "Integrated Modeling, Simulation and Emulation Environment for Security Assessment of Cyber-Physical Systems". Talk or presentation, 3, November, 2011; Presented at the TRUST Autumn 2011 Conference.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Yuan Xue. <a
    href="http://www.truststc.org/pubs/810.html"
    ><i>Integrated Modeling, Simulation and Emulation
    Environment for Security Assessment of Cyber-Physical
    Systems</i></a>, Talk or presentation,  3,
    November, 2011; Presented at the <a
    href="http://www.truststc.org/conferences/11/FallConference">TRUST
    Autumn 2011 Conference</a>.
  • Plain text
    Yuan Xue. "Integrated Modeling, Simulation and
    Emulation Environment for Security Assessment of
    Cyber-Physical Systems". Talk or presentation,  3,
    November, 2011; Presented at the <a
    href="http://www.truststc.org/conferences/11/FallConference">TRUST
    Autumn 2011 Conference</a>.
  • BibTeX
    @presentation{Xue11_IntegratedModelingSimulationEmulationEnvironmentFor,
        author = {Yuan Xue},
        title = {Integrated Modeling, Simulation and Emulation
                  Environment for Security Assessment of
                  Cyber-Physical Systems},
        day = {3},
        month = {November},
        year = {2011},
        note = {Presented at the <a
                  href="http://www.truststc.org/conferences/11/FallConference">TRUST
                  Autumn 2011 Conference</a>},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/810.html}
    }
    

Posted by Christopher Brooks on 3 Nov 2011.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.