Similar Items: Attacker Control and Impact for Confidentiality and Integrity
- C8s: A Confidential Kubernetes Architecture
- Discovering, quantifying, and displaying attacks
- Dynamic Network Reconfiguration for Mitigating Price Integrity Attacks in Grid-Aware Price-Based Demand Response
- Controllability and Observability of Real-Time Implementation of Smart Grid Cyber-Physical Systems Under Adversarial Attacks
- Joint Accuracy and Confidentiality in Semantic-Aware Secure Remote Reconstruction
- Lattice Basis Reduction Attack on Matrix NTRU