Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System

Choose the citation style.
Hopkins, S., Henry, C., Bagui, S., Mishra, A., Kalaimannan, E., & John, C. S. (2020). Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System. IEEE SoutheastCon 2020, Raleigh, NC. doi:10.1109/SoutheastCon44009.2020.9249758
PREVIEW Datastream