Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]Jan 1, 2016ยทDomenic Forte,Ron Perez,Yongdae Kim,Swarup Bhuniaยท 0 min read DOIType2PublicationComputerLast updated on Jan 1, 2016 AuthorsDomenic ForteAuthorsRon PerezAuthorsYongdae KimAuthorsSwarup Bhunia← Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems Jan 1, 2016This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump Jan 1, 2016 →