<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Waseem Abbas</style></author><author><style face="normal" font="default" size="100%">Aron Laszka</style></author><author><style face="normal" font="default" size="100%">Yevgeniy Vorobeychik</style></author><author><style face="normal" font="default" size="100%">Koutsoukos, Xenofon</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Workshop on Cyber-Physical Systems Security &amp; Privacy (in Conjunction with 22nd ACM Conference on Computer and Communications Security (CCS))</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2015</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">Denver, CO</style></pub-location></record></records></xml>