Applying a Verified Trusted Computing Base to Cyber Protect a Vulnerable Traffic Control Cyber-Physical System | IEEE Conference Publication | IEEE Xplore