Foundations

Theoretical aspects of cyber-physical systems.
forum

Visible to the public ACM HSCC 2022 -- Call for Posters and Demos (deadline 14 February)

ACM HSCC 2022 Call for Posters and Demos

25th ACM International Conference on Hybrid Systems:

Computation and Control (HSCC 2022)

Part of CPS-IoT Week 2022

May 4-6, 2022

Milan, Italy

URL: https://hscc.acm.org/2022/

============================================================


# Scope of HSCC

forum

Visible to the public IEEE SMARTCOMP 2021: Call for Participation

                   IEEE SMARTCOMP 2021 .::. Call for Participation .::.
*********************************************************************************************************************
The 7th IEEE International Conference on Smart Computing (SMARTCOMP 2021), August 23-27, 2021.

Due to uncertainties associated with the pandemic, IEEE SMARTCOMP 2021 will be held as a virtual conference.

https://www.smart-comp.info

forum

Visible to the public ACM HSCC 2022 Call for Papers

CALL FOR PAPERS

25th ACM International Conference on Hybrid Systems:

Computation and Control (HSCC 2022)

Part of CPS-IoT Week 2022

May 4-6, 2022

Milan, Italy

URL: https://hscc.acm.org/2022/

forum

Visible to the public Paper submission deadline extension: The 3rd International Conference on Science of Cyber Security (SciSec'2021)

The 3rd International Conference on Science of Cyber Security (SciSec'2021) will be held in a hybrid mode (i.e., virtual + in-person) August 13-15, 2021.

The paper submission deadline is extended to May 31, 2021 (anywhere on earth). Please see the conference website https://scisec.org/ for more details.

Please submit your papers!

file

Visible to the public Control Synthesis for Cyber-Physical Systems to Satisfy MITL Objectives under Timing and Actuator Atta

This paper studies the synthesis of controllers for

cyber-physical systems (CPSs) that are required to carry out

complex tasks that are time-sensitive, in the presence of an

adversary. The task is specified as a formula in metric interval

temporal logic (MITL). The adversary is assumed to have the

ability to tamper with the control input to the CPS and also

manipulate timing information perceived by the CPS. In order

to model the interaction between the CPS and the adversary, and