Theoretical aspects of cyber-physical systems.
forum
Submitted by moishi on Fri, 02/18/2022 - 1:23am
4th IFAC Workshop on Cyber-Physical Human Systems
IMPORTANT DATES
forum
Submitted by nicopao on Wed, 01/26/2022 - 12:54pm
ACM HSCC 2022 Call for Posters and Demos
25th ACM International Conference on Hybrid Systems:
Computation and Control (HSCC 2022)
Part of CPS-IoT Week 2022
May 4-6, 2022
Milan, Italy
URL: https://hscc.acm.org/2022/
============================================================
# Scope of HSCC
forum
Submitted by Anonymous on Tue, 11/02/2021 - 11:29am
forum
Submitted by yusufsarwar on Mon, 08/16/2021 - 2:53am
IEEE SMARTCOMP 2021 .::. Call for Participation .::.
*********************************************************************************************************************
The 7th IEEE International Conference on Smart Computing (SMARTCOMP 2021), August 23-27, 2021.
Due to uncertainties associated with the pandemic, IEEE SMARTCOMP 2021 will be held as a virtual conference.
https://www.smart-comp.info
forum
Submitted by nicopao on Wed, 08/04/2021 - 5:14am
CALL FOR PAPERS
25th ACM International Conference on Hybrid Systems:
Computation and Control (HSCC 2022)
Part of CPS-IoT Week 2022
May 4-6, 2022
Milan, Italy
URL: https://hscc.acm.org/2022/
tearline
Submitted by Xenofon Koutsoukos on Mon, 06/14/2021 - 1:58pm
forum
Submitted by Shouhuai Xu on Wed, 05/05/2021 - 12:53pm
The 3rd International Conference on Science of Cyber Security (SciSec'2021) will be held in a hybrid mode (i.e., virtual + in-person) August 13-15, 2021.
The paper submission deadline is extended to May 31, 2021 (anywhere on earth). Please see the conference website https://scisec.org/ for more details.
Please submit your papers!
file
This paper studies the synthesis of controllers for
cyber-physical systems (CPSs) that are required to carry out
complex tasks that are time-sensitive, in the presence of an
adversary. The task is specified as a formula in metric interval
temporal logic (MITL). The adversary is assumed to have the
ability to tamper with the control input to the CPS and also
manipulate timing information perceived by the CPS. In order
to model the interaction between the CPS and the adversary, and