Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automata theory
biblio
Parametric Analyses of Attack-Fault Trees
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
risk assessment
parametric analyses
parametric timed automata
parametric weighted timed automata
power plants
pubcrawl
resilience
Resiliency
risk analysis
parameter values
Safety
safety engineering
security
security of data
tree-based formalism
trees (mathematics)
Unified modeling language
cyber-physical systems
automata
automata theory
composability
Concurrency
connected devices
Cost accounting
CPS
cyber physical systems
attack-fault trees
fault scenarios
fault trees
formal verification
imitator
Logic gates
Metrics
model-checker IMITATOR
biblio
Composing system integrity using I/O automata
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
closure properties
BIOS Security
vending machine
valid states
transition control
taxonomy
system integrity
invalid starts
invalid initial states
integrity definitions
input output automata
I/O automata
externally-controlled transitions
customer environment
computer viruses
security
Automatic control
automata theory
automata
system design
Safety
Human Factors
resilience
Resiliency
Metrics
pubcrawl
data integrity
Scalability
control systems
security of data
biblio
Application of STPA in Temporary Speed Restriction Sending Scenario of Train Control System Based on Vehicle-Vehicle Communication
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
security design requirement
Control Theory
vehicle-vehicle communication
UPPAAL
unsafe control actions
UCA
train control system
temporary speed restriction sending scenario
system theoretic process analysis method
STPA method
STPA
security design requirements
security
SDR
railway safety
railway engineering
Hazards
control defects
control defect
CD
automata theory
formal verification
control engineering computing
pubcrawl
biblio
Real-Time SCADA Attack Detection by Means of Formal Methods
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
critical machines
Chemicals
programmable controllers
programmable logic controller
Clocks
formal methods
chemical manufacturing plants
chemical substances
control smart grid
Compositionality
real-time SCADA attack detection
SCADA control systems
SCADA water distribution system
timed automata
timed automaton
timed temporal logic
water supply
security
Semantics
SCADA Systems Security
automata theory
automata
Safety
Temporal Logic
model checking
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
critical infrastructures
critical infrastructure
security of data
biblio
An Automata-based Security Policy Translation for Network Security Functions
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
Network Security Architecture
security policy translator
security policy translations
security policies
security of data
security controller
security
Resiliency
pubcrawl
Production
policy-based governance
Policy Translation
automata
IP networks
interface to network security functions
I2NSF user
I2NSF framework
Generators
Data models
Data mining
creating policies
computer network security
automata-based security policy translation
automata theory
biblio
Modeling of Information Processes for Modern Information System Security Assessment
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Information systems
security of information systems
security of data
Scalability
Resiliency
resilience
pubcrawl
Probability distribution
Probability density function
probability
policy-based governance
modeling conflict
Metrics
information theoretic security
automata
information system security assessment
information security
information influence modeling
hybrid automatons
Human Factors
Human behavior
estimation
conflict processes analysis
composability
collaboration
cellular automatons
automata theory
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
biblio
An Incremental Learner for Language-Based Anomaly Detection in XML
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Simple object access protocol
poisoning attack
protocol specifications
Protocols
pubcrawl
pushdown automata
resilience
Resiliency
Scalability
security
Semantics
signature wrapping attack
mixed-content XML
stream validation
visibly pushdown automata
Web Service
web services
Wrapping
XML
XML schema validation
XML types
XML-based protocols
zero false positives
explicit security problems
AI Poisoning
Anomaly Detection
anomaly detector
Apache Axis2
Apache Rampart
automata theory
automaton states
complex language
datatyped XML
dXVPA
Experimental Evaluation
adversarial training data
extensible markup language
grammatical inference
Human behavior
incremental learner
language representation
language-based anomaly detection
learned automaton
learning (artificial intelligence)
learning automata
message formats
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
IP security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
composability
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
automata
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
1
2
next ›
last »