Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical systems
biblio
Criticality Analysis Process Model: Prioritizing Systems and Components
Submitted by willirn1 on Tue, 10/26/2021 - 9:42am
Baseline criticality
criticality
criticality analysis
critical components
critical programs
critical systems
information security
prioritizing components
prioritizing programs
prioritizing systems
prioritization
privacy
forum
Call for Papers: The 17th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE 2019)
Submitted by willirn1 on Mon, 06/17/2019 - 11:23am
CALL FOR PAPERS
The 17th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE 2019)
San Diego, USA | October 9-11, 2019 |
https://memocode.github.io/2019/
OVERVIEW
Calls for Papers
Architectures
Hybrid Models
Concurrency and Timing
Modeling
Resilient Systems
Validation and Verification
formal methods
modeling
critical systems
validation
verification
Announcement
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems
Submitted by BrandonB on Fri, 05/01/2015 - 8:27am
critical systems
crowd-sourced sensing
data integrity
embedded systems
mobile computing
security
trust