Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
specification languages
biblio
Improving Security in SCADA Systems through Model-checking with TLA+
Submitted by grigby1 on Mon, 03/14/2022 - 12:36pm
pubcrawl
Human behavior
resilience
Resiliency
SCADA systems
cyber-physical systems
Compositionality
manufacturing
formal specifications
Transportation
Circuits and systems
SCADA Systems Security
cyberphysical security
human factors impacting security
specification languages
trusted systems
biblio
Performing Security Proofs of Stateful Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 12:29pm
interactive-theorem-proving
tools
stateful-security-protocols
specification languages
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
automated-verification
Computer bugs
Computational modeling
Compositionality
composability
Complexity theory
collaboration
automation
biblio
Multiform Logical Time Amp; Space for Mobile Cyber-Physical System With Automated Driving Assistance System
Submitted by grigby1 on Mon, 11/08/2021 - 1:49pm
Resiliency
Trustworthy Systems
Trajectory
Time factors
specification languages
specification
space
software engineering
Safety
Roads
Autonated Driving
resilience
pubcrawl
Multiform Logical Time
cyber physical systems
cyber-physical systems
cyber physical security
composability
Clocks
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 2:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
biblio
Modeling and Analysis Cyber Threats in Power Systems Using Architecture Analysis Design Language (AADL)
Submitted by aekwall on Mon, 11/16/2020 - 2:58pm
Power Grid
Resilient Security Architectures
switching attack
Power systems security
power system information models
Model-based analysis
FDI attack
false data injection attacks
cyber-physical modeling capabilities
cyber-physical model
cyber-grid components
Architecture Analysis & Design Language
AADL
specification languages
security of data
verification techniques
cyber threats
power systems
program verification
power grids
power system security
power engineering computing
Software Architecture
cyber-physical security
pubcrawl
Resiliency
cyber-physical systems
biblio
Automated Suggestions of Security Enhancing Improvements for Software Architectures
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
connected smart household devices
Software Architecture Improvements
security improvements
security enhancing improvements
Secure Software Architecture
secure applications
nonarchitecture experts
model-based development techniques
industrial automation domain
given software architecture
design phase
security
Automated Improvements
architecture redesigns
architectural improvements
specification languages
smart home domain
Software Architecture
Automated Secure Software Engineering
composability
pubcrawl
Resiliency
biblio
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs
Submitted by grigby1 on Fri, 08/14/2020 - 11:45am
Domain-Specific Language
application programming interface
lightweight domain-specific language
large-scale C programs
IMSpec rules
API-misuse detection capability
API usage validation
API usage constraints
API misuses
bug detection
API-misuse bugs
application programming interfaces
Syntactics
Semantics
Compositionality
tools
specification languages
public domain software
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Software
Resiliency
resilience
pubcrawl
Engines
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
Scalable Translation Validation of Unverified Legacy OS Code
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
scalable verification
operating systems (computers)
Predictive Metrics
program verification
pubcrawl
PVS7 theorem prover
radare2 reverse engineering tool
Resiliency
reverse engineering
Scalability
operating systems
security
Semantics
specification languages
Theorem Proving
tools
translation validation
unverified legacy OS code
XML
Formal Specification
Metrics
composability
ARM instructions
ARM machines
ARM specification language
ARMv8 ISA
cognition
Compositionality
formal reasoning
Linux Operating System Security
formal validation
formal verification
functional security properties
Google Zircon
large-scale production operating system
Linux
Linux OS
multiple high-level source languages
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
1
2
next ›
last »