Defense

Application of CPS technologies deployed in military contexts.
file

Visible to the public OODA Loops in Cyberspace: A New Cyber-Defense Model

Colonel John Boyd's Observe/Orient/Decide/Act Loop ("OODA loop") is a widely adopted decision-making analytical framework.

We combine the OODA loop with the NSA Methodology for Adversary Obstruction to create a new cyber-defense model.

event

Visible to the public  SelPhyS 2018
Apr 23, 2018 7:00 am - 6:00 pm BST

Third Workshop on Self-Awareness in Cyber-Physical Systemsp

The concept of self-awareness has become a hot research topic in a variety of disciplines such as robotics, artificial intelligence, control theory, networked systems, and so on. Its applicability has been explored in various application domains such as automotive, military, consumer electronics, industrial control, medical equipment, and so forth.

file

Visible to the public CAREER: Theoretical Foundations of the UAS in the NAS Problem

Due to increasing use by civil and federal authorities and vast commercial and amateur applications, Unmanned Aerial Systems (UAS) will be introduced into the National Air Space (NAS); the question is only how we can do this safely. NASA and the FAA are designing a new automated air traffic control system (NextGen) for all aircraft, manned or unmanned. New algorithms and tools need to be developed to enable computation of the complex questions inherent in designing such a system while proving adherence to rigorous safety standards.

file

Visible to the public CPS: Small: Integrated Reconfigurable Control and Moving Target Defense for Secure Cyber-Physical Systems

Abstract: Cyber-physical systems have been increasingly subject to cyber-attacks including code injection and code reuse attacks. With the tightly coupled nature of cyber components with the physical domain, these attacks have the potential to cause significant damage if critical applications such as automobiles are compromised. Instruction Set Randomization and Address Space Randomization have been commonly proposed to address these types of attacks.