Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal logic
biblio
Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT CK and STRIDE Frameworks as Blackboard Architecture Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
maintenance engineering
Weapons
trees (mathematics)
tree-structures
threat trees
Terminology
Software Architecture
security of data
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
MITRE ATT&CK frameworks
Microsoft's STRIDE
ATT&CK framework
formal logic
defense trees
Decision Making
cybersecurity attacks
Cybersecurity
Cyber Kill Chain
computer architecture
command and control systems
Chained Attacks
blackboard architecture cyber command entity attack route
blackboard architecture
BACCER
attack trees
attack decision making logic
biblio
A Trust Logic for Pre-Trust Computations
Submitted by aekwall on Mon, 11/23/2020 - 11:37am
Human behavior
human trust
trust logic
subjective logic
social systems
pre-trust computations
logical language
JØsang Subjective Logic
formal languages
computational trust model
computational trust
security of data
formal logic
Semantics
Syntactics
Feeds
uncertainty
social networking (online)
Computational modeling
pubcrawl
Trusted Computing
security
biblio
About possibilities of applying logical analysis of natural language in computer science
Submitted by aekwall on Mon, 11/02/2020 - 2:30pm
formal representation
transparent intensional logic
semantic machine
programming language semantics
Natural languages
natural language Montague intensional logic
montague intensional logic
logical apparatuses
logical analysis of natural language
logical analysis
Human behavior
formal languages
expressive logical method
computer science
formal logic
Computing Theory and Compositionality
Compositionality
Human Factors
pubcrawl
biblio
Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
cognition
Autonomic Security
strong relevant logic
reasoning method
industrial control network security analysis
Industrial control network
forward reasoning
formal logic
industrial control network system
inference mechanisms
industrial control
computer network security
Security analysis
Communication networks
computer security
decision-making
Decision Making
Production
composability
pubcrawl
Resiliency
biblio
Deductive Verification of Distributed Protocols in First-Order Logic
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
infinite-state systems
verification problem
validity checking
Tutorials
tools
Theorem Proving
SMT solvers
Safety
pubcrawl
Protocols
protocol verification
program verification
privacy
policy-based governance
long standing research goal
logical verification conditions
automated provers
formal verification
Formal Specification
formal logic
first-order logic
distributed systems
distributed protocols
design automation
deductive verification approach
Computer languages
Compositionality
composability
complex systems
collaboration
cognition
automated theorem provers
biblio
Verification of Randomized Security Protocols
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
Upper bound
standard cryptographic primitives
sequences
sequence
secret sec
secrecy problem
randomized security protocol Verification
pubcrawl
Protocols
protocol verification
probability
privacy
policy-based collaboration
Complexity theory
nonsatisfiability problem
monadic first order logic
matching lower bound
Indistinguishability
formal logic
encryption
Electronic mail
Cryptographic Protocols
coNEXPTIME
computational complexity
computability
Compositionality