Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
model checking
biblio
Accelerating SoC Security Verification and Vulnerability Detection Through Symbolic Execution
Submitted by aekwall on Fri, 04/28/2023 - 9:44am
codes
compiler security
secure SoC design
KLEE
Symbiosis
formal verification
Symbolic Execution
C++ languages
Costs
Hardware Security
model checking
Compositionality
Resiliency
Metrics
pubcrawl
Scalability
system-on-chip
Hardware
biblio
Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems
Submitted by aekwall on Thu, 02/02/2023 - 5:43pm
scalable verification
Adversarial robustness
Computational modeling
Markov processes
model checking
Probabilistic logic
Probabilistic Model Checking
Protocols
pubcrawl
Reinforcement learning
Resiliency
Scalability
Stochastic Computing Security
stochastic systems
biblio
Static Analysis of Infrastructure as Code: a Survey
Submitted by aekwall on Thu, 02/02/2023 - 5:36pm
model checking
survey
infrastructure as code
Software systems
static code analysis
Software Architecture
codes
verification
Cloud Computing
software reliability
static analysis
Bibliographies
composability
Human behavior
Resiliency
pubcrawl
Conferences
biblio
Vulnerability Detection for Smart Grid Devices via Static Analysis
Submitted by aekwall on Fri, 08/12/2022 - 4:03pm
composability
feature extraction
Human behavior
model checking
pubcrawl
Resiliency
security
smart grid devices
Smart Grids
static analysis
Syntactics
tools
vulnerability detection
biblio
Measuring Trust and Automatic Verification in Multi-Agent Systems
Submitted by grigby1 on Fri, 08/12/2022 - 2:25pm
collaboration
pubcrawl
Human behavior
resilience
Resiliency
composability
Runtime
model checking
Semantics
Software algorithms
multi-agent systems
trust
Computing Theory
Atmospheric measurements
Particle measurements
logic
biblio
A Cyber Physical System based Stochastic Process Language With NuSMV Model Checker
Submitted by grigby1 on Tue, 07/12/2022 - 3:37pm
Semantics
Cyber Dependencies
tree data structures
Stochastic Process
description language
model checking
cyber physical systems
embedded systems
Natural languages
Syntactics
pubcrawl
Compositionality
Metrics
composability
Stochastic processes
Scalability
Resiliency
resilience
Human behavior
biblio
Securing the metrological chain in IoT environments: an architectural framework
Submitted by grigby1 on Tue, 05/24/2022 - 1:50pm
maintenance engineering
software architectures
RMIAS
RAMI 4.0
Metrological Chain
IHE
FHIR
merging
model checking
IoMT
Compositionality
Metrics
tools
Smart Grids
Law
composability
Information Assurance
Instruments
Resiliency
resilience
Human behavior
pubcrawl
IoT
biblio
IoT Security and Safety Testing Toolkits for Water Distribution Systems
Submitted by grigby1 on Tue, 03/22/2022 - 1:46pm
Resiliency
toolkits
System recovery
software development
smart cities
simulation
sensor systems and applications
security
Safety
Control Theory
pubcrawl
operational technology
model checking
Internet of Things
Integrated circuit modeling
Industrial Control Systems
critical infrastructure
resilience
biblio
Software Safety Verification Framework based on Predicate Abstraction
Submitted by grigby1 on Tue, 03/15/2022 - 12:12pm
Software verification
scalable verification
predicate abstraction
Explosions
CEGAR
software safety
Compositionality
model checking
Metrics
tools
Computational modeling
Scalability
Safety
Conferences
Resiliency
resilience
pubcrawl
biblio
Formal Verification of 5G EAP-AKA Protocol
Submitted by grigby1 on Thu, 02/24/2022 - 12:31pm
composability
pubcrawl
ProVerif
protocol verification
Protocols
privacy
policy-based collaboration
model checking
formal verification
Compositionality
5G EAP-AKA
Communications technology
collaboration
codes
authentication protocol
authentication
applied Pi-Calculus
Analytical models
5g network
5G mobile communication
1
2
3
4
5
6
7
next ›
last »