Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
model checking
biblio
Petri Nets Based Verification of Epistemic Logic and Its Application on Protocols of Privacy and Security
Submitted by aekwall on Tue, 10/12/2021 - 3:07pm
composability
Compositionality
Computer languages
CTLK
epistemic logic
model checking
OBDD
Petri nets
policy-based governance
privacy
protocol verification
Protocols
pubcrawl
security
tools
biblio
Pattern-Based Approach to Modelling and Verifying System Security
Submitted by grigby1 on Mon, 10/04/2021 - 3:03pm
Algebraic specifications
composability
Design patterns
formal verification
Metals
Metrics
model checking
Object oriented modeling
object oriented security
pubcrawl
Resiliency
security
Semantics
software design
Unified modeling language
biblio
Formal Analysis and Verification of Industrial Control System Security via Timed Automata
Submitted by grigby1 on Thu, 09/30/2021 - 12:55pm
model checking
Valves
timed automata
security
Resiliency
resilience
pubcrawl
process control
PLC
multiple fault diagnosis
automata
Metrics
malware detection
malware
ICS security
Human Factors
Human behavior
cyber physical systems
Clocks
biblio
A Formal Analysis of Moving Target Defense
Submitted by grigby1 on Mon, 08/02/2021 - 3:12pm
tools
IP networks
pubcrawl
Metrics
Analytical models
Scalability
Computational modeling
verification
Switches
automata
model checking
moving target defense
configuration-based mutation
Formal Specification
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
biblio
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Submitted by aekwall on Mon, 09/28/2020 - 12:11pm
data logs
Mutation testing
actuators
CPS
model checking
cyber-physical system
supervised machine learning
code mutation
code-modification attacks
cross-validation
formal verification
invariants
learnt model
real-world water purification plant
Statistical Model Checking
SVM-based model
system modelling
water treatment systems
CPS Privacy
pubcrawl
Software
attestation
Data models
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Human behavior
Monitoring
program testing
privacy
attacks
Anomaly Detection
cyber physical systems
program diagnostics
sensors
Human Factors
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
file
Li_Explanations_for_Human_Loop_Garlan.pdf
Submitted by Jamie Presken on Wed, 07/08/2020 - 10:25am
explainable software
model checking
Self-adaptation.
biblio
Explanations for Human-on-the-loop: A Probabilistic Model Checking Approach
Submitted by Jamie Presken on Wed, 07/08/2020 - 10:24am
explainable software
model checking
Self-adaptation.
CMU
2020: July
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »