Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
model checking
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chains
security chain verification
security functions
model checking
smart devices
SMT
software-defined networking
software defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
Using Security Invariant To Verify Confidentiality in Hardware Design
Submitted by grigby1 on Tue, 02/27/2018 - 2:34pm
composability
confidentiality
downgrading
Hardware Security
model checking
noninterference
pubcrawl
safety property
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
Using TLA+ in the Development of a Safety-Critical Fault-Tolerant Middleware
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
safety-critical software
railway safety
railways
Redundancy
Resiliency
safety integrity level 4
safety-critical fault-tolerant middleware
safety-critical industries
safety-critical modules
railway control applications
Software Architecture
software fault tolerance
software quality
software quality metrics
TAS Control Platform
TLA+
trusted platform modules
formal methods
C code
C language
Code Generation
complex algorithms
composability
distributed algorithms
Fault tolerant systems
fault-tolerant distributed algorithms
Algorithm design and analysis
Formal Specification
formal verification
middleware
model checking
property-driven design
pubcrawl
rail traffic control
biblio
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
security
model checking
openstack
pubcrawl
quality of service
real cloud scenarios
Resiliency
Scalability
SecSLA model
Metrics
Security Conformance
security constraints
security of data
security SLA
storage management
UPPAAL
Virtual machining
CloudBeh model
big data analysis
big data security metrics
Cloud Computing
Cloud Modeling
cloud service behaviors
cloud service provider
cloud service security conformance
cloud storage service
Big Data
CloudBeh performance metrics conformance
CloudSec
Computational modeling
contracts
CSP
data analysis
Measurement
biblio
Ransomware Inside Out
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
Metrics
smart phones
security
Resiliency
ransomware functionality
Ransomware
pubcrawl
model checking
mobile environment
mobile computing
Mobile communication
android
malware
Java
invasive software
Humanoid robots
Human behavior
formal verification
formal methods
formal method
composability
Androids
biblio
Modeling, Analyzing, and Consistency Checking Privacy Requirements Using Eddy
Submitted by grigby1 on Mon, 07/24/2017 - 1:52pm
Control Theory
data flow analysis
model checking
privacy
pubcrawl
requirements engineering
Resiliency
biblio
Recency-Bounded Verification of Dynamic Database-Driven Systems
Submitted by grigby1 on Mon, 06/05/2017 - 12:29pm
collaboration
data deletion
data-aware dynamic systems
database driven dynamic systems
formal verification
Human behavior
model checking
monadic second order logic
nested words
pubcrawl
recency boundedness
relational transition systems
Scalability
under-approximation
biblio
Model-based Security Analysis of a Water Treatment System
Submitted by grigby1 on Wed, 05/17/2017 - 1:28pm
actuator security
Attack generation
composability
cyber-physical system
Human behavior
Metrics
model checking
pubcrawl
Resiliency
security
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 12:37pm
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »