Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Formal Specification
biblio
A Formal Modeling and Verification Framework for Service Oriented Intelligent Production Line Design
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
service-oriented architecture
performance constraints
production engineering computing
pubcrawl
quality of service
resilience
Resiliency
service oriented
service oriented intelligent production line design
model-centric way
simulations
Software Architecture
Task Analysis
tools
Unified modeling language
verification method
web services
formal verification
application requirements
complex application
composability
CPS modeling
existing modeling methods
formal modeling
formal simulation verification framework
Formal Specification
Adaptation models
independent equipment network integration
Intelligent production line
large scale high-performance system
Mathematical model
Metrics
model and verification
model-based service-oriented integration approach
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
On the Preservation of the Trust by Regression Verification of PLC software for Cyber-Physical Systems of Systems
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
programmable controllers
Trusted Computing
trust preservation
trust inheritance analysis
system validation
software-driven systems
security of data
Scalability
Resiliency
resilience
regression verification processes
regression analysis
pubcrawl
control engineering computing
Policy-Governed Secure Collaboration
policy-based governance
PLC software
Mechanical systems
manufacturing automation
manufacturing
formal verification
Formal Specification
formal correctness analysis
false trust
cyber-physical systems of systems
cyber-physical systems
biblio
Assessing and extracting software security vulnerabilities in SOFL formal specifications
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
pubcrawl
software security vulnerabilities
software requirement specifications
software development life cycle
Software
SOFL formal specifications
SOFL
Security Vulnerability Extraction
security of data
secure software product
secure distributed systems
Resiliency
resilience
Requirement Specifications
composability
password
object-oriented languages
object oriented security
Natural languages
Metrics
Input variables
highly interconnected world
formal verification
formal specifications
Formal Specification
formal languages
Formal Language
Computer bugs
biblio
Experience Report: How to Extract Security Protocols' Specifications from C Libraries
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented languages
tools
Task Analysis
Software
security protocols
security protocol specifications
security of data
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
object-oriented programming
automatic tools
object oriented security
Metrics
Libraries
human-dependent approach
formal verification
Formal Specification
formal model
extract security protocols
documentation
composability
codelevel reverse engineering
C programming language
C libraries
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
microservices
software architects
service-oriented architecture
Servers
security restrictions
security of data
security
resulting microlevel policies
real-time behavior
pubcrawl
Protocols
protocol verification
policy-based governance
Policy Based Governance
Perturbation methods
CoCoME case study
microservice architectural style
message passing
macro-level security policy
macro-level policy
information-flow security policies
Information systems
information leaks
Information Flow
individual microservices
Formal Specification
cyber-physical systems
cyber-physical microservice architectures
computer architecture
collaboration
biblio
Scalable Translation Validation of Unverified Legacy OS Code
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
scalable verification
operating systems (computers)
Predictive Metrics
program verification
pubcrawl
PVS7 theorem prover
radare2 reverse engineering tool
Resiliency
reverse engineering
Scalability
operating systems
security
Semantics
specification languages
Theorem Proving
tools
translation validation
unverified legacy OS code
XML
Formal Specification
Metrics
composability
ARM instructions
ARM machines
ARM specification language
ARMv8 ISA
cognition
Compositionality
formal reasoning
Linux Operating System Security
formal validation
formal verification
functional security properties
Google Zircon
large-scale production operating system
Linux
Linux OS
multiple high-level source languages
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
SystemC VP
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
scalable verification
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
Scalability
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Hardware
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
« first
‹ previous
1
2
3
4
5
next ›
last »