Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
safety-critical software
biblio
Assurance levels for decision making in autonomous intelligent systems and their safety
Submitted by grigby1 on Fri, 04/09/2021 - 10:22am
Safety
hypothetical safety limitation
Information Assurance
Metrics
policy-based governance
pubcrawl
pure decision-making capabilities
resilience
Resiliency
Human behavior
safety critical activities
safety monitoring design
safety violations
safety-critical software
Scalability
security of data
system assurance
unavoidable uncertainty
cognitive techniques dependability
assurance level
assurance level definition
autonomous intelligent system
autonomous intelligent systems safety
autonomous system decision making
cognition
cognitive functions
cognitive systems
Artificial Intelligence
collaboration
composability
cyber-physical systems
decision function
Decision Making
decision self-making
environmental information
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 12:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
A Formal Model for the Automatic Configuration of Access Protection Units in MPSoC-Based Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 10:56am
Resiliency
MPSoC-based embedded systems
multiple processing cores
multiprocessing systems
multiprocessor system-on-chip
on-chip isolation
pubcrawl
real-time systems
resilience
model-based design
Safety
safety-critical embedded system
safety-critical software
security
security-critical embedded system
system-level isolation
system-on-chip
timing
dedicated access protection units
access permissions
access protection
access protection unit
authorisation
Code Generation
composability
configuration code
Data protection
abstract permission declarations
embedded systems
formal model
Hardware
heterogeneous system-on-chip platforms
information flow requirements
information flow tracking
internal communication links
Metrics
biblio
Mixed-Trust Computing for Real-Time Systems
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
Runtime
VM hosting
virtual machines
untrusted components
trusted hypervisor
Trusted Computing
trust
traditional verification methods
timing guarantees
timing
Task Analysis
scheduling
safety-critical software
safety-critical autonomous features
Safety
complex cyber-physical systems
real-time systems
real-time mixed-trust computing framework
Raspberry Pi 3 implementation
pubcrawl
program verification
Human Factors
Human behavior
framework design
drone application
CPS critical functions
Computing Theory
Computational modeling
Complexity theory
biblio
Safe and Secure Data Fusion — Use of MILS Multicore Architecture to Reduce Cyber Threats
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
multicore-based real-time operating system
data fusion-based systems
flexible software architectures
functional assurance capabilities
High Robustness
high-robustness separation kernel certification
INTEGRITY-178 tuMP
MILS multicore architecture
multicore
multicore processor
cyber-attack space
multiple independent levels
restricted hardware access
RTOS
Separation Kernel
single-core processors
system providers
system security architecture
Resilient Security Architectures
operating systems (computers)
Resiliency
pubcrawl
Software Architecture
sensor fusion
data flows
aerospace computing
safety-critical software
scheduling
telecommunication security
security risks
multiprocessing systems
MILS
air traffic safety
architecture configurations
civil aircraft systems safety
covert channel prevention
cyber threats reduction
biblio
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
Python vulnerable function prediction
vulnerability predictors
vulnerability prediction performance
Vulnerability prediction
testing
software security
software reliability
software projects
software metrics-based vulnerability prediction
software metrics
security vulnerabilities
security of data
security
safety-critical software
code component
Python open source projects
Python
public domain software
pubcrawl
Metrics
metrics testing
Measurement
machine learning
learning (artificial intelligence)
Java vulnerable functions
Java projects
Java
code-component
biblio
Adding Cyberattacks To An Industry-Leading CAN Simulator
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
communication bus
controller area network security
cyberattacks
controller area networks
attack prevention systems
automotive cyber-security
automotive cybersecurity
CAN simulator
car
controller area network
conformance testing
cyber vulnerability
data usage
in-vehicle network
performance critical components
representative attack demonstrations
safety critical components
automobiles
Attack detection
Logic gates
safety-critical software
simulation
Intrusion Detection
testing
Roads
pubcrawl
Resiliency
cyber-physical systems
telecommunication security
Internet of Things
traffic engineering computing
security of data
Automotive engineering
biblio
Modeling Cyber Resilience for Energy Delivery Systems Using Critical System Functionality
Submitted by aekwall on Mon, 07/20/2020 - 9:32am
Energy Delivery Systems
vulnerability graph representation
Vulnerability Graph
TOPSIS
system recovery curve
security of data
safety-critical software
Resiliency
pubcrawl
matrix algebra
graph theory
graph Laplacian matrix
Computing Theory
EDS map
cyber resilience
CSF
critical system functionality
critical cyber components
Control Theory and Resiliency
analytical hierarchy process
analytic hierarchy process
AHP
resilience
biblio
Research on the Simulation Algorithm of Object-Oriented Language
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
object-oriented languages
write-back cache
visualization
system analysis and design
static protection
simulation algorithm
security model
safety-critical software
Resiliency
resilience
pure object oriented language
pubcrawl
process language
object-oriented programming
cache storage
Object-Oriented Language
object oriented security
Object oriented modeling
mixed object oriented language
Metrics
low-energy independence complexity theory
Local area networks
inheritance
GUT
Extraterrestrial measurements
dynamic protection
composability
Complexity theory
1
2
3
4
next ›
last »