Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
safety-critical software
biblio
Alternatives to Fault Injections for Early Safety/Security Evaluations
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
Human Factors
Security Risk Estimation
system dependability constraints
RTL fault injection campaigns
radiation testing
market pressure
ISO 26262
intertwined hardware
HW-SW systems
functional safety standards
fault injections
dependability analysis
cyber physical systems
hardware-software codesign
Circuit faults
CPS
Safety
safety-critical software
ISO standards
cost reduction
Reliability
Metrics
pubcrawl
Resiliency
Time measurement
system-on-chip
SoC
embedded systems
Software
Hardware
Scalability
security of data
biblio
Resiliency Demands on Next Generation Critical Embedded Systems
Submitted by grigby1 on Wed, 02/26/2020 - 4:47pm
intrusion tolerance
Trojan horses
software fault tolerance
security
safety-critical software
resiliency techniques
resiliency demands
Resiliency
resilience
pubcrawl
power consumption
Circuit faults
Intelligent systems
highly critical systems
hardware bugs
Hardware
fault tolerance
embedded systems
critical embedded systems
Computer bugs
composability
biblio
Improved Invariant Generation for Industrial Software Model Checking of Time Properties
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
automotive embedded software
software assurance
time properties
symbolic model checking
Software verification
SMT solving
safety-critical properties
model-based design tools
model checking
invariant generation
industrial software model checking
formal proof
formal methods
Safety
formal verification
Scalability
Writing
safety-critical software
Formal Specification
Production
tools
composability
pubcrawl
embedded systems
Software
authorization
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
biblio
Share, But Be Aware: Security Smells in Python Gists
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
recurrent coding patterns
tools
static code analysis
static analysis
software security
software maintenance
share code snippets
security weaknesses
security smell
security breaches
security
safety-critical software
Resiliency
resilience
composability
Python
publicly-available Python Gists
publicly-available GitHub Gists
pubcrawl
program diagnostics
password
insecure coding practices
Human behavior
hard-coded secrets
hard-coded passwords
GitHub
Gist
encoding
file
Determining-Tolerable-Attack-Surfaces-that-Preserves-Safety-of-Cyber-Physical-Systems.pdf
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Safety
tracking
timed automata
software fault tolerance
Servers
Security analysis
security
Safety-Critical Systems
safety-critical software
safety analysis
attacker model
railway signaling system
Rail transportation
parameterizable state automaton templates
formal verification
cyber-physical systems
cyber-physical system safety
cyber-physical system
Communication system signaling
automata
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Rail transportation
timed automata
attacker model
safety analysis
cyber-physical system
tracking
Communication system signaling
security
automata
Servers
cyber-physical systems
Safety
parameterizable state automaton templates
cyber-physical system safety
railway signaling system
Security analysis
Safety-Critical Systems
software fault tolerance
safety-critical software
formal verification
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
SEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical Embedded Systems
Submitted by aekwall on Wed, 05/01/2019 - 12:42pm
pubcrawl
trustcenter
SEnSE
security
secure integration
secure and safe embedded
safety-critical software
safety-critical embedded systems
Safety
safe interaction
safe integration
Runtime
Resiliency
recertification
architecture
performance evaluation
Metrics
embedded systems
Embedded System
dynamic system
cyberphysical system
cyber-physical systems
contract-based development
composability
communication protocol
cloud application
automobiles
authorization
biblio
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
attack graph
attack graphs
Vulnerability Evaluation
verification procedure
state estimation
security testing
SCADA System Security
safety-critical applications
nuclear research reactor
nuclear engineering computing
Inductors
hybrid attack graph
formal verification
cyber-physical system
attack graph system state
Databases
cyber-physical systems
Cybersecurity
graph theory
composability
Resiliency
Metrics
pubcrawl
Temperature sensors
resilience
tools
security of data
safety-critical software
Predictive models
« first
‹ previous
1
2
3
4
next ›
last »