Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automata
biblio
A Formal Analysis of Moving Target Defense
Submitted by grigby1 on Mon, 08/02/2021 - 2:12pm
tools
IP networks
pubcrawl
Metrics
Analytical models
Scalability
Computational modeling
verification
Switches
automata
model checking
moving target defense
configuration-based mutation
Formal Specification
biblio
Through the Lens of Code Granularity: A Unified Approach to Security Policy Enforcement
Submitted by grigby1 on Thu, 04/29/2021 - 1:16pm
automata
Communication networks
Conferences
enforcement
Java
Monitoring
Policies
policy-based governance
pubcrawl
Runtime
security
security mechanisms
security policies
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 3:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
A Quantum Concurrent Signature Scheme Based on the Quantum Finite Automata Signature Scheme
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Quantum circuit
Scalability
Resiliency
quantum hash function
quantum finite automata signature scheme
Quantum entanglement
quantum digital signatures
quantum digital signature
quantum cryptography
quantum concurrent signature scheme
quantum concurrent signature
quantum computing security
quantum computing environment
quantum computing
public key cryptography
invertibility
Hash functions
finite automata
digital signatures
Cryptography
concurrent signatures scheme
complex quantum operations
automata
ambiguous signatures
pubcrawl
security
biblio
Exploiting Symmetry in Dependency Graphs for Model Reduction in Supervisor Synthesis
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
cyber-physical system
tunnels
system components
synthesis problem
supervisory controller
supervisor synthesis
required computational time
reduced order systems
model reduction steps
lengthy synthesis procedures
even unsolvable synthesis procedures
dependency graphs
Cyber Dependencies
Discrete-Event Systems
Scalability
discrete event systems
actuators
Compositionality
Human Factors
data visualisation
automata
sensors
cyber-physical systems
Analytical models
Metrics
graph theory
pubcrawl
Resiliency
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
Poster: Novel Opportunities in Design of Efficient Deep Packet Inspection Engines
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Inspection
Scalability
Memory management
security
Resiliency
pubcrawl
pattern matching
automata
Engines
deep packet inspection
Pathology
biblio
A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis
Submitted by aekwall on Mon, 11/09/2020 - 12:41pm
reverse engineering
testable key-controlled FSM synthesis scheme
state-transition
reverse engineering attacks
nongroup additive cellular automata
finite-state-machine synthesis
digital system
D1*CAdual
D1*CA
cellular automata guided obfuscation strategy
ip protection
IP piracy
cellular automata
security
flip-flops
Additives
finite state machines
Silicon
automata
industrial property
Logic gates
policy-based governance
composability
pubcrawl
Resiliency
biblio
Security Checking Experiments with Mobile Services
Submitted by grigby1 on Mon, 11/02/2020 - 10:39am
mobile services
software security
software behavior
Software
security of data
security checking experiments
security checking
security
Scalability
pubcrawl
program verification
Androids
mobile computing
JPF-mobile
Java Path Finder verifier
Java
input/output parameters
i/o systems security
i-o systems security
Humanoid robots
Electron devices
automata
biblio
Parametric Analyses of Attack-Fault Trees
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
risk assessment
parametric analyses
parametric timed automata
parametric weighted timed automata
power plants
pubcrawl
resilience
Resiliency
risk analysis
parameter values
Safety
safety engineering
security
security of data
tree-based formalism
trees (mathematics)
Unified modeling language
cyber-physical systems
automata
automata theory
composability
Concurrency
connected devices
Cost accounting
CPS
cyber physical systems
attack-fault trees
fault scenarios
fault trees
formal verification
imitator
Logic gates
Metrics
model-checker IMITATOR
« first
‹ previous
1
2
3
4
5
next ›
last »