Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automata
biblio
Dependability Assessment of SOA-Based CPS With Contracts and Model-Based Fault Injection
Submitted by grigby1 on Mon, 10/05/2020 - 1:03pm
dependability
tools
Software Architecture
service-oriented architecture
service orientation (SOA)
service orientation
service behavior
pubcrawl
Model-based
Formal Specification
Fault injection
fault diagnosis
engineering complex distributed systems
Adaptation models
cyber-physical systems
cyber-physical
CPS model
contracts
Contract-based
contract specification help
constituent components
Computational modeling
Compositionality
automata
architectural designs
Analytical models
biblio
Composing system integrity using I/O automata
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
closure properties
BIOS Security
vending machine
valid states
transition control
taxonomy
system integrity
invalid starts
invalid initial states
integrity definitions
input output automata
I/O automata
externally-controlled transitions
customer environment
computer viruses
security
Automatic control
automata theory
automata
system design
Safety
Human Factors
resilience
Resiliency
Metrics
pubcrawl
data integrity
Scalability
control systems
security of data
biblio
Deep Packet Inspection in FPGAs via Approximate Nondeterministic Automata
Submitted by grigby1 on Fri, 07/03/2020 - 12:26pm
high-speed computer networks
Throughput
telecommunication traffic
suspicious network traffic
Scalability
Resiliency
resilience
regular expression matching
RE matching
pubcrawl
network intrusion detection systems
multistage architecture
intrusion detection system
Internet connection
internet
Acceleration
Hardware
FPGA architecture
finite automata
field programmable gate arrays
deep packet inspection
computer network security
computer architecture
automata
architecture
approximate reduction techniques
approximate reduction
approximate nondeterministic FAs
approximate nondeterministic automata
biblio
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
Resistance
hash algorithms
permutation
One-way Function
message integrity
message authenticity
cryptographic hash functions
Cryptographic Hash Function
cellular automata based hashing algorithm
cellular automata
CABHA algorithm
Cryptography
Compositionality
digital signature
computer science
automata
finite element analysis
cryptographic applications
message authentication
pubcrawl
Resiliency
information security
biblio
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
Metrics
unmanned aerial unit
uav
telecommunication security
security vulnerabilities
security
Routing protocols
Routing Protocol
Routing
Resiliency
pubcrawl
NS3 simulator
network security
mobile adhoc networks
mobile ad hoc networks
ad hoc on-demand distance vector routing
MANET security
MANET routing protocol
MANET AODV protocol
MANET
Loss measurement
IoT
Internet of Things
disaster recovery
delays
Compositionality
automata
AODV protocol
AODV based adhoc networks
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 11:05am
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
Incremental Abstraction for Diagnosability Verification of Modular Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
fault diagnosis
uncertain loops
simple detector automata
scalable production system
polynomial complexity
parallel lines
nonblocking
Modular systems
modular system
incremental abstraction
forbidden loops
Discrete-Event Systems
diagnosability verification
diagnosability
abstraction
scalable verification
Detectors
verification
formal verification
Compositionality
Predictive Metrics
Production systems
Scalability
automata
Complexity theory
computational complexity
control systems
feedback
Synchronization
pubcrawl
Resiliency
biblio
Real-Time SCADA Attack Detection by Means of Formal Methods
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
critical machines
Chemicals
programmable controllers
programmable logic controller
Clocks
formal methods
chemical manufacturing plants
chemical substances
control smart grid
Compositionality
real-time SCADA attack detection
SCADA control systems
SCADA water distribution system
timed automata
timed automaton
timed temporal logic
water supply
security
Semantics
SCADA Systems Security
automata theory
automata
Safety
Temporal Logic
model checking
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
critical infrastructures
critical infrastructure
security of data
biblio
LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
LAOCOON
verification rules
Trojan horses
trojan horse detection
temporal properties
supply chain security
sensitive information
security
Safety
run-time verification
run-time monitoring
Resiliency
resilience
pubcrawl
Monitoring
malicious inclusions
active fault attacks
invasive software
Integrated circuit modeling
hardware Trojan horses
hardware Trojan detection
Hardware Security
Hardware
generic attackers
formal verification techniques
formal verification
Fault Attacks
electronic systems
dedicated monitoring circuits
cyber physical systems
Circuit faults
automata
file
Determining-Tolerable-Attack-Surfaces-that-Preserves-Safety-of-Cyber-Physical-Systems.pdf
Submitted by Heather Lucas on Wed, 01/29/2020 - 6:10pm
Safety
tracking
timed automata
software fault tolerance
Servers
Security analysis
security
Safety-Critical Systems
safety-critical software
safety analysis
attacker model
railway signaling system
Rail transportation
parameterizable state automaton templates
formal verification
cyber-physical systems
cyber-physical system safety
cyber-physical system
Communication system signaling
automata
Monitoring, Fusion, and Response for Cyber Resilience
« first
‹ previous
1
2
3
4
5
next ›
last »