Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automata
biblio
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
Submitted by Heather Lucas on Wed, 01/29/2020 - 6:10pm
Rail transportation
timed automata
attacker model
safety analysis
cyber-physical system
tracking
Communication system signaling
security
automata
Servers
cyber-physical systems
Safety
parameterizable state automaton templates
cyber-physical system safety
railway signaling system
Security analysis
Safety-Critical Systems
software fault tolerance
safety-critical software
formal verification
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
An Automata-based Security Policy Translation for Network Security Functions
Submitted by aekwall on Mon, 06/17/2019 - 9:21am
Network Security Architecture
security policy translator
security policy translations
security policies
security of data
security controller
security
Resiliency
pubcrawl
Production
policy-based governance
Policy Translation
automata
IP networks
interface to network security functions
I2NSF user
I2NSF framework
Generators
Data models
Data mining
creating policies
computer network security
automata-based security policy translation
automata theory
biblio
Modeling of Information Processes for Modern Information System Security Assessment
Submitted by grigby1 on Mon, 05/20/2019 - 3:30pm
Information systems
security of information systems
security of data
Scalability
Resiliency
resilience
pubcrawl
Probability distribution
Probability density function
probability
policy-based governance
modeling conflict
Metrics
information theoretic security
automata
information system security assessment
information security
information influence modeling
hybrid automatons
Human Factors
Human behavior
estimation
conflict processes analysis
composability
collaboration
cellular automatons
automata theory
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by grigby1 on Wed, 05/09/2018 - 1:54pm
security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
IP security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
composability
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
automata
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition
Submitted by K_Hooper on Wed, 02/28/2018 - 10:31am
noninterference
Theorem Proving
Software systems
security of data
security
secure interface composition
refinement-based security properties
Refinement
pubcrawl
object-oriented programming
Artificial Intelligence
Lattices
interface automata
information flow security
generalized refinement-based noninterference
Compositionality
compositional enforcement
Component-Based Software
Component architectures
automata
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
Using timed automata and fuzzy logic for diagnosis of multiple faults in DES
Submitted by grigby1 on Thu, 02/15/2018 - 10:47am
identification phase
Valves
timed automata
temporal parameters
temporal evolution
sensors
Resiliency
resilience
pubcrawl
normal operation
multiple fault diagnosis
monitoring time operation
Monitoring
Metrics
Mathematical model
location
actuators
Human Factors
human factor
Human behavior
Fuzzy logic
filling system
faulty operation
fault diagnosis
failure diagnosis
discrete event systems
Diagnosis
DES
default
Clocks
automata theory
automata
biblio
A resilient design for cyber physical systems under attack
Submitted by K_Hooper on Fri, 02/02/2018 - 10:07am
Monitoring
automata
controller
CPS
cyber channel
cyber-physical systems
data injection attack
engineered cyber physical systems
exponential stability
hybrid architecture
malicious intruder
Switches
observer-based detection mechanism
Observers
Passivation
passivity balance defense framework
pubcrawl
Resiliency
Resilient Security Architectures
security
security of data
« first
‹ previous
1
2
3
4
5
next ›
last »