Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safety
biblio
Improved Invariant Generation for Industrial Software Model Checking of Time Properties
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
automotive embedded software
software assurance
time properties
symbolic model checking
Software verification
SMT solving
safety-critical properties
model-based design tools
model checking
invariant generation
industrial software model checking
formal proof
formal methods
Safety
formal verification
Scalability
Writing
safety-critical software
Formal Specification
Production
tools
composability
pubcrawl
embedded systems
Software
authorization
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
file
Determining-Tolerable-Attack-Surfaces-that-Preserves-Safety-of-Cyber-Physical-Systems.pdf
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Safety
tracking
timed automata
software fault tolerance
Servers
Security analysis
security
Safety-Critical Systems
safety-critical software
safety analysis
attacker model
railway signaling system
Rail transportation
parameterizable state automaton templates
formal verification
cyber-physical systems
cyber-physical system safety
cyber-physical system
Communication system signaling
automata
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Rail transportation
timed automata
attacker model
safety analysis
cyber-physical system
tracking
Communication system signaling
security
automata
Servers
cyber-physical systems
Safety
parameterizable state automaton templates
cyber-physical system safety
railway signaling system
Security analysis
Safety-Critical Systems
software fault tolerance
safety-critical software
formal verification
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
A Construction Method of Security Mechanism Requirement for Wireless Access System Based on CC Standard
Submitted by grigby1 on Tue, 01/21/2020 - 11:33am
Safety
Wireless communication
wireless access system
telecommunication security
standards
security threats
security mechanism requirement construction method
security functions
security functional components
security evaluation standard
security assurance components
Security Assurance
Security Assessment Standards
security
Scalability
collaboration
Resiliency
resilience
radio access networks
pubcrawl
policy-based governance
Metrics
information technology
Information Assurance
incomplete security mechanism
Human behavior
emergency communication network
composability
Communication system security
Communication networks
biblio
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
primary safety requirement
Benders decomposition algorithm
bi-level integer programs
DSPTI
dynamic defense strategy
Loss measurement
model predictive control strategy
multi-stage dynamic game
predictive control
advanced persistent threat attacks
Real-Time Decision Making
shortest-path tree interdiction Stackelberg game
specialized anti-malware program
SSPTI
static game
stealth malware propagation
Zero Day Attacks and Defense
Safety
APT attacks
CPS
integer programming
Predictive Metrics
Games
Decision Making
composability
pubcrawl
Resiliency
cyber-physical systems
invasive software
game theory
security
malware
Conferences
biblio
An Innovative Model for the Enhancement of IoT Device Using Lightweight Cryptography
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
Lightweight algorithms
Wireless Sensorȍ Networksȍ(WSN)
telecommunication security
security system
Scalability
Safety
resource constrained devices
Resiliency
RadioȍFrequency ȍIdentification (RFID)
pubcrawl
privacy
lightweight cryptography
Lightweight Ciphers
batteries
IoT device
InternetȍofȍThings(IOT)
Internet of Things
hash algorithm
data privacy
Cryptography
cryptographic algorithms
commutation layer
Cloud Computing
Ciphers
Block Cipher
file
Safe and Efficient Cyber-Physical Operation System for Construction Equipment
Submitted by mgolpar on Thu, 01/16/2020 - 3:28pm. Contributors:
Mani Golparvar-Fard
Chimay Anumba
Timothy Bretl
John Messner
construction
Safety
robotics
Software verification
Posters
1544973
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
biblio
Security for the Industrial IoT: The Case for Information-Centric Networking
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
Internet of Things
unprotected channel
telecommunication power management
sensors
security
secure networking solution
safety-critical industrial IoT
Safety
robust communication
Resiliency
pubcrawl
production engineering computing
Metrics
Logic gates
IP-based approaches
internetworking
actuator security
internet
inter-networking
inter-networked sensors
information-centric networking
Information Centric Network
information centric networking
industrial safety systems
industrial production plants
industrial plants
Human behavior
DoS resilience
content-centric security model
computer network security
composability
Cloud Computing
file
Data-Driven Modeling and Preview-Based Control for Cyber-Physical System Safety
Submitted by necozay on Fri, 01/10/2020 - 4:38pm. Contributors:
Necmiye Ozay
Dimitra Panagou
Samet Oymak
Sze Zheng Yong
Correct-by-construction control
Safety
learning
multi-agent systems
robust estimation
Posters
1931982
1932066
1932254
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »