Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safety
file
Safety-Aware Cyber-Molecular Systems
Submitted by Robyn.Lutz on Fri, 01/10/2020 - 4:38pm. Contributors:
Robyn Lutz
Eric R. Henderson
James I. Lathrop
Jack H. Lutz
Safety
Cybermolecular
Molecular programming
Posters
1545028
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
file
Safe Learning in Co-robots--Theory, Experiments and Education
Submitted by francesco on Thu, 01/09/2020 - 5:59pm. Contributors:
Francesco Borrelli
Benjamin Rechtand
Koushil Sreenath
Safety
personalization
control
dynamics
learning
Robustness
Locomotion
Posters
1931853
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
biblio
Expert System for Managing Policy of Technological Security in Uncertainty Conditions: Architectural, Algorithmic, and Computing Aspects
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
security
probability measure
process control
Production
pubcrawl
resilience
Resiliency
Safety
Scalability
Scientific Computing Security
probability
security of data
technological process
technological safety
technological safety management
technological security
theory of evidence
uncertainty
uncertainty conditions
uncertainty handling
expert system
algorithmic aspects
architectural aspects
business data processing
Circuit faults
Compositionality
computing aspects
Dempster-Schafer trust function
diagnostic variables
enterprise
False Data Detection
expert systems
Expert Systems and Security
faulty process chains
faulty technological chain
Human behavior
inference mechanisms
knowledge base production
Predictive Metrics
biblio
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
robust preservation
hyperproperties
linked adversarial code
linked adversarial target code
linked source code
linked target code
liveness
low-level target language
multiple programs
noninterference
property classes
relational hyperproperties
relational properties
good programming languages
robust property preservation
secure compilation
secure compilation chain
Secure interoperability
secure linking
Security Foundations
source language
source-level abstraction
strictly stronger security guarantees
supported security goals
trace properties
compiler security
Compositionality
security of data
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
Libraries
program diagnostics
program verification
Writing
Space exploration
Security Properties
Safety
program compilers
secure code
source program
adversarial contexts
arbitrary adversarial contexts
compiled program
Computer languages
equivalent property-free
formal secure compilation criteria
full abstraction
fully abstract compilation chain
biblio
Simulating Worm Propagation in Interconnected Peer-to-Peer Networks
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
Peer-to-peer computing
worm propagation
unprotected network
Synapses
simulation
Servers
security
Scalability
Safety
Resiliency
resilience
pubcrawl
protected network
peer-to-peer network
attacking networks
peer to peer security
Peer to Peer
Metrics
Mathematical model
interconnected networks
Human Factors
human factor
Human behavior
Grippers
fault tolerance
competitive networks
Communication Systems
biblio
Vulnerability and Protocol Association of Device Firmware in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:42pm
Metrics
vulnerability information correlation
vulnerability association
security vulnerability
Safety
Resiliency
resilience
pubcrawl
Protocols
protocol association
power system security
power system control
power grids
power grid vulnerability analysis
composability
mass grid device firmware device attributes
intelligent power grid
Inspection
industrial power systems
industrial control system device firmware
industrial control equipment safety inspection
industrial control device firmware protocol vulnerabilities
industrial control
firmware preprocessing
firmware
features extraction
Control equipment
biblio
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
smart grid devices
power system
power system security
predefined vulnerability patterns
program diagnostics
resilience
Safety
security of data
security threats
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
smart terminals
Syntactics
terminal devices
terminal security
vulnerability detection
Compositionality
pubcrawl
Human behavior
composability
Resiliency
Analytical models
automatic static analysis
buffer-overflow vulnerabilities
buffer-overflow vulnerability detection
static analysis
Computer bugs
device program information
error reporting
feature extraction
Metrics
modern power transmission network
power engineering computing
biblio
Deductive Verification of Distributed Protocols in First-Order Logic
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
infinite-state systems
verification problem
validity checking
Tutorials
tools
Theorem Proving
SMT solvers
Safety
pubcrawl
Protocols
protocol verification
program verification
privacy
policy-based governance
long standing research goal
logical verification conditions
automated provers
formal verification
Formal Specification
formal logic
first-order logic
distributed systems
distributed protocols
design automation
deductive verification approach
Computer languages
Compositionality
composability
complex systems
collaboration
cognition
automated theorem provers
biblio
Security Assessment of Libyan Government Websites
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
security issues
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
pubcrawl
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
internet
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
Computer crime
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
biblio
Security for Safety: A Path Toward Building Trusted Autonomous Vehicles
Submitted by grigby1 on Wed, 10/23/2019 - 12:35pm
cyber-physical system
estimation
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Safety
Scalability
security
Security Risk Estimation
Self-Driving Car
Sensor attack
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »