Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safety
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
biblio
An innovative analying method for the scale of distribution system security region
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
Resiliency
transformers connection relationship matrix
Systems operation
Smart Grids
smart grid security
security
Scale
Scalability
Safety
Artificial Neural Networks
resilience
pubcrawl
Power transformer insulation
Metrics
distribution system security region
boundary equation
automation
biblio
Human factors considerations for cooperative positioning using positioning, navigational and sensor feedback to calibrate trust in CAVs
Submitted by K_Hooper on Wed, 02/14/2018 - 11:02am
human trust
vehicles function
trust
situational awareness of the vehicle
sensors
sensing
SAV
Safety
pubcrawl
positioning environment
Positioning
on board automated vehicles
navigational sensor feedback
aging
human factors area
Human Factors
Human behavior
Global Positioning System
exploratory survey
cooperative positioning
connected and automated vehicles
CAV field
CAV
calibration
automobiles
biblio
Managing Assurance Cases in Model Based Software Systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
pubcrawl
vehicle control
traffic engineering computing
tools
Standards organizations
software quality
software development organizations
software assurance
Software
social networks
Scalability
Safety
road vehicles
road safety
reuse
regulatory compliance
assurance cases
model management techniques
model management
model based software systems
ISO standards
ISO 26262 standard
impact assessment
functional safety
financial service
Context
composability
compliance management
co-evolution
Automotive engineering
automotive domain
automobiles
biblio
A Software Security Case Developing Method Based on Hierarchical Argument Strategy
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
Reliability engineering
threat classification
Stakeholders
software reliability
software engineering
software assurance
Software
security of data
security
Scalability
Safety
argument pattern
pubcrawl
pattern classification
hierarchical software security case development method
hierarchical asset-threat-control
hierarchical argument strategy
composability
assurance case
asset identification
asset classification
argument strategy
biblio
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
safety requirements
Unified modeling language
standards
software assurance
security-critical systems
security requirements
security of data
security management
Security Assurance
security
Scalability
Safety-Critical Systems
safety-critical software
certification
Safety management
safety assurance
Safety
requirements engineering
pubcrawl
integrated computational-physical capabilities
formal verification
documentation
cyber-physical systems
Context modeling
composability
compliance assurance
biblio
Behavior Analysis for Safety and Security in Automotive Systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
Human Factors
security of data
security monitoring
security modeling and simulation
security
Safety
Resiliency
pubcrawl
process discovery
predictive security analysis
Petri nets
Metrics
Internet of Vehicles
Analytical models
Human behavior
global security operations
cyber physical systems
connected car
Computational modeling
complex event processing
behavior analysis
automotive systems
automotive security
Automotive engineering
automobiles
biblio
Adaptable Safety and Security in V2X Systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
security threats
performance limitation threats
pubcrawl
Resiliency
road safety
road traffic
Roads
Safety
security
network conditions
simple V2V highway scenario
telecommunication security
telecommunication traffic
traffic efficiency
V2X systems
vehicular ad hoc networks
Wireless communications
adaptability
mobile computing
Metrics
maximum safety
Internet of Vehicles
internet
infotainment
Human Factors
Human behavior
dynamic adaptability approach
cyber physical systems
connected vehicles
Brakes
automobiles
authentication
adaptive safety/security approach
biblio
Security, privacy and safety evaluation of dynamic and static fleets of drones
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
multi-robot systems
Unmanned Aerial Vehicles
uav
Swarm Intelligence
static drone fleets
Security Evaluation
security
safety evaluation
Safety
Robot sensing systems
Resiliency
remotely operated vehicles
pubcrawl
privacy evaluation
privacy
particle swarm optimization
air-traffic control management
mobile robots
military aircraft
Metrics
localised fleet control
Internet of Vehicles
independent fleet control
Human Factors
Human behavior
flight control management
effective fleet control
dynamic drone fleets
drones
cyber physical systems
collision avoidance
autonomous aerial vehicles
biblio
Using computational game theory to guide verification and security in hardware designs
Submitted by grigby1 on Fri, 02/02/2018 - 12:17pm
Metrics
complex designs
composability
computational game theory
Computational modeling
Data protection
defender strategy
design network structure
embedded systems
formal methods
game theory
Games
Hardware
hardware validation
Hardware verification
Laboratories
verification costs
open-source synthesized hardware designs
optimal security deployment strategy
pubcrawl
Reliability
reliability threats
Resiliency
resource allocation
Safety
safety properties
security
security of data
Security Properties
Stackelberg security games model
system state space
valuable verification resource allocation
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »