default search action
ACM Transactions on Cyber-Physical Systems, Volume 7
Volume 7, Number 1, January 2023
- Samarjit Chakraborty, Somesh Jha, Soheil Samii, Philipp Mundhenk:
Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1. 1:1-1:6 - Yanbing Mao, Yuliang Gu, Naira Hovakimyan, Lui Sha, Petros G. Voulgaris:
Sℒ1-Simplex: Safe Velocity Regulation of Self-Driving Vehicles in Dynamic and Unforeseen Environments. 2:1-2:24 - Mazen Mohamad, Rodi Jolak, Örjan Askerdal, Jan-Philipp Steghöfer, Riccardo Scandariato:
CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems. 3:1-3:26 - Jarul Mehta, Guillaume Richard, Loren Lugosch, Derek Yu, Brett H. Meyer:
DT-DS: CAN Intrusion Detection with Decision Tree Ensembles. 4:1-4:27 - Yuri Gil Dantas, Vivek Nigam:
Automating Safety and Security Co-design through Semantically Rich Architecture Patterns. 5:1-5:28 - Jiyang Chen, Tomasz Kloda, Rohan Tabish, Ayoosh Bansal, Chien-Ying Chen, Bo Liu, Sibin Mohan, Marco Caccamo, Lui Sha:
SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors. 6:1-6:25 - Ipsita Koley, Soumyajit Dey, Debdeep Mukhopadhyay, Sachin Kumar Singh, Lavanya Lokesh, Shantaram Vishwanath Ghotgalkar:
CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software. 7:1-7:26 - Daniel Angermeier, Hannah Wester, Kristian Beilke, Gerhard Hansch, Jörn Eichler:
Security Risk Assessments: Modeling and Risk Level Propagation. 8:1-8:25
Volume 7, Number 2, April 2023
- Handi Yu, Xin Li:
Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving. 9:1-9:24 - Daniel Markert, Alejandro Masrur:
A Two-Speed Synchronous Traffic Protocol for Intelligent Intersections: From Single-Vehicle to Platoon Crossing. 10:1-10:21 - Nitasha Sahani, Ruoxi Zhu, Jin-Hee Cho, Chen-Ching Liu:
Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey. 11:1-11:31 - Anas Alsoliman, Giulio Rigoni, Davide Callegaro, Marco Levorato, Cristina M. Pinotti, Mauro Conti:
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. 12:1-12:29 - Eugene Vinitsky, Nathan Lichtlé, Kanaad Parvate, Alexandre M. Bayen:
Optimizing Mixed Autonomy Traffic Flow with Decentralized Autonomous Vehicles and Multi-Agent Reinforcement Learning. 13:1-13:22 - Abdulrahman Fahim, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Lance M. Kaplan, Tarek F. Abdelzaher:
AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning. 14:1-14:27 - Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, Pete Burnap:
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective. 15:1-15:33
Volume 7, Number 3, July 2023
- Adnan Mahmood, Quan Z. Sheng, Wei Emma Zhang, Yan Wang, Subhash Sagar:
Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles. 16:1-16:25 - Théo Serru, Nga Nguyen, Michel Batteux, Antoine Rauzy:
Minimal Critical Sequences in Model-based Safety and Security Analyses: Commonalities and Differences. 17:1-17:20 - Sandeep Banik, Thiagarajan Ramachandran, Arnab Bhattacharya, Shaunak D. Bopardikar:
Automated Adversary-in-the-Loop Cyber-Physical Defense Planning. 18:1-18:25 - Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint. 19:1-19:25 - Naomi Stricker, Yingzhao Lian, Yuning Jiang, Colin N. Jones, Lothar Thiele:
Self-triggered Control with Energy Harvesting Sensor Nodes. 20:1-20:31 - Yi-Ting Hsieh, Tzu-Tao Chang, Chen-Jun Tsai, Shih-Lun Wu, Ching-Yuan Bai, Kai-Chieh Chang, Chung-Wei Lin, Eunsuk Kang, Chao Huang, Qi Zhu:
System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints. 21:1-21:28
Volume 7, Number 4, October 2023
- Hassan Mousavi, Ali Ebnenasir, Elham Mahmoudzadeh:
Formal Specification, Verification and Repair of Contiki's Scheduler. 22:1-22:28 - Xueli Fan, Qixin Wang, Jie Liu:
A Reliable Wireless Protocol for Highway and Metered-Ramp CAV Collaborative Merging with Constant-Time-Headway Safety Guarantee. 23:1-23:26 - Ertem Esiner, Utku Tefek, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol:
Message Authentication and Provenance Verification for Industrial Control Systems. 24:1-24:28 - Tommaso Zoppi, Innocenzo Mungiello, Andrea Ceccarelli, Alberto Cirillo, Lorenzo Sarti, Lorenzo Esposito, Giuseppe Scaglione, Sergio Repetto, Andrea Bondavalli:
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard. 25:1-25:20 - Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Chadi Assi:
Investigating the Security of EV Charging Mobile Applications as an Attack Surface. 26:1-26:28 - Francis Tiausas, Keiichi Yasumoto, Jose Paolo Talusan, Hayato Yamana, Hirozumi Yamaguchi, Shameek Bhattacharjee, Abhishek Dubey, Sajal K. Das:
HPRoP: Hierarchical Privacy-preserving Route Planning for Smart Cities. 27:1-27:25 - Anqi Fu, Sijia Chen, Junfei Qiao, Chengpu Yu:
Periodic Event-Triggered CACC and Communication Co-design for Vehicle Platooning. 28:1-28:19 - Mohammad H. Mamduhi, Ehsan Hashemi:
Event-Triggered Control with Intermittent Communications over Erasure Channels for Leader-Follower Problems with the Combined-Slip Effect. 29:1-29:25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.