Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
A Low-Level Look at A-Normal Form
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA2Article No.: 277, Pages 165–191https://doi.org/10.1145/3689717A-normal form (ANF) is a widely studied intermediate form in which local control and data flow is made explicit in syntax, and a normal form in which many programs with equivalent control-flow graphs have a single normal syntactic representation. However,...
- research-articleOctober 2024
Dead Man’s PLC: Towards Viable Cyber Extortion for Operational Technology
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 23, Pages 1–24https://doi.org/10.1145/3670695For decades, operational technology (OT) has enjoyed the luxury of being suitably inaccessible, and thus has experienced directly targeted cyber attacks from only the most advanced and well-resourced adversaries. However, security via obscurity cannot ...
- research-articleOctober 2024
A grid fault diagnosis framework based on adaptive integrated decomposition and cross-modal attention fusion
Highlights- Mine the information entropy values of decomposed subsequences and propose a new evaluation metric.
- Execute multiple decomposition algorithms to adaptively integrate feature subspaces.
- Design a cross-modal attention fusion ...
In large-scale power systems, accurately detecting and diagnosing the type of faults when they occur in the grid is a challenging problem. The classification performance of most existing grid fault diagnosis methods depends on the richness and ...
- research-articleSeptember 2024
A Comprehensive Review on Deep Learning Techniques on Cyber Attacks on Cyber Physical Systems
AbstractCyber-Physical Systems (CPSs), which integrate control, computing, and communication, are considered as next-generation intelligent systems.A major concern in CPS is to ensure security. If security is not ensured, then it leads to both property ...
- ArticleSeptember 2024
ECATS: Explainable-by-Design Concept-Based Anomaly Detection for Time Series
AbstractDeep learning methods for time series have already reached excellent performances in both prediction and classification tasks, including anomaly detection. However, the complexity inherent in Cyber Physical Systems (CPS) creates a challenge when ...
-
- research-articleJuly 2024
ATheNA-S: A Testing Tool for Simulink Models Driven by Software Requirements and Domain Expertise
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 587–591https://doi.org/10.1145/3663529.3663804Search-based software testing (SBST) is widely used to verify software systems. SBST iteratively generates new test inputs driven by fitness functions, i.e., objective functions that guide the test case generation. In previous work, we proposed ATheNA, a ...
- ArticleJune 2024
Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security
AbstractThe number of complex cyber-attacks, such as Advanced Persistent Threats (APTs), on Critical Infrastructures (CIs) continues to rise. Recently, attackers have targeted lower layers of the Purdue model, specifically the Operational Technology (OT) ...
- research-articleJune 2024JUST ACCEPTED
A New Layer Structure of Cyber-Physical Systems under the Era of Digital Twin
Cyber-Physical Systems (CPS) are new systems designed to support and synthesize sensing, communication, and computing components that interact with physical objects so that the system can sense, monitor, control, and respond to changes occurring in their ...
- posterMay 2024
Temporal Behavior Trees -- Segmentation
- Sebastian Schirmer,
- Jasdeep Singh,
- Emily Jensen,
- Johann C. Dauer,
- Bernd Finkbeiner,
- Sriram Sankaranarayanan
HSCC '24: Proceedings of the 27th ACM International Conference on Hybrid Systems: Computation and ControlArticle No.: 31, Pages 1–2https://doi.org/10.1145/3641513.3652534We present our tool for the segmentation of temporal behavior trees (TBT), a novel formalism for monitoring specifications. TBTs can be easily retrofitted to behavior trees, commonly used to program robotic applications. Our tool supports the robustness ...
- research-articleMay 2024
A model-based approach for self-adaptive security in CPS: Application to smart grids
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 150, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103118AbstractSecurity risk assessment is an important challenge in the design of Cyber Physical Systems (CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to changes in their environment, as well as evolutions in their ...
Highlights- We propose and implement a framework for self-adaptive security in CPS.
- Our approach involves Security Risk Assessment, taking into account QoS aspects.
- We formalize the on-line decision problem to be solved using Constraint ...
- research-articleJune 2024
Automated Planning for Adaptive Cyber-Physical Systems under Uncertainty in Temporal Availability Constraints
SEAMS '24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing SystemsPages 14–24https://doi.org/10.1145/3643915.3644083In smart Cyber-Physical Systems (sCPS), a critical challenge lies in task planning under uncertainty. There is a broad body of work in the area with approaches able to deal with different classes of constraints (e.g., ordering, structural) and ...
- research-articleApril 2024
TLS-handshake for Plug and Charge in vehicular communications
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 243, Issue Chttps://doi.org/10.1016/j.comnet.2024.110281AbstractElectric vehicle technology has brought some important issues to order. Securing the communication between electric vehicle and charging station is an important one. The International Organization for Standardization released ISO 15118 standard ...
- short-paperMarch 2024
Minds and Machines Unite: Deciphering Social and Cognitive Dynamics in Collaborative Problem Solving with AI
LAK '24: Proceedings of the 14th Learning Analytics and Knowledge ConferencePages 885–891https://doi.org/10.1145/3636555.3636922We investigated the feasibility of automating the modeling of collaborative problem-solving skills encompassing both social and cognitive aspects. Leveraging a diverse array of cutting-edge techniques, including machine learning, deep learning, and ...
- research-articleFebruary 2024
Penetrative AI: Making LLMs Comprehend the Physical World
HOTMOBILE '24: Proceedings of the 25th International Workshop on Mobile Computing Systems and ApplicationsPages 1–7https://doi.org/10.1145/3638550.3641130Recent developments in Large Language Models (LLMs) have demonstrated their remarkable capabilities across a range of tasks. Questions, however, persist about the nature of LLMs and their potential to integrate common-sense human knowledge when ...
- research-articleFebruary 2024
Eciton: Very Low-power Recurrent Neural Network Accelerator for Real-time Inference at the Edge
ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 17, Issue 1Article No.: 16, Pages 1–25https://doi.org/10.1145/3629979This article presents Eciton, a very low-power recurrent neural network accelerator for time series data within low-power edge sensor nodes, achieving real-time inference with a power consumption of 17 mW under load. Eciton reduces memory and chip ...
- research-articleJanuary 2024
Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption
ICDCN '24: Proceedings of the 25th International Conference on Distributed Computing and NetworkingPages 346–352https://doi.org/10.1145/3631461.3631466The management and control of heterogeneous IoT devices in cyber-physical systems (CPS) involves ensuring authorized access to cloud-stored data, including instructions, commands, and configuration settings, and issuing them securely to IoT devices for ...
- research-articleJanuary 2024
Edge detection algorithm of insulator hydrophobic image in CPS system considering deconvolution and deblurring algorithm
International Journal of Information and Communication Technology (IJICT), Volume 25, Issue 7Pages 1–15https://doi.org/10.1504/ijict.2024.142167Through experiments, this paper verifies the practicability and effectiveness of the deconvolution deblurring algorithm. Through fuzzy kernel estimation and sharp edge recovery, we have effectively improved the defects of traditional edge detection ...
- research-articleJanuary 2024
Integrating the manufacturer usage description standard in the modelling of cyber–physical systems
AbstractThe continuous growth of cyber–physical systems (CPS) attacks, especially due to the conflict in Ukraine, has highlighted the need for cybersecurity management mechanisms, due to the catastrophic consequences that a failure or attack ...
Highlights- Description of the MUD standard and integration of its model in the modelling process of the MUD model in the modelling process.
- research-articleDecember 2023
Search-Based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 2Article No.: 40, Pages 1–37https://doi.org/10.1145/3624745Search-based software testing (SBST) typically relies on fitness functions to guide the search exploration toward software failures. There are two main techniques to define fitness functions: (a) automated fitness function computation from the ...
- research-articleApril 2024
A multi-population quantum genetic algorithm for improving the robustness of interdependent networks
ICCIP '23: Proceedings of the 2023 9th International Conference on Communication and Information ProcessingPages 326–332https://doi.org/10.1145/3638884.3638935In real life, interdependent networks are common and their robustness has received considerable attention. When an interdependent network is attacked, the failure may propagate along the links to the whole network. Among them, adding inter-links is an ...