Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2021
Stealthy Attacks against Robotic Vehicles Protected by Control-based Intrusion Detection Techniques
Digital Threats: Research and Practice (DTRAP), Volume 2, Issue 1Article No.: 7, Pages 1–25https://doi.org/10.1145/3419474Robotic vehicles (RV) are increasing in adoption in many industrial sectors. RVs use auto-pilot software for perception and navigation and rely on sensors and actuators for operating autonomously in the physical world. Control algorithms have been used ...
Out of control: stealthy attacks against robotic vehicles protected by control-based techniques
ACSAC '19: Proceedings of the 35th Annual Computer Security Applications ConferencePages 660–672https://doi.org/10.1145/3359789.3359847Robotic vehicles (RVs) are cyber-physical systems that operate in the physical world under the control of software functions. They are increasing in adoption in many industrial sectors. RVs rely on sensors and actuators for system operations and ...
- research-articleMay 2019
Leveraging program invariants to promote population diversity in search-based automatic program repair
GI '19: Proceedings of the 6th International Workshop on Genetic ImprovementPages 2–9https://doi.org/10.1109/GI.2019.00011Search-based automatic program repair has shown promise in reducing the cost of defects in real-world software. However, to date, such techniques have typically been most successful when constructing short or single-edit repairs. This is true even when ...
- articleNovember 2002
Hierarchical Reachability Graph Generation for Petri Nets
Formal Methods in System Design (FMSD), Volume 21, Issue 3Pages 281–315https://doi.org/10.1023/A:1020321222420Reachability analysis is the most general approach to the analysis of Petri nets. Due to the well-known problem of state-space explosion, generation of the reachability set and reachability graph with the known approaches often becomes intractable even ...