


default search action
ACM Transactions on Cyber-Physical Systems, Volume 7
Volume 7, Number 1, January 2023
- Samarjit Chakraborty

, Somesh Jha
, Soheil Samii
, Philipp Mundhenk
:
Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1. 1:1-1:6 - Yanbing Mao

, Yuliang Gu
, Naira Hovakimyan
, Lui Sha
, Petros G. Voulgaris
:
Sℒ1-Simplex: Safe Velocity Regulation of Self-Driving Vehicles in Dynamic and Unforeseen Environments. 2:1-2:24 - Mazen Mohamad

, Rodi Jolak
, Örjan Askerdal
, Jan-Philipp Steghöfer
, Riccardo Scandariato
:
CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems. 3:1-3:26 - Jarul Mehta

, Guillaume Richard
, Loren Lugosch
, Derek Yu
, Brett H. Meyer
:
DT-DS: CAN Intrusion Detection with Decision Tree Ensembles. 4:1-4:27 - Yuri Gil Dantas

, Vivek Nigam
:
Automating Safety and Security Co-design through Semantically Rich Architecture Patterns. 5:1-5:28 - Jiyang Chen

, Tomasz Kloda
, Rohan Tabish
, Ayoosh Bansal
, Chien-Ying Chen
, Bo Liu
, Sibin Mohan
, Marco Caccamo
, Lui Sha
:
SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors. 6:1-6:25 - Ipsita Koley

, Soumyajit Dey
, Debdeep Mukhopadhyay
, Sachin Kumar Singh
, Lavanya Lokesh
, Shantaram Vishwanath Ghotgalkar
:
CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software. 7:1-7:26 - Daniel Angermeier

, Hannah Wester
, Kristian Beilke
, Gerhard Hansch
, Jörn Eichler
:
Security Risk Assessments: Modeling and Risk Level Propagation. 8:1-8:25
Volume 7, Number 2, April 2023
- Handi Yu

, Xin Li
:
Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving. 9:1-9:24 - Daniel Markert

, Alejandro Masrur
:
A Two-Speed Synchronous Traffic Protocol for Intelligent Intersections: From Single-Vehicle to Platoon Crossing. 10:1-10:21 - Nitasha Sahani

, Ruoxi Zhu
, Jin-Hee Cho
, Chen-Ching Liu
:
Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey. 11:1-11:31 - Anas Alsoliman

, Giulio Rigoni
, Davide Callegaro
, Marco Levorato
, Cristina M. Pinotti
, Mauro Conti
:
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics. 12:1-12:29 - Eugene Vinitsky

, Nathan Lichtlé
, Kanaad Parvate
, Alexandre M. Bayen
:
Optimizing Mixed Autonomy Traffic Flow with Decentralized Autonomous Vehicles and Multi-Agent Reinforcement Learning. 13:1-13:22 - Abdulrahman Fahim

, Evangelos E. Papalexakis
, Srikanth V. Krishnamurthy
, Amit K. Roy-Chowdhury
, Lance M. Kaplan
, Tarek F. Abdelzaher
:
AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning. 14:1-14:27 - Mohammed Asiri

, Neetesh Saxena
, Rigel Gjomemo
, Pete Burnap
:
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective. 15:1-15:33
Volume 7, Number 3, July 2023
- Adnan Mahmood

, Quan Z. Sheng
, Wei Emma Zhang
, Yan Wang
, Subhash Sagar
:
Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles. 16:1-16:25 - Théo Serru

, Nga Nguyen
, Michel Batteux
, Antoine Rauzy
:
Minimal Critical Sequences in Model-based Safety and Security Analyses: Commonalities and Differences. 17:1-17:20 - Sandeep Banik

, Thiagarajan Ramachandran
, Arnab Bhattacharya
, Shaunak D. Bopardikar
:
Automated Adversary-in-the-Loop Cyber-Physical Defense Planning. 18:1-18:25 - Abdullah Al Maruf

, Luyao Niu
, Andrew Clark
, J. Sukarno Mertoguno
, Radha Poovendran
:
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint. 19:1-19:25 - Naomi Stricker

, Yingzhao Lian
, Yuning Jiang
, Colin N. Jones
, Lothar Thiele
:
Self-triggered Control with Energy Harvesting Sensor Nodes. 20:1-20:31 - Yi-Ting Hsieh

, Tzu-Tao Chang
, Chen-Jun Tsai
, Shih-Lun Wu
, Ching-Yuan Bai
, Kai-Chieh Chang
, Chung-Wei Lin
, Eunsuk Kang
, Chao Huang
, Qi Zhu
:
System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints. 21:1-21:28
Volume 7, Number 4, October 2023
- Hassan Mousavi

, Ali Ebnenasir
, Elham Mahmoudzadeh
:
Formal Specification, Verification and Repair of Contiki's Scheduler. 22:1-22:28 - Xueli Fan

, Qixin Wang
, Jie Liu
:
A Reliable Wireless Protocol for Highway and Metered-Ramp CAV Collaborative Merging with Constant-Time-Headway Safety Guarantee. 23:1-23:26 - Ertem Esiner

, Utku Tefek
, Daisuke Mashima
, Binbin Chen
, Zbigniew Kalbarczyk
, David M. Nicol
:
Message Authentication and Provenance Verification for Industrial Control Systems. 24:1-24:28 - Tommaso Zoppi

, Innocenzo Mungiello
, Andrea Ceccarelli
, Alberto Cirillo
, Lorenzo Sarti
, Lorenzo Esposito
, Giuseppe Scaglione
, Sergio Repetto
, Andrea Bondavalli
:
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard. 25:1-25:20 - Khaled Sarieddine

, Mohammad Ali Sayed
, Sadegh Torabi
, Ribal Atallah
, Chadi Assi
:
Investigating the Security of EV Charging Mobile Applications as an Attack Surface. 26:1-26:28 - Francis Tiausas

, Keiichi Yasumoto
, Jose Paolo Talusan
, Hayato Yamana
, Hirozumi Yamaguchi
, Shameek Bhattacharjee
, Abhishek Dubey
, Sajal K. Das
:
HPRoP: Hierarchical Privacy-preserving Route Planning for Smart Cities. 27:1-27:25 - Anqi Fu

, Sijia Chen
, Junfei Qiao
, Chengpu Yu
:
Periodic Event-Triggered CACC and Communication Co-design for Vehicle Platooning. 28:1-28:19 - Mohammad H. Mamduhi

, Ehsan Hashemi
:
Event-Triggered Control with Intermittent Communications over Erasure Channels for Leader-Follower Problems with the Combined-Slip Effect. 29:1-29:25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














