


default search action
ACM Transactions on Cyber-Physical Systems, Volume 9
Volume 9, Number 1, January 2025
- Michael J. Weisman

, Alexander Kott
, Jason E. Ellis
, Brian J. Murphy
, Travis W. Parker
, Sidney C. Smith
, Joachim Vandekerckhove
:
Quantitative Measurement of Cyber Resilience: Modeling and Experimentation. 1:1-1:25 - Debabrata Senapati

, Pooja Bhagat
, Chandan Karfa
, Arnab Sarkar
:
SHIELD: Security-Aware Scheduling for Real-Time DAGs on Heterogeneous Systems. 2:1-2:29 - Inigo Incer

, Apurva Badithela
, Josefine B. Graebener
, Piergiuseppe Mallozzi
, Ayush Pandey
, Nicolas Rouquette
, Sheng-Jung Yu
, Albert Benveniste
, Benoît Caillaud
, Richard M. Murray
, Alberto L. Sangiovanni-Vincentelli
, Sanjit A. Seshia
:
Pacti: Assume-Guarantee Contracts for Efficient Compositional Analysis and Design. 3:1-3:35 - Rajasree Sarkar

, Arunava Banerjee
, Ehsan Hashemi
:
Adaptive Time-Delay Control for Cooperative Platooning Considering Slip. 4:1-4:22 - Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed:

Sabotaging Material Extrusion-Based 3D Printed Parts through Low-Magnitude Kinetic Manipulation Attacks. 5:1-5:26 - Amar Banerjee

, Venkatesh Choppella
:
Control Software Engineering Approaches for Cyber-Physical Systems: A Systematic Mapping Study. 6:1-6:33
- Kuan-Hsun Chen

, Jing Li
, Federico Reghenzani
, Jian-Jia Chen
:
Introduction to the Special Issue on Fault-Resilient Cyber-Physical Systems - Part 2. 7:1-7:2 - Michael Rogenmoser

, Yvan Tortorella
, Davide Rossi
, Francesco Conti
, Luca Benini
:
Hybrid Modular Redundancy: Exploring Modular Redundancy Approaches in RISC-V Multi-core Computing Clusters for Reliable Processing in Space. 8:1-8:29 - Che-Chia Lin

, Wei-Hsu Chu
, Chia-Hsuan Chang
, Hui-Hsin Liao
, Chun-Chieh Yang
, Jenq-Kuen Lee
, Yi-Ping You
, Tien-Yuan Hsieh
:
Support of MISRA C++ Analyzer for Reliability of Embedded Systems. 9:1-9:27 - Sepideh Safari

, Shayan Shokri
, Shaahin Hessabi
, Pejman Lotfi-Kamran
:
LEC-MiCs: Low-Energy Checkpointing in Mixed-Criticality Multicore Systems. 10:1-10:29 - Dionisio de Niz

, Björn Andersson
, Mark Klein
, John P. Lehoczky
, Hyoseung Kim
, Gabriel A. Moreno
:
Mixed-trust Computing: Safe and Secure Real-time Systems. 11:1-11:25 - Amr S. Mohamed

, Deepa Kundur
, Mohsen Khalaf
:
A Probabilistic Approach to Adaptive Protection in the Smart Grid. 12:1-12:29
Volume 9, Number 2, April 2025
- Soumyadyuti Ghosh

, Suman Maiti
, Debdeep Mukhopadhyay
, Soumyajit Dey
:
Differentially Private Real-Time Pricing Control for Smart Grids. 13:1-13:30 - Hyung-Jin Yoon

, Ryan Holmes
, Hamidreza Jafarnejadsani
, Petros G. Voulgaris
:
Real-time Adversarial Image Perturbations for Autonomous Vehicles Using Reinforcement Learning. 14:1-14:24 - Martí Caro

, Axel Brando
, Jaume Abella
:
Semantic Diverse DMR and TMR for High-Integrity AI-Based Function Efficiency. 15:1-15:26 - Lin Ding

, Zikang Xu
, Xiao-Ke Xu
:
Impact Analysis of Inter-network Degree Correlation on Cascading Failures in Cyber-Physical Systems. 16:1-16:21 - Warisa Sritriratanarak

, Paulo Garcia
:
Cyber Physical Games: Rational Multi-Agent Decision-Making in Temporally Non-Deterministic Environments. 17:1-17:21 - Pengchao Yao

, Bingjing Yan
, Qiang Yang
:
Game Theoretical Decision-Making of Dynamic Defense in Cyber-Physical Power Systems under Cyber-Attacks. 18:1-18:21 - Sanghoon Lee

, Jiyeong Chae
, Haewon Jeon
, Taehyun Kim
, Yeong-Gi Hong
, Doo-Sik Um
, Taewoo Kim
, Kyung-Joon Park
:
Cyber-Physical AI: Systematic Research Domain for Integrating AI and Cyber-Physical Systems. 19:1-19:33 - Shao-Hua Wang

, Chen-Xuan Lin
, Yu-Tsung Wu
, Chia-Heng Tu
:
PARD: A Dataflow Aware Profiler for ROS-Based Autonomous Driving Software. 20:1-20:33 - Masahiro Hasumi

, Takuma Yabe
, Takuya Azumi
:
Exploring Power Usage and Inference Speed Evaluation of Low-power Clustered Many-core Platforms. 21:1-21:23 - Xusheng Luo

, Tianhao Wei
, Simin Liu
, Ziwei Wang
, Luis Mattei-Mendez
, Taylor Loper
, Joshua Neighbor
, Casidhe Hutchison
, Changliu Liu
:
Certifying Robustness of Learning-Based Keypoint Detection and Pose Estimation Methods. 22:1-22:26
Volume 9, Number 3, July 2025
- Omar Adel Ibrahim

, Roberto Di Pietro
:
Drone-Mag: UAV Identification and Authentication via Electromagnetic Emissions. 23:1-23:25 - Praneeta Maganti

, Paresh Saxena
, Rajib Ranjan Maiti
:
Discovering Attack Signature and Its Travel Path using Graphical Model in CPS: A Case Study. 24:1-24:26
- Ning Zhang

, Bryan C. Ward
, Andrew Clark
, Ziming Zhao
, Aiping Xiong
:
Introduction to the Special Issue on Security and Privacy in Safety-Critical Cyber-Physical Systems. 25:1-25:3 - Mohammad Fakhruddin Babar

, Monowar Hasan
:
Optimizing Confidential Deep Learning for Real-Time Systems. 26:1-26:27 - Pravineeth Edara

, Sanmitra Banerjee
, Biresh Kumar Joardar
:
Localization of Data Compromised by Hardware Attacks in Machine Learning Enabled Cyber-Physical Edge Devices. 27:1-27:24 - Zain Alabedin Haj Hammadeh

, Monowar Hasan
, Mohammad Hamad
:
RESCUE: A Reconfigurable Scheduling Framework for Securing Multi-Core Real-Time Systems. 28:1-28:23 - Srinidhi Madabhushi

, Rinku Dewri
:
Mitigating Over-Generalization in Anomalous Power Consumption Detection using Adversarial Training. 29:1-29:25 - Md Hasan Shahriar

, Mohammad Raashid Ansari
, Jean-Philippe Monteuuis
, Md Shahedul Haque
, Cong Chen
, Jonathan Petit
, Y. Thomas Hou
, Wenjing Lou
:
VehiGAN: Generative Adversarial Networks for Adversarially Robust V2X Misbehavior Detection Systems. 30:1-30:26 - Stefano Longari, Paolo Cerracchio, Michele Carminati, Stefano Zanero:

Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation. 31:1-31:27 - Bart Wolleswinkel

, Manuel Mazo Jr.
, Riccardo M. G. Ferrari
:
Switched Zero Dynamics Attacks on Sampled-Data Systems with Non-Uniform Sampling: Vulnerability and Countermeasures. 32:1-32:23 - Andreas Finkenzeller

, Arne Fucks
, Emanuel Regnath
, Mohammad Hamad
, Sebastian Steinhorst
:
Securing the Precision Time Protocol with SDN-enabled Cyclic Path Asymmetry Analysis. 33:1-33:25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














