Search Results for author: Cody H. Fleming

Found 6 papers, 3 papers with code

A new safety-guided design methodology to complement model-based safety analysis for safety assurance

no code implementations30 Apr 2022 Minghui Sun, Cody H. Fleming

With the rapid advancement of Formal Methods, Model-based Safety Analysis (MBSA) has been gaining tremendous attention for its ability to rigorously verify whether the safety-critical scenarios are adequately addressed by the design solution of a cyber-physical human system.

Compositional Thinking in Cyberphysical Systems Theory

no code implementations27 May 2021 Georgios Bakirtzis, Eswaran Subrahmanian, Cody H. Fleming

Engineering safe and secure cyber-physical systems requires system engineers to develop and maintain a number of model views, both dynamic and static, which can be seen as algebras.

Fundamental Challenges of Cyber-Physical Systems Security Modeling

1 code implementation30 Apr 2020 Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming

Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design.

Cryptography and Security Systems and Control Systems and Control

Data Driven Vulnerability Exploration for Design Phase System Analysis

no code implementations6 Sep 2019 Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody H. Fleming, Carl R. Elks

Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems.

Systems and Control Cryptography and Security Systems and Control

Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

1 code implementation24 Aug 2018 Georgios Bakirtzis, Brandon J. Simon, Cody H. Fleming, Carl R. Elks

Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards.

Human-Computer Interaction Cryptography and Security

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

1 code implementation31 Oct 2017 Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming

To construct such a model we produce a taxonomy of attributes; that is, a generalized schema for system attributes.

Cryptography and Security Systems and Control Systems and Control

Cannot find the paper you are looking for? You can Submit a new open access paper.