no code implementations • 2 Nov 2023 • Tichakorn Wongpiromsarn, Mahsa Ghasemi, Murat Cubuktepe, Georgios Bakirtzis, Steven Carr, Mustafa O. Karabag, Cyrus Neary, Parham Gohari, Ufuk Topcu
Formal methods refer to rigorous, mathematical approaches to system development and have played a key role in establishing the correctness of safety-critical systems.
no code implementations • 21 Nov 2022 • Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu
Fault diagnosis is the problem of determining a set of faulty system components that explain discrepancies between observed and expected behavior.
no code implementations • 26 Oct 2022 • Minghui Sun, Zhaoyang Chen, Georgios Bakirtzis, Hassan Jafarzadeh, Cody Fleming
Set-Based Design is a promising approach to complex systems design as it supports alternative exploration and gradual uncertainty reduction.
no code implementations • 29 Aug 2022 • Georgios Bakirtzis, Michail Savvas, Ufuk Topcu
However, generating compositional models requires the characterization of minimal assumptions for the robustness of the compositional feature.
no code implementations • 27 May 2021 • Georgios Bakirtzis, Eswaran Subrahmanian, Cody H. Fleming
Engineering safe and secure cyber-physical systems requires system engineers to develop and maintain a number of model views, both dynamic and static, which can be seen as algebras.
1 code implementation • 30 Apr 2020 • Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming
Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design.
Cryptography and Security Systems and Control Systems and Control
no code implementations • 6 Sep 2019 • Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody H. Fleming, Carl R. Elks
Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems.
Systems and Control Cryptography and Security Systems and Control
1 code implementation • 24 Aug 2018 • Georgios Bakirtzis, Brandon J. Simon, Cody H. Fleming, Carl R. Elks
Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards.
Human-Computer Interaction Cryptography and Security
1 code implementation • 31 Oct 2017 • Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming
To construct such a model we produce a taxonomy of attributes; that is, a generalized schema for system attributes.
Cryptography and Security Systems and Control Systems and Control