Search Results for author: Georgios Bakirtzis

Found 9 papers, 3 papers with code

Formal Methods for Autonomous Systems

no code implementations2 Nov 2023 Tichakorn Wongpiromsarn, Mahsa Ghasemi, Murat Cubuktepe, Georgios Bakirtzis, Steven Carr, Mustafa O. Karabag, Cyrus Neary, Parham Gohari, Ufuk Topcu

Formal methods refer to rigorous, mathematical approaches to system development and have played a key role in establishing the correctness of safety-critical systems.

Sensor Placement for Online Fault Diagnosis

no code implementations21 Nov 2022 Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu

Fault diagnosis is the problem of determining a set of faulty system components that explain discrepancies between observed and expected behavior.

A formal process of hierarchical functional requirements development for Set-Based Design

no code implementations26 Oct 2022 Minghui Sun, Zhaoyang Chen, Georgios Bakirtzis, Hassan Jafarzadeh, Cody Fleming

Set-Based Design is a promising approach to complex systems design as it supports alternative exploration and gradual uncertainty reduction.

Categorical semantics of compositional reinforcement learning

no code implementations29 Aug 2022 Georgios Bakirtzis, Michail Savvas, Ufuk Topcu

However, generating compositional models requires the characterization of minimal assumptions for the robustness of the compositional feature.

reinforcement-learning Reinforcement Learning (RL)

Compositional Thinking in Cyberphysical Systems Theory

no code implementations27 May 2021 Georgios Bakirtzis, Eswaran Subrahmanian, Cody H. Fleming

Engineering safe and secure cyber-physical systems requires system engineers to develop and maintain a number of model views, both dynamic and static, which can be seen as algebras.

Fundamental Challenges of Cyber-Physical Systems Security Modeling

1 code implementation30 Apr 2020 Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming

Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design.

Cryptography and Security Systems and Control Systems and Control

Data Driven Vulnerability Exploration for Design Phase System Analysis

no code implementations6 Sep 2019 Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody H. Fleming, Carl R. Elks

Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems.

Systems and Control Cryptography and Security Systems and Control

Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

1 code implementation24 Aug 2018 Georgios Bakirtzis, Brandon J. Simon, Cody H. Fleming, Carl R. Elks

Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards.

Human-Computer Interaction Cryptography and Security

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

1 code implementation31 Oct 2017 Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming

To construct such a model we produce a taxonomy of attributes; that is, a generalized schema for system attributes.

Cryptography and Security Systems and Control Systems and Control

Cannot find the paper you are looking for? You can Submit a new open access paper.