-
Notifications
You must be signed in to change notification settings - Fork 14
Publications
-
Siu, Kit, Abha Moitra, Meng Li, Michael Durling, Heber Herencia-Zapana, John Interrante, Baoluo Meng et al. "Architectural and behavioral analysis for cyber security." In 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), pp. 1-10. IEEE, 2019.
-
K. Siu, H. Herencia-Zapana, D. Prince and A. Moitra, "A Model-Based Framework for Analyzing the Security of System Architectures," 2020 Annual Reliability and Maintainability Symposium (RAMS), 2020, pp. 1-6, doi: 10.1109/RAMS48030.2020.9153607.
-
"DARPA Project Producing Tool to Help Anticipate Military and Industrial Systems’ Cyber Threats”, NextGov.com, April 2020.
-
Moitra, A., Prince, D., Siu, K., Durling, M. et al., “Threat Identification and Defense Control Selection for Embedded Systems,” SAE Int. J. Transp. Cyber. & Privacy 3(2):2020, doi:10.4271/11-03-02-0005.
-
Meng, Baoluo, Abha Moitra, Andrew W. Crapo, Saswata Paul, Kit Siu, Michael Durling, Daniel Prince, and Heber Herencia-Zapana. "Towards developing formalized assurance cases." In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), pp. 1-9. IEEE, 2020.
-
Moosa Yahyazadeh, Proyash Podder, Endadul Hoque, and Omar Chowdhury. 2019. Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT '19). Association for Computing Machinery, New York, NY, USA, 61–72. DOI:https://doi.org/10.1145/3322431.3325107
-
Yahyazadeh M., Hussain S.R., Hoque E., Chowdhury O. (2020) PatrIoT: Policy Assisted Resilient Programmable IoT System. In: Deshmukh J., Ničković D. (eds) Runtime Verification. RV 2020. Lecture Notes in Computer Science, vol 12399. Springer, Cham. https://doi.org/10.1007/978-3-030-60508-7_8.
-
Meng, B.; Larraz, D.; Siu, K.; Moitra, A.; Interrante, J.; Smith,W.; Paul, S.; Prince, D.; Herencia-Zapana, H.; Arif, M.F.; et al. VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System. Systems 2021, 9, 18. https://doi.org/10.3390/systems9010018.
-
Meng, B., Smith, W., and Durling, M., “Security Threat Modeling and Automated Analysis for System Design,” SAE Int. J. Transp. Cyber. & Privacy 4(1):2021, doi:10.4271/11-04-01-0001.
-
Meng, Baoluo, Saswata Paul, Abha Moitra, Kit Siu, and Michael Durling. "Automating the Assembly of Security Assurance Case Fragments." In International Conference on Computer Safety, Reliability, and Security, pp. 101-114. Springer, Cham, 2021.
-
Jeniffer Barzeele et al. "Experience in Designing for Cyber Resiliency in Embedded DoD Systems", 31st Annual INCOSE International Symposium, 2021.
-
D. Larraz, M. Laurent, and C. Tinelli, "Merit and Blame Assignment with Kind 2," 26th International Conference on Formal Methods for Industrial Critical Systems (FMICS'21).
-
Meng, Baoluo, Arjun Viswanathan, William Smith, Abha Moitra, Kit Siu, and Michael Durling. "Synthesis of Optimal Defenses for System Architecture Design Model in MaxSMT." In NASA Formal Methods Symposium, pp. 752-770. Springer, Cham, 2022..
Distribution Statement A: Approved for Public Release, Distribution Unlimited
Copyright © 2020, General Electric Company, Board of Trustees of the University of Iowa