To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
Target motion analysis and track association are the aims of this paper. It is assumed that the target trajectory is only partially observable by using temporal processing of a si...
The set of frames exchanged in automotive applications must meet two constraints: it has to be feasible from a schedulability point of view and it should minimize the network bandw...
This work studies the problem of design of nonlinear observers in the presence of exogenous disturbances. In particular, the present work proposes a systematic design method for no...
To avoid large overheads induced by runtime monitoring, the use of asynchronous log-based monitoring is sometimes adopted — even though this implies that the system may proceed f...