Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Automated software verification of hyperliveness
R Beutner - International Conference on Tools and Algorithms for …, 2024 - Springer
Hyperproperties relate multiple executions of a program and are commonly used to specify
security and information-flow policies. Most existing work has focused on the verification of k …
security and information-flow policies. Most existing work has focused on the verification of k …
Infinite-step opacity and K-step opacity of stochastic discrete-event systems
Opacity is an important information-flow property that arises in security and privacy analysis
of cyber–physical systems. Among many different notions of opacity, K-step opacity requires …
of cyber–physical systems. Among many different notions of opacity, K-step opacity requires …
On approximate opacity of cyber-physical systems
Opacity is an important information-flow security property in the analysis of cyber-physical
systems. It captures the plausible deniability of the system's secret behavior in the presence …
systems. It captures the plausible deniability of the system's secret behavior in the presence …
Enforcing opacity by insertion functions under multiple energy constraints
This paper investigates the enforcement of opacity by insertion functions subject to multiple
quantitative constraints capturing resource or energy limitations. There is a malicious …
quantitative constraints capturing resource or energy limitations. There is a malicious …
Strong current-state and initial-state opacity of discrete-event systems
X Han, K Zhang, J Zhang, Z Li, Z Chen - Automatica, 2023 - Elsevier
Opacity, as an important property in information-flow security, characterizes the ability of a
system to keep some secret information from an intruder. In discrete-event systems, based …
system to keep some secret information from an intruder. In discrete-event systems, based …
Synthesis of dynamic masks for infinite-step opacity
X Yin, S Li - IEEE Transactions on Automatic Control, 2019 - ieeexplore.ieee.org
We investigate the problem of synthesizing dynamic masks that preserve the infinite-step
opacity in the context of discrete-event systems. Dynamic mask is an information acquisition …
opacity in the context of discrete-event systems. Dynamic mask is an information acquisition …
Noninterference enforcement via supervisory control in bounded Petri nets
Security of distributed control systems is affected by the presence of information leaks, which
permit to external intruders to infer the state of the system itself. Noninterference deals with …
permit to external intruders to infer the state of the system itself. Noninterference deals with …
Compositional and abstraction-based approach for synthesis of edit functions for opacity enforcement
This article develops a novel compositional and abstraction-based approach to synthesize
edit functions for opacity enforcement in modular discrete event systems. Edit functions alter …
edit functions for opacity enforcement in modular discrete event systems. Edit functions alter …
Opacity enforcing supervisory control using nondeterministic supervisors
In this article, we investigate the enforcement of opacity via supervisory control in the context
of discrete-event systems. A system is said to be opaque if the intruder, which is modeled as …
of discrete-event systems. A system is said to be opaque if the intruder, which is modeled as …