Security Engineering FY17 Systems Aware Cybersecurity

Stephen Adams, University of Virginia Bryan Carter, University of Virginia Krishnamurthy Vemuru, University of Virginia Carl Elks, Virginia Commonwealth University Tim Bakker, Virginia Commonwealth University Kryzsztof Cios, Virginia Commonwealth University Georgios Bakirtzis, Virginia Commonwealth University Aidan Collins, Virginia Commonwealth University Nancy Mead, Carnegie Mellon University Forrest Shull, Carnegie Mellon University

[1]  Antony R Mileham,et al.  Estimating cost at the conceptual design stage to optimize design in terms of performance and cost , 2008 .

[2]  Thomas L. Griffiths,et al.  Hierarchical Topic Models and the Nested Chinese Restaurant Process , 2003, NIPS.

[3]  J. R. Crookall,et al.  Design for Economic Manufacture , 1986 .

[4]  Nancy G. Leveson,et al.  Engineering a Safer World: Systems Thinking Applied to Safety , 2012 .

[5]  Lionel Simeon Marks,et al.  Mechanical engineers' handbook , 2012 .

[6]  John D. Lafferty,et al.  Correlated Topic Models , 2005, NIPS.

[7]  Katherine R. Davis,et al.  A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[8]  William H. Sanders,et al.  Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.

[9]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[10]  Ulrik Brandes,et al.  Graph Markup Language (GraphML) , 2013, Handbook of Graph Drawing and Visualization.

[11]  Georgios Bakirtzis,et al.  A model-based approach to security analysis for cyber-physical systems , 2018, 2018 Annual IEEE International Systems Conference (SysCon).

[12]  Ruth Breu,et al.  Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[13]  Barbara Kordy,et al.  DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..

[14]  Robert H. Klenke,et al.  A Modular Software Platform for Unmanned Aerial Vehicle Autopilot Systems , 2014 .

[15]  Garrett L. Ward,et al.  Design of a Small Form-Factor Flight Control System , 2014 .

[16]  Georgios Bakirtzis,et al.  MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis , 2017, ArXiv.

[17]  Fabio Massacci,et al.  The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures , 2017 .

[18]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[19]  Huaiyu Zhu On Information and Sufficiency , 1997 .

[20]  David M. Blei,et al.  Supervised Topic Models , 2007, NIPS.

[21]  Hermann Kopetz,et al.  Real-time systems , 2018, CSC '73.

[22]  Jianfeng Ma,et al.  On the architecture and development life cycle of secure cyber-physical systems , 2017, Journal of Communications and Information Networks.

[23]  Fei Hu Cyber-Physical Systems: Integrated Computing and Engineering Design , 2013 .

[24]  Nancy R. Mead,et al.  A Method and Case Study for Using Malware Analysis to Improve Security Requirements , 2015, Int. J. Secur. Softw. Eng..

[25]  William H. Sanders,et al.  Toward a cyber-physical topology language: applications to NERC CIP audit , 2013, SEGS '13.

[26]  Georgios Bakirtzis,et al.  A systems approach for eliciting mission-centric security requirements , 2018, 2018 Annual IEEE International Systems Conference (SysCon).

[27]  Emmanouil Magkos,et al.  Modeling security in cyber-physical systems , 2012, Int. J. Crit. Infrastructure Prot..

[28]  Nancy G. Leveson,et al.  Systems thinking for safety and security , 2013, ACSAC.