Synthesizing Secure Reactive Controller for Unmanned Aerial System
暂无分享,去创建一个
Wei Dong | Rui Li | Wei Lu | Shaoxian Shu | Rao Shi
[1] Johann Schumann,et al. R2U2: monitoring and diagnosis of security threats for unmanned aerial systems , 2017, Formal Methods in System Design.
[2] Yuval Elovici,et al. Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study , 2018, 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID).
[3] Robin R. Murphy,et al. A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).
[4] Hadas Kress-Gazit,et al. LTLMoP: Experimenting with language, Temporal Logic and robot control , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[5] Amir Pnueli,et al. Synthesis of Reactive(1) designs , 2006, J. Comput. Syst. Sci..
[6] Jens Palsberg,et al. Verification, Model Checking, and Abstract Interpretation , 2018, Lecture Notes in Computer Science.
[7] Jan Oliver Ringert,et al. GR(1) synthesis for LTL specification patterns , 2015, ESEC/SIGSOFT FSE.
[8] Fred Kröger,et al. Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.
[9] Martin Leucker,et al. A brief account of runtime verification , 2009, J. Log. Algebraic Methods Program..
[10] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[11] Vrizlynn L. L. Thing,et al. Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[12] Hadas Kress-Gazit,et al. Temporal-Logic-Based Reactive Mission and Motion Planning , 2009, IEEE Transactions on Robotics.
[13] Doina Bein,et al. Securing unmanned autonomous systems from cyber threats , 2019 .
[14] K.J. Kyriakopoulos,et al. Automatic synthesis of multi-agent motion tasks based on LTL specifications , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[15] Hoon-Jae Lee,et al. An Overview of Unmanned Aerial Vehicle: Cyber Security Perspective , 2016 .
[16] A. Pnueli,et al. On the Synthesis of an Asynchronous Reactive Module , 1989, ICALP.