diff --git a/201 Metadata/My Library.bib b/201 Metadata/My Library.bib index 9321c3fb..0dd4eca2 100644 --- a/201 Metadata/My Library.bib +++ b/201 Metadata/My Library.bib @@ -11,26 +11,6 @@ file = {/home/danesabo/Zotero/storage/NKDJMYQZ/2023-national-cybersecurity-education.html} } -@online{220900796Diffusion, - title = {[2209.00796] {{Diffusion Models}}: {{A Comprehensive Survey}} of {{Methods}} and {{Applications}}}, - url = {https://arxiv.org/abs/2209.00796}, - urldate = {2023-10-10}, - file = {/home/danesabo/Zotero/storage/FWCR67DB/2209.html} -} - -@article{abadiApproximateCalculationRoots2016, - title = {The {{Approximate Calculation}} of the {{Roots}} of {{Algebraic Equation Through Monte Carlo Method}}}, - author = {Abadi, Vahid Mirzaei Mahmoud and Bahnamriri, Shila Banari}, - date = {2016}, - journaltitle = {International Journal of Mathematics and Computational Science}, - volume = {2}, - number = {3}, - pages = {64--68}, - abstract = {Finding the root of nonlinear algebraic equations is an issue usually found in engineering and sciences. This article presents a new method for the approximate calculation of the roots of a one-variable function through Monte Carlo Method. This method is actually based on the production of a random number in the target range of the root. Finally, some examples with acceptable error are provided to prove the efficiency of this method.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/VLGNUYZP/Abadi and Bahnamriri - The Approximate Calculation of the Roots of Algebr.pdf} -} - @book{abelsonStructureInterpretationComputer2022, title = {Structure and Interpretation of Computer Programs}, author = {Abelson, Harold and Sussman, Gerald Jay and Sussman, Julie and Henz, Martin and Wrigstad, Tobias}, @@ -46,25 +26,6 @@ file = {/home/danesabo/Zotero/storage/KZSJSUKD/Abelson et al. - 2022 - Structure and interpretation of computer programs.pdf} } -@article{abramsonAccurateStructurePrediction2024, - title = {Accurate Structure Prediction of Biomolecular Interactions with {{AlphaFold}} 3}, - author = {Abramson, Josh and Adler, Jonas and Dunger, Jack and Evans, Richard and Green, Tim and Pritzel, Alexander and Ronneberger, Olaf and Willmore, Lindsay and Ballard, Andrew J. and Bambrick, Joshua and Bodenstein, Sebastian W. and Evans, David A. and Hung, Chia-Chun and O’Neill, Michael and Reiman, David and Tunyasuvunakool, Kathryn and Wu, Zachary and Žemgulytė, Akvilė and Arvaniti, Eirini and Beattie, Charles and Bertolli, Ottavia and Bridgland, Alex and Cherepanov, Alexey and Congreve, Miles and Cowen-Rivers, Alexander I. and Cowie, Andrew and Figurnov, Michael and Fuchs, Fabian B. and Gladman, Hannah and Jain, Rishub and Khan, Yousuf A. and Low, Caroline M. R. and Perlin, Kuba and Potapenko, Anna and Savy, Pascal and Singh, Sukhdeep and Stecula, Adrian and Thillaisundaram, Ashok and Tong, Catherine and Yakneen, Sergei and Zhong, Ellen D. and Zielinski, Michal and Žídek, Augustin and Bapst, Victor and Kohli, Pushmeet and Jaderberg, Max and Hassabis, Demis and Jumper, John M.}, - date = {2024-06}, - journaltitle = {Nature}, - volume = {630}, - number = {8016}, - pages = {493--500}, - publisher = {Nature Publishing Group}, - issn = {1476-4687}, - doi = {10.1038/s41586-024-07487-w}, - url = {https://www.nature.com/articles/s41586-024-07487-w}, - urldate = {2024-11-13}, - abstract = {The introduction of AlphaFold\,21 has spurred a revolution in modelling the structure of proteins and their interactions, enabling a huge range of applications in protein modelling and design2–6. Here we describe our AlphaFold\,3 model with a substantially updated diffusion-based architecture that is capable of predicting the joint structure of complexes including proteins, nucleic acids, small molecules, ions and modified residues. The new AlphaFold model demonstrates substantially improved accuracy over many previous specialized tools: far greater accuracy for protein–ligand interactions compared with state-of-the-art docking tools, much higher accuracy for protein–nucleic acid interactions compared with nucleic-acid-specific predictors and substantially higher antibody–antigen prediction accuracy compared with AlphaFold-Multimer v.2.37,8. Together, these results show that high-accuracy modelling across biomolecular space is possible within a single unified deep-learning framework.}, - langid = {english}, - keywords = {Drug discovery,Machine learning,Protein structure predictions,Structural biology}, - file = {/home/danesabo/Zotero/storage/Y4BDPS2Y/Abramson et al. - 2024 - Accurate structure prediction of biomolecular interactions with AlphaFold 3.pdf} -} - @online{AbstractJulia, title = {{{AbstractJulia}}}, url = {https://www.algebraicjulia.org/} @@ -155,24 +116,6 @@ file = {/home/danesabo/Zotero/storage/HJUMUC2Z/Ahmed et al. - 2021 - Travel Time Prediction and Explanation with Spatio.pdf} } -@article{aldosariSecurityPrivacyChallenges2017, - title = {Security and {{Privacy Challenges}} in {{Cyber-Physical Systems}}}, - author = {AlDosari, Fahd}, - date = {2017-10-13}, - journaltitle = {Journal of Information Security}, - volume = {8}, - number = {4}, - pages = {285--295}, - publisher = {Scientific Research Publishing}, - doi = {10.4236/jis.2017.84019}, - url = {https://www.scirp.org/journal/paperinformation.aspx?paperid=79607}, - urldate = {2023-09-27}, - abstract = {Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the quality of services in all areas of life and achieving a classier lifestyle in terms of a required service’s functionality and timing. Cyber-Physical Systems (CPSs) complement the need to have smart products (e.g., homes, hospitals, airports, cities). In other words, regulate the three kinds of resources available: physical, computational, and networking. This regulation supports communication and interaction between the human word and digital word to find the required intelligence in all scopes of life, including Telecommunication, Power Generation and Distribution, and Manufacturing. Data Security is among the most important issues to be considered in recent technologies. Because Cyber-Physical Systems consist of interacting complex components and middle-ware, they face real challenges in being secure against cyber-attacks while functioning efficiently and without affecting or degrading their performance. This study gives a detailed description of CPSs, their challenges (including cyber-security attacks), characteristics, and related technologies. We also focus on the tradeoff between security and performance in CPS, and we present the most common Side Channel Attacks on the implementations of cryptographic algorithms (symmetric: AES and asymmetric: RSA) with the countermeasures against these attacks.}, - issue = {4}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/F45KN94V/AlDosari - 2017 - Security and Privacy Challenges in Cyber-Physical .pdf} -} - @article{alguliyevCyberphysicalSystemsTheir2018, title = {Cyber-Physical Systems and Their Security Issues}, author = {Alguliyev, Rasim and Imamverdiyev, Yadigar and Sukhostat, Lyudmila}, @@ -190,23 +133,6 @@ file = {/home/danesabo/Zotero/storage/H46P7GAA/Alguliyev et al. - 2018 - Cyber-physical systems and their security issues.pdf} } -@article{allisonSpecialIssueArtificial2022, - title = {Special {{Issue}}: {{Artificial Intelligence}} and {{Engineering Design}}}, - shorttitle = {Special {{Issue}}}, - editor = {Allison, James T. and Cardin, Michel-Alexandre and McComb, Chris and Ren, Max Yi and Selva, Daniel and Tucker, Conrad and Witherell, Paul and Zhao, Yaoyao Fiona}, - date = {2022-01-11}, - journaltitle = {Journal of Mechanical Design}, - shortjournal = {Journal of Mechanical Design}, - volume = {144}, - number = {2}, - issn = {1050-0472}, - doi = {10.1115/1.4053111}, - url = {https://doi.org/10.1115/1.4053111}, - urldate = {2022-05-02}, - abstract = {Artificial intelligence (AI) has had a strong presence in engineering design for decades, and while theory, methods, and tools for engineering design have advanced significantly during this time, many grand challenges remain. Modern advancements in AI, including new strategies for capturing, storing, and analyzing data, have the potential to revolutionize engineering design processes in a variety of ways. The purpose of this special issue is to consolidate recent research activities that utilize existing or new AI methods to advance engineering design knowledge and capabilities.During the conception of this special issue, we identified three core interfaces between the research domains of engineering design and AI: (1) leveraging AI methods directly in engineering design methods, (2) creating new AI capabilities that are inspired by unique challenges that arise in engineering design, and (3) creating and analyzing design methods that are tailored for the design of engineering systems where the systems themselves utilize AI, such as autonomous vehicles. The diverse body of research articles that now comprise this special issue gravitate toward the first of these themes: advancing engineering design capability through the use of AI. While these articles are an exciting contribution to the design research literature, significant opportunities exist for more fully exploring the remaining two interfaces, ideally through more unified interdisciplinary efforts. During the process of synthesizing this editorial, we recognized a fourth interface between engineering design and AI: specifically, investigating how AI could be used as an increasingly powerful tool for conducting engineering design research, such as AI tools that are used directly in research activities (e.g., experiment planning or gathering information from human designers) and that are not necessarily part of the designed system or the design method.}, - file = {/home/danesabo/Zotero/storage/89PHIVBR/Allison et al. - 2022 - Special Issue Artificial Intelligence and Enginee.pdf;/home/danesabo/Zotero/storage/JKNBDBFH/Special-Issue-Artificial-Intelligence-and.html} -} - @online{AllLeanBooks, title = {All {{Lean Books And Where To Find Them}}}, url = {https://lakesare.brick.do/all-lean-books-and-where-to-find-them-x2nYwjM3AwBQ}, @@ -225,17 +151,6 @@ file = {/home/danesabo/Zotero/storage/AAJTKRQW/all-lean-books-and-where-to-find-them-x2nYwjM3AwBQ.html} } -@online{AlphaFold3Predicts2024, - title = {{{AlphaFold}} 3 Predicts the Structure and Interactions of All of Life’s Molecules}, - date = {2024-05-08}, - url = {https://blog.google/technology/ai/google-deepmind-isomorphic-alphafold-3-ai-model/}, - urldate = {2024-10-28}, - abstract = {Our new AI model AlphaFold 3 can predict the structure and interactions of all life’s molecules with unprecedented accuracy.}, - langid = {american}, - organization = {Google}, - file = {/home/danesabo/Zotero/storage/AMNGSTSP/google-deepmind-isomorphic-alphafold-3-ai-model.html} -} - @misc{altenkirchWhyDependentTypes2005, title = {Why {{Dependent Types Matter}}}, author = {Altenkirch, Thorsten and McBride, Conor and McKinna, James}, @@ -306,71 +221,6 @@ file = {/home/danesabo/Zotero/storage/2JEKRTF9/Althoff et al. - 2021 - Set Propagation Techniques for Reachability Analys.pdf} } -@article{alvarezComputationallyEfficientConvolved2011, - title = {Computationally {{Efficient Convolved Multiple Output Gaussian Processes}}}, - author = {Alvarez, Mauricio A. and Lawrence, Neil D.}, - date = {2011-05}, - journaltitle = {Journal of Machine Learning Research}, - shortjournal = {J. Mach. Learn. Res.}, - volume = {12}, - pages = {1459--1500}, - publisher = {Microtome Publ}, - location = {Brookline}, - issn = {1532-4435}, - url = {https://www.webofscience.com/wos/woscc/full-record/WOS:000292304000002}, - urldate = {2022-04-18}, - abstract = {Recently there has been an increasing interest in regression methods that deal with multiple outputs. This has been motivated partly by frameworks like multitask learning, multisensor networks or structured output data. From a Gaussian processes perspective, the problem reduces to specifying an appropriate covariance function that, whilst being positive semi-definite, captures the dependencies between all the data points and across all the outputs. One approach to account for non-trivial correlations between outputs employs convolution processes. Under a latent function interpretation of the convolution transform we establish dependencies between output variables. The main drawbacks of this approach are the associated computational and storage demands. In this paper we address these issues. We present different efficient approximations for dependent output Gaussian processes constructed through the convolution formalism. We exploit the conditional independencies present naturally in the model. This leads to a form of the covariance similar in spirit to the so called PITC and FITC approximations for a single output. We show experimental results with synthetic and real data, in particular, we show results in school exams score prediction, pollution prediction and gene expression data.}, - langid = {english}, - annotation = {WOS:000292304000002} -} - -@thesis{alvarezConvolvedGaussianProcess2011, - type = {phdthesis}, - title = {Convolved {{Gaussian}} Process Priors for Multivariate Regression with Applications to Dynamical Systems}, - author = {Alvarez, Mauricio A.}, - date = {2011}, - institution = {The University of Manchester (United Kingdom)}, - location = {England}, - url = {https://www.proquest.com/docview/1782840564/abstract/9A1A9FA2918E4C98PQ/1}, - urldate = {2022-04-18}, - abstract = {In this thesis we address the problem of modeling correlated outputs using Gaussian process priors. Applications of modeling correlated outputs include the joint prediction of pollutant metals in geostatistics and multitask learning in machine learning. Defining a Gaussian process prior for correlated outputs translates into specifying a suitable covariance function that captures dependencies between the different output variables. Classical models for obtaining such a covariance function include the linear model of coregionalization and process convolutions. We propose a general framework for developing multiple output covariance functions by performing convolutions between smoothing kernels particular to each output and covariance functions that are common to all outputs. Both the linear model of coregionalization and the process convolutions turn out to be special cases of this framework. Practical aspects of the proposed methodology are studied in this thesis. They involve the use of domain-specific knowledge for defining relevant smoothing kernels, efficient approximations for reducing computational complexity and a novel method for establishing a general class of nonstationary covariances with applications in robotics and motion capture data.Reprints of the publications that appear at the end of this document, report case studies and experimental results in sensor networks, geostatistics and motion capture data that illustrate the performance of the different methods proposed.}, - isbn = {9781073277582}, - langid = {english}, - pagetotal = {225}, - file = {/home/danesabo/Zotero/storage/VUMQE42J/Alvarez - Convolved Gaussian process priors for multivariate.pdf} -} - -@unpublished{alvarezKernelsVectorValuedFunctions2012, - title = {Kernels for {{Vector-Valued Functions}}: A {{Review}}}, - shorttitle = {Kernels for {{Vector-Valued Functions}}}, - author = {Alvarez, Mauricio A. and Rosasco, Lorenzo and Lawrence, Neil D.}, - date = {2012-04-16}, - eprint = {1106.6251}, - eprinttype = {arXiv}, - eprintclass = {cs, math, stat}, - url = {http://arxiv.org/abs/1106.6251}, - urldate = {2022-04-18}, - abstract = {Kernel methods are among the most popular techniques in machine learning. From a frequentist/discriminative perspective they play a central role in regularization theory as they provide a natural choice for the hypotheses space and the regularization functional through the notion of reproducing kernel Hilbert spaces. From a Bayesian/generative perspective they are the key in the context of Gaussian processes, where the kernel function is also known as the covariance function. Traditionally, kernel methods have been used in supervised learning problem with scalar outputs and indeed there has been a considerable amount of work devoted to designing and learning kernels. More recently there has been an increasing interest in methods that deal with multiple outputs, motivated partly by frameworks like multitask learning. In this paper, we review different methods to design or learn valid kernel functions for multiple outputs, paying particular attention to the connection between probabilistic and functional methods.}, - version = {2}, - file = {/home/danesabo/Zotero/storage/BPTTELCZ/Alvarez et al. - 2012 - Kernels for Vector-Valued Functions a Review.pdf;/home/danesabo/Zotero/storage/FZWKD3F6/1106.html} -} - -@inproceedings{alvarezLatentForceModels2009, - title = {Latent {{Force Models}}}, - booktitle = {Proceedings of the {{Twelth International Conference}} on {{Artificial Intelligence}} and {{Statistics}}}, - author = {Álvarez, Mauricio and Luengo, David and Lawrence, Neil D.}, - date = {2009-04-15}, - pages = {9--16}, - publisher = {PMLR}, - issn = {1938-7228}, - url = {https://proceedings.mlr.press/v5/alvarez09a.html}, - urldate = {2022-04-20}, - abstract = {Purely data driven approaches for machine learning present difficulties when data is scarce relative to the complexity of the model or when the model is forced to extrapolate. On the other hand, purely mechanistic approaches need to identify and specify all the interactions in the problem at hand (which may not be feasible) and still leave the issue of how to parameterize the system. In this paper, we present a hybrid approach using Gaussian processes and differential equations to combine data driven modeling with a physical model of the system. We show how different, physically-inspired, kernel functions can be developed through sensible, simple, mechanistic assumptions about the underlying system. The versatility of our approach is illustrated with three case studies from computational biology, motion capture and geostatistics.}, - eventtitle = {Artificial {{Intelligence}} and {{Statistics}}}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/3R3NEMA9/Álvarez et al. - 2009 - Latent Force Models.pdf} -} - @book{alwanTheoryHybridSystems2018, title = {Theory of {{Hybrid Systems}}: {{Deterministic}} and {{Stochastic}}}, shorttitle = {Theory of {{Hybrid Systems}}}, @@ -459,30 +309,6 @@ file = {/home/danesabo/Zotero/storage/2XWVX68Q/Amoah et al. - 2014 - Security analysis of the non-aggressive challenge .pdf} } -@article{aModeladoNucleoAnalisis2023, - title = {Modelado del núcleo y análisis del funcionamiento de un microreactor Nuclear}, - author = {A, D. Ricaurte and C, L. Igua and C, J. Vargas and D, H. Olaya}, - date = {2023-12-12}, - journaltitle = {Ciencia en Desarrollo}, - volume = {14}, - number = {E}, - pages = {44--47}, - issn = {2462-7658}, - doi = {10.19053/uptc.01217488.v14.nE.2023.17440}, - url = {https://revistas.uptc.edu.co/index.php/ciencia_en_desarrollo/article/view/17440}, - urldate = {2025-01-21}, - abstract = {This research focuses on a detailed analysis of the operation and modeling of the core of a prototype nuclear microreactor with characteristics similar to Westinghouse’s eVinci nuclear microreactor. To achieve this, firstly, the RootT M software is employed to adapt the energy spectrum under which the 241Am-Be source operates. Secondly, the Geant4TM simulation tool is used, where, starting from the configuration of a cylinder embedded in a box, the unit cell is established to obtain a trapezoidal geometry as a geometric component of the hexagonal core of the microreactor. Additionally, the essential parameters of the functions enabling the reproduction of data from a 241Am-Be source are presented in the results, playing a crucial role in initiating nuclear fissions in the uranium dioxide UO2 fuel rods. Finally, the appropriate dimensions of the various components of the core are established, including the fuel rods, neutron moderators, and control drums located within the microreactor.}, - issue = {E}, - langid = {spanish}, - keywords = {eVinci,Geant4 TM,Microreactor Nuclear,Nu ́cleo,Root TM.}, - file = {/home/danesabo/Zotero/storage/2WAMJEGT/A et al. - 2023 - Modelado del núcleo y análisis del funcionamiento de un microreactor Nuclear.pdf} -} - -@misc{amsldoc, - title = {{{AMS LaTeX Documentation}}}, - file = {/home/danesabo/Zotero/storage/WE549H7J/amsldoc.pdf} -} - @inproceedings{anandROSCoqRobotsPowered2015, title = {{{ROSCoq}}: {{Robots Powered}} by {{Constructive Reals}}}, shorttitle = {{{ROSCoq}}}, @@ -500,40 +326,6 @@ file = {/home/danesabo/Zotero/storage/QL3ZHIDZ/Anand and Knepper - 2015 - ROSCoq Robots Powered by Constructive Reals.pdf} } -@article{andriotisDeepReinforcementLearning2021, - title = {Deep Reinforcement Learning Driven Inspection and Maintenance Planning under Incomplete Information and Constraints}, - author = {Andriotis, C.P. and Papakonstantinou, K.G.}, - date = {2021-08}, - journaltitle = {Reliability Engineering \& System Safety}, - shortjournal = {Reliability Engineering \& System Safety}, - volume = {212}, - pages = {107551}, - issn = {09518320}, - doi = {10.1016/j.ress.2021.107551}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S095183202100106X}, - urldate = {2022-02-11}, - abstract = {Determination of inspection and maintenance policies for minimizing long-term risks and costs in deteriorating engineering environments constitutes a complex optimization problem. Major computational challenges include the (i) curse of dimensionality, due to exponential scaling of state/action set cardinalities with the number of components; (ii) curse of history, related to exponentially growing decision-trees with the number of decision-steps; (iii) presence of state uncertainties, induced by inherent environment stochasticity and variability of inspection/monitoring measurements; (iv) presence of constraints, pertaining to stochastic long-term limitations, due to resource scarcity and other infeasible/undesirable system responses. In this work, these challenges are addressed within a joint framework of constrained Partially Observable Markov Decision Processes (POMDP) and multi-agent Deep Reinforcement Learning (DRL). POMDPs optimally tackle (ii)-(iii), combining stochastic dynamic programming with Bayesian inference principles. Multi-agent DRL addresses (i), through deep function parametrizations and decentralized control assumptions. Challenge (iv) is herein handled through proper state augmentation and Lagrangian relaxation, with emphasis on life-cycle risk-based constraints and budget limitations. The underlying algorithmic steps are provided, and the proposed framework is found to outperform well-established policy baselines and facilitate adept prescription of inspection and intervention actions, in cases where decisions must be made in the most resource- and risk-aware manner.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/YMIH5G7M/_DRL_InsMaint_Andriotis_2021.pdf} -} - -@article{andriotisManagingEngineeringSystems2019, - title = {Managing Engineering Systems with Large State and Action Spaces through Deep Reinforcement Learning}, - author = {Andriotis, C.P. and Papakonstantinou, K.G.}, - date = {2019-11}, - journaltitle = {Reliability Engineering \& System Safety}, - shortjournal = {Reliability Engineering \& System Safety}, - volume = {191}, - pages = {106483}, - issn = {09518320}, - doi = {10.1016/j.ress.2019.04.036}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0951832018313309}, - urldate = {2022-02-11}, - abstract = {Decision-making for engineering systems management can be efficiently formulated using Markov Decision Processes (MDPs) or Partially Observable MDPs (POMDPs). Typical MDP/POMDP solution procedures utilize offline knowledge about the environment and provide detailed policies for relatively small systems with tractable state and action spaces. However, in large multi-component systems the sizes of these spaces easily explode, as system states and actions scale exponentially with the number of components, whereas environment dynamics are difficult to be described explicitly for the entire system and may only be accessible through numerical simulators. In this work, to address these issues, an integrated Deep Reinforcement Learning (DRL) framework is introduced. The Deep Centralized Multi-agent Actor Critic (DCMAC) is developed, an off-policy actor-critic DRL approach, providing efficient life-cycle policies for large multi-component systems operating in high-dimensional spaces. Apart from deep network approximators parametrizing complex functions in large state spaces, DCMAC also adopts a factorized representation of the system actions, thus being able to designate individualized component- and subsystem-level decisions, while maintaining a centralized value function for the entire system. DCMAC compares well against Deep Q-Network solutions and exact policies, where applicable, and outperforms optimized baselines that are based on time-based, condition-based and periodic inspection and maintenance policies.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/BKBAPZUL/Andriotis and Papakonstantinou - 2019 - Managing engineering systems with large state and .pdf} -} - @inproceedings{annpureddySTaLiRoToolTemporal2011, title = {S-{{TaLiRo}}: {{A Tool}} for {{Temporal Logic Falsification}} for {{Hybrid Systems}}}, shorttitle = {S-{{TaLiRo}}}, @@ -570,24 +362,6 @@ file = {/home/danesabo/Zotero/storage/TR2PK9NQ/Annunziato et al. - 2014 - On the Connection between the Hamilton-Jacobi-Bell.pdf} } -@inproceedings{antoniniSecurityChallengesBuilding2014, - title = {Security Challenges in Building Automation and {{SCADA}}}, - booktitle = {2014 {{International Carnahan Conference}} on {{Security Technology}} ({{ICCST}})}, - author = {Antonini, Alessio and Barenghi, Alessandro and Pelosi, Gerardo and Zonouz, Saman}, - date = {2014-10}, - pages = {1--6}, - publisher = {IEEE}, - location = {Rome, Italy}, - doi = {10.1109/CCST.2014.6986996}, - url = {http://ieeexplore.ieee.org/document/6986996/}, - urldate = {2022-09-30}, - abstract = {Cyber-Physical Systems (CPSs) are systems in which software and hardware entities monitor and manage physical devices using communication channels. They have become ubiquitous in many domains including health monitoring, smart vehicles and energy efficiency as in smart buildings and smart grid operations. The introduction of a digital control system and a communication channel, to exchange data with the physical system, increases the chance of vulnerabilities in the overall system. This paper presents the state-of-the-art of the security vulnerabilities of such systems as well as the possible methods to mitigate/reduce such threats. We will describe recent promising solutions to guarantee confidentiality and authentication of the transported data in building automation network domains, and present ideas to analyze and formally verify the control commands issued by the (possibly compromised) control network computers for execution on SCADA system actuators. The purpose of the latter approach is to prevent malicious parties from injecting malicious commands and potentially driving the underlying physical system into an unsafe state.}, - eventtitle = {2014 {{International Carnahan Conference}} on {{Security Technology}} ({{ICCST}})}, - isbn = {978-1-4799-3532-1 978-1-4799-3530-7}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/VCGCU38R/Antonini et al. - 2014 - Security challenges in building automation and SCA.pdf} -} - @article{antoNovelFrameworkDesign2023, title = {A {{Novel Framework}} for the {{Design}} of {{Resilient Cyber-Physical Systems Using Control Theory}} and {{Formal Methods}}}, author = {Anto, Kelvin and Swain, Akshya Kumar and Roop, Partha}, @@ -617,44 +391,6 @@ file = {/home/danesabo/Zotero/storage/DZQWEJY8/Aranha et al. - 2023 - HELIOPOLIS Verifiable Computation over Homomorphi.pdf} } -@inreference{ArchitectureAnalysisAmp2023, - title = {Architecture {{Analysis}} \& {{Design Language}}}, - booktitle = {Wikipedia}, - date = {2023-09-06T20:07:42Z}, - url = {https://en.wikipedia.org/w/index.php?title=Architecture_Analysis_%26_Design_Language&oldid=1174175484}, - urldate = {2023-10-03}, - abstract = {The Architecture Analysis \& Design Language (AADL) is an architecture description language standardized by SAE. AADL was first developed in the field of avionics, and was known formerly as the Avionics Architecture Description Language.The Architecture Analysis \& Design Language is derived from MetaH, an architecture description language made by the Advanced Technology Center of Honeywell. AADL is used to model the software and hardware architecture of an embedded, real-time system. Due to its emphasis on the embedded domain, AADL contains constructs for modeling both software and hardware components (with the hardware components named "execution platform" components within the standard). This architecture model can then be used either as a design documentation, for analyses (such as schedulability and flow control) or for code generation (of the software portion), like UML.}, - langid = {english}, - annotation = {Page Version ID: 1174175484}, - file = {/home/danesabo/Zotero/storage/65H9TIS3/Architecture_Analysis_&_Design_Language.html} -} - -@online{ArchitectureAnalysisDesign, - title = {Architecture {{Analysis}} and {{Design Language}} ({{AADL}})}, - url = {https://www.sei.cmu.edu/our-work/projects/display.cfm?customel_datapageid_4050=191439,191439}, - urldate = {2023-10-03}, - abstract = {Software for mission- and safety-critical systems, such as avionics systems in aircraft, is growing larger and more expensive. The Architecture Analysis and Design Language (AADL) addresses common problems in the development of these systems, such as mismatched assumptions about the physical system, computer hardware, software, and their interactions that can result in system problems detected too late in the development lifecycle.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/2DE4Z9S6/display.html} -} - -@article{ardaozdemirTransferFunctionEstimation2017, - title = {Transfer {{Function Estimation}} in {{System Identification Toolbox}} via {{Vector Fitting}}}, - author = {Arda Ozdemir, Ahmet and Gumussoy, Suat}, - date = {2017-07}, - journaltitle = {IFAC-PapersOnLine}, - shortjournal = {IFAC-PapersOnLine}, - volume = {50}, - number = {1}, - pages = {6232--6237}, - issn = {24058963}, - doi = {10.1016/j.ifacol.2017.08.1026}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S2405896317315045}, - urldate = {2024-11-08}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/ZXNWPZHZ/Arda Ozdemir and Gumussoy - 2017 - Transfer Function Estimation in System Identification Toolbox via Vector Fitting.pdf} -} - @article{arkadovVirtualDigitalNuclear2014, title = {The Virtual Digital Nuclear Power Plant: {{A}} Modern Tool for Supporting the Lifecycle of {{VVER-based}} Nuclear Power Units}, shorttitle = {The Virtual Digital Nuclear Power Plant}, @@ -674,23 +410,6 @@ file = {/home/danesabo/Zotero/storage/WVXG2HAU/Arkadov et al. - 2014 - The virtual digital nuclear power plant A modern .pdf} } -@article{aronszajnTheoryReproducingKernels1950, - title = {Theory of Reproducing Kernels}, - author = {Aronszajn, N.}, - date = {1950}, - journaltitle = {Transactions of the American Mathematical Society}, - shortjournal = {Trans. Amer. Math. Soc.}, - volume = {68}, - number = {3}, - pages = {337--404}, - issn = {0002-9947, 1088-6850}, - doi = {10.1090/S0002-9947-1950-0051437-7}, - url = {https://www.ams.org/tran/1950-068-03/S0002-9947-1950-0051437-7/}, - urldate = {2022-04-21}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/SL3BWZ8Q/S0002-9947-1950-0051437-7.pdf} -} - @article{arrietaExplainableArtificialIntelligence2020, title = {Explainable {{Artificial Intelligence}} ({{XAI}}): {{Concepts}}, Taxonomies, Opportunities and Challenges toward Responsible {{AI}}}, author = {Arrieta, Alejandro Barredo and Díaz-Rodríguez, Natalia and Del Ser, Javier and Bennetot, Adrien and Tabik, Siham and Barbado, Alberto and García, Salvador and Gil-López, Sergio and Molina, Daniel and Benjamins, Richard}, @@ -704,17 +423,6 @@ Opportunities and Challenges toward Responsible AI.pdf} } -@video{artemkirsanovKeyEquationProbability2024, - entrysubtype = {video}, - title = {The {{Key Equation Behind Probability}}}, - editor = {{Artem Kirsanov}}, - editortype = {director}, - date = {2024-08-22}, - url = {https://www.youtube.com/watch?v=KHVR587oW8I}, - urldate = {2024-10-30}, - abstract = {Get 4 months extra on a 2 year plan here: https://nordvpn.com/artemkirsanov. It’s risk free with Nord’s 30 day money-back guarantee! Socials: X/Twitter: https://x.com/ArtemKRSV Patreon: ~~/~artemkirsanov~~ My name is Artem, I'm a graduate student at NYU Center for Neural Science and researcher at Flatiron Institute (Center for Computational Neuroscience). In this video, we explore the fundamental concepts that underlie probability theory and its applications in neuroscience and machine learning. We begin with the intuitive idea of surprise and its relation to probability, using real-world examples to illustrate these concepts. From there, we move into more advanced topics: 1) Entropy – measuring the average surprise in a probability distribution. 2) Cross-entropy and the loss of information when approximating one distribution with another. 3) Kullback-Leibler (KL) divergence and its role in quantifying the difference between two probability distributions. OUTLINE: 00:00 Introduction 02:00 Sponsor: NordVPN 04:07 What is probability (Bayesian vs Frequentist) 06:42 Probability Distributions 10:17 Entropy as average surprisal 13:53 Cross-Entropy and Internal models 19:20 Kullback–Leibler (KL) divergence 20:46 Objective functions and Cross-Entropy minimization 24:22 Conclusion \& Outro CREDITS: Special thanks to Crimson Ghoul for providing English subtitles! Icons by https://www.freepik.com/} -} - @book{arthoFormalTechniquesSafetyCritical2015, title = {Formal {{Techniques}} for {{Safety-Critical Systems}}}, author = {Artho, Cyrille and Ölveczky, Peter Csaba}, @@ -723,42 +431,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/BH4V4E7U/Formal Techniques for Safety Critical Systems.pdf} } -@article{arzhanovDiagnosticsCoreBarrel2003, - title = {Diagnostics of Core Barrel Vibrations by In-Core and Ex-Core Neutron Noise}, - author = {Arzhanov, V. and Pázsit, I.}, - date = {2003-01-01}, - journaltitle = {Progress in Nuclear Energy}, - volume = {43}, - number = {1--4}, - pages = {151--158}, - issn = {01491970}, - doi = {10.1016/s0149-1970(03)00023-4}, - url = {https://www.sciencedirect.com/science/article/pii/S0149197003000234 https://www.sciencedirect.com/science/article/abs/pii/S0149197003000234?via%3Dihub}, - abstract = {Diagnostics of core-barrel vibrations has traditionally been made by use of ex-vessel neutron detector signals. We suggest that in addition to the ex-core noise, also the in-core noise, induced by core barrel vibrations, be also used. This would enhance the possibilities of diagnostics where the number of the ex-core detectors is not sufficient or their positions are disadvantageous for effective diagnostics, especially for shell-mode vibrations. To this order, the theory of in-core noise induced by a fluctuating core boundary has been elaborated and applied to the diagnostics of beam and shell mode vibrations. The formulas were tested on some measurements taken in the Ringhals PWRs. The results confirm the validity of the model itself, and the possibilities for enhanced diagnostics were demonstrated. A more effective use of these novel possibilities requires more in-core detectors and/or better detector positioning.} -} - -@article{arzhanovLocalizationVibratingControl2000, - title = {Localization of a {{Vibrating Control Rod Pin}} in {{Pressurized Water Reactors Using}} the {{Neutron Flux}} and {{Current Noise}}}, - author = {Arzhanov, Vasiliy and Pázsit, Imre and Garis, Ninos S.}, - date = {2000-08-01}, - journaltitle = {Nuclear Technology}, - volume = {131}, - number = {2}, - pages = {239--251}, - issn = {0029-5450}, - doi = {10.13182/NT00-A3114}, - url = {https://doi.org/10.13182/NT00-A3114 https://www.tandfonline.com/doi/abs/10.13182/NT00-A3114} -} - -@online{AS5506DArchitectureAnalysis, - title = {{{AS5506D}}: {{Architecture Analysis}} \& {{Design Language}} ({{AADL}}) - {{SAE International}}}, - shorttitle = {{{AS5506D}}}, - url = {https://www.sae.org/standards/content/as5506d/}, - urldate = {2023-10-03}, - abstract = {This standard defines a language for describing both the software architecture and the execution platform architectures of performance-critical, embedded, real-time systems; the language is known as the SAE AADL. An AADL model describes a system as a hierarchy of components with their interfaces an}, - file = {/home/danesabo/Zotero/storage/A6SBHDUG/as5506d.html} -} - @incollection{asarinReachabilityAnalysisNonlinear2003, title = {Reachability {{Analysis}} of {{Nonlinear Systems Using Conservative Approximation}}}, booktitle = {Hybrid {{Systems}}: {{Computation}} and {{Control}}}, @@ -845,25 +517,7 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/JACEQ3NC/Askarpour et al. - 2019 - Formal model of human erroneous behavior for safet.pdf} } -@article{atsumiModifiedBodePlots2012, - title = {Modified {{Bode Plots}} for {{Robust Performance}} in {{SISO Systems With Structured}} and {{Unstructured Uncertainties}}}, - author = {Atsumi, Takenori and Messner, William C.}, - date = {2012-03}, - journaltitle = {IEEE Transactions on Control Systems Technology}, - volume = {20}, - number = {2}, - pages = {356--368}, - issn = {1558-0865}, - doi = {10.1109/TCST.2011.2177978}, - url = {https://ieeexplore.ieee.org/abstract/document/6119239?casa_token=83yuiE-hjFYAAAAA:mNJC01cIlFnpVQ9rlmT3ddenFytwYuhZvrofSUb5nUDlMuEhcqDo8ZNGdmZHpey3BVXdGAfgig}, - urldate = {2024-10-15}, - abstract = {We have developed a loop-shaping methodology for robust control design in single-input single-output (SISO) systems with structured and unstructured uncertainties. This design method employs visualization tools that are modifications of the classical Bode plot. Using the proposed method control engineers can easily consider the effects of the structured and unstructured uncertainties without the need for transfer-function models of the plant, the sensitivity function performance, or the uncertainty. The method simultaneously can avoid excessive conservativeness and excessively high order controllers while improving controller performance and robustness. We show utility of the proposed method by applying it to a head-positioning control system in a hard disk drive.}, - eventtitle = {{{IEEE Transactions}} on {{Control Systems Technology}}}, - keywords = {Benchmark testing,Control systems,Frequency response,Loop shaping,read,Resonant frequency,robust control,Robustness,structured uncertainty,Transfer functions,Uncertainty,unstructured uncertainty,visualized design}, - file = {/home/danesabo/Zotero/storage/V3Q2EZLG/Atsumi and Messner - 2012 - Modified Bode Plots for Robust Performance in SISO Systems With Structured and Unstructured Uncertai.pdf;/home/danesabo/Zotero/storage/2MYEEYMM/6119239.html} -} - -@article{avigadFORMALSYSTEMEUCLID2009, +@article{avigadFORMALSYSTEMEUCLIDS2009, title = {A {{FORMAL SYSTEM FOR EUCLID}}’{{S}} {{{\mkbibemph{ELEMENTS}}}}}, author = {Avigad, Jeremy and Dean, Edward and Mumma, John}, date = {2009-12}, @@ -881,12 +535,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/DBTC2JCM/Avigad et al. - 2009 - A FORMAL SYSTEM FOR EUCLID’S ELEMENTS.pdf} } -@online{AWS, - title = {{{AWS IoT Twin Maker}}}, - year = {date accessed 03/24/2022}, - url = {https://aws.amazon.com/iot-twinmaker/} -} - @inproceedings{ayo-imoruEnhancedFaultDiagnosis2021, title = {An Enhanced Fault Diagnosis in Nuclear Power Plants for a Digital Twin Framework}, booktitle = {2021 {{International Conference}} on {{Electrical}}, {{Computer}} and {{Energy Technologies}} ({{ICECET}})}, @@ -922,44 +570,13 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/DACDBKXR/Ayo-Imoru and Cilliers - 2017 - Hybrid nuclear plant simulator design requirements.pdf} } -@article{baanenHitchhikerGuideLogical, +@article{baanenHitchhikersGuideLogical, title = {The {{Hitchhiker}}'s {{Guide}} to {{Logical Verification}}}, author = {Baanen, Anne and Bentkamp, Alexander and Blanchette, Jasmin and Hölzl, Johannes and Limperg, Jannis}, langid = {english}, file = {/home/danesabo/Zotero/storage/R625RBEG/Baanen et al. - The Hitchhiker's Guide to Logical Verification.pdf} } -@inproceedings{babayNetworkAttackResilientIntrusionTolerantSCADA2018, - title = {Network-{{Attack-Resilient Intrusion-Tolerant}} \{\vphantom\}{{SCADA}}\vphantom\{\} for the {{Power Grid}}}, - booktitle = {2018 48th {{Annual IEEE}}/{{IFIP International Conference}} on {{Dependable Systems}} and {{Networks}} ({{DSN}})}, - author = {Babay, Amy and Tantillo, Thomas and Aron, Trevor and Platania, Marco and Amir, Yair}, - date = {2018-06}, - pages = {255--266}, - issn = {2158-3927}, - doi = {10.1109/DSN.2018.00036}, - abstract = {As key components of the power grid infrastructure, Supervisory Control and Data Acquisition (SCADA) systems are likely to be targeted by nation-state-level attackers willing to invest considerable resources to disrupt the power grid. We present Spire, the first intrusion-tolerant SCADA system that is resilient to both system-level compromises and sophisticated network-level attacks and compromises. We develop a novel architecture that distributes the SCADA system management across three or more active sites to ensure continuous availability in the presence of simultaneous intrusions and network attacks. A wide-area deployment of Spire, using two control centers and two data centers spanning 250 miles, delivered nearly 99.999\% of all SCADA updates initiated over a 30-hour period within 100ms. This demonstrates that Spire can meet the latency requirements of SCADA for the power grid.}, - eventtitle = {2018 48th {{Annual IEEE}}/{{IFIP International Conference}} on {{Dependable Systems}} and {{Networks}} ({{DSN}})}, - file = {/home/danesabo/Zotero/storage/ARKFSCFV/Babay et al. - 2018 - Network-Attack-Resilient Intrusion-Tolerant SCADA .pdf;/home/danesabo/Zotero/storage/R79IR6PF/8416488.html} -} - -@inproceedings{babuSecurityIssuesSCADA2017, - title = {Security Issues in {{SCADA}} Based Industrial Control Systems}, - booktitle = {2017 2nd {{International Conference}} on {{Anti-Cyber Crimes}} ({{ICACC}})}, - author = {Babu, Bijoy and Ijyas, Thafasal and {Muneer P.} and Varghese, Justin}, - date = {2017-03}, - pages = {47--51}, - publisher = {IEEE}, - location = {Abha, Saudi Arabia}, - doi = {10.1109/Anti-Cybercrime.2017.7905261}, - url = {http://ieeexplore.ieee.org/document/7905261/}, - urldate = {2022-09-30}, - abstract = {Ongoing research and developments in modern information and communication technologies have revolutionized the design of industrial control systems (ICS). There is a major domain transition from traditional electromechanical systems to network based digital systems, which has indeed created a powerful interface between state-of the-art computing technologies/paradigms and physical processes sought to be controlled. ICS play a critical role in the industrial and manufacturing sector. Major infrastructures like petrochemical industries, waste water treatment facilities, nuclear power plants, pharmaceuticals, food and beverage industries etc. cannot run properly without ICS. Real-time processing, reliability and advanced distributed intelligence are some of the core characteristics of ICS which are incorporated with the help of state-of-the-art internet communication and computing technologies. The complex embedded coupling of hardware and software components such as actuators, sensors and the physical processes are all monitored and manipulated by the communication and network protocol based controllers like supervisory control and data acquisition (SCADA) systems, programmable logic controllers (PLC), distributed control systems (DCS) etc. The integration of these technologies makes the access to ICS from the external world much easier. On the other hand, this has led to many critical cyber-security issues also. These issues are of such a nature that they may sometimes pose a serious threat to the safety of humans and the environment as well. Unless managed properly, these can have adverse implications for the national economy also, in terms of production losses. In this paper, we attempt to give a comprehensive review of the unique aspects of cyber-security issues in ICS. Specifically, we delve upon the issues of security assessment and architectural reviewing of ICS. We also give a brief survey on different threat attacks on ICS.}, - eventtitle = {2017 2nd {{International Conference}} on {{Anti-Cyber Crimes}} ({{ICACC}})}, - isbn = {978-1-5090-5814-3}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/TBS4SE9T/Babu et al. - 2017 - Security issues in SCADA based industrial control .pdf} -} - @report{BackBuildingBlocks, title = {Back to the {{Building Blocks}}: {{A Path}} toward {{Secure}} and {{Measurable Software}}}, url = {https://www.whitehouse.gov/wp-content/uploads/2024/02/Final-ONCD-Technical-Report.pdf}, @@ -987,14 +604,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/A7YADSNG/Baez and Master - 2020 - Open Petri Nets.pdf;/home/danesabo/Zotero/storage/4RYR2R52/1808.html} } -@book{bakerCrossfireCriticalInfrastructure2009, - title = {In the Crossfire: {{Critical}} Infrastructure in the Age of Cyber War}, - shorttitle = {In the Crossfire}, - author = {Baker, Stewart Abercrombie and Waterman, Shaun and Ivanov, George}, - date = {2009}, - publisher = {McAfee, Incorporated} -} - @article{bakirtzisCompositionalCyberPhysicalSystems2021, title = {Compositional {{Cyber-Physical Systems Modeling}}}, author = {Bakirtzis, Georgios and Vasilakopoulou, Christina and Fleming, Cody H.}, @@ -1021,23 +630,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/YGTE3H28/_.pdf} } -@article{baloghModellingUseAdaptive2023, - title = {Modelling and {{Use}} of {{Adaptive Control Using Petri Nets}}}, - author = {Balogh, Zoltán and Fodor, Kristián and Francisti, Jan and Drozda, Martin and Čavojský, Maroš}, - date = {2023-01-01}, - journaltitle = {Procedia Computer Science}, - shortjournal = {Procedia Computer Science}, - series = {27th {{International Conference}} on {{Knowledge Based}} and {{Intelligent Information}} and {{Engineering Sytems}} ({{KES}} 2023)}, - volume = {225}, - pages = {1438--1447}, - issn = {1877-0509}, - doi = {10.1016/j.procs.2023.10.132}, - url = {https://www.sciencedirect.com/science/article/pii/S1877050923012905}, - urldate = {2024-02-15}, - abstract = {The issue of modeling holds significant importance for the applicability of control theory, particularly at higher control levels where the verbal description of control objects becomes increasingly crucial. However, a notable disadvantage of such verbal descriptions is the inherent ambiguity and vagueness of the obtained results. This article aims to address this challenge by proposing an approach that utilizes Petri nets (PN) to model and control a specific component within an intelligent home. Additionally, the Simulink modeling tool and Petri net analysis tools are introduced as aids in the modeling process. The article focuses on creating a model that accurately represents the temperature regulation system in the home, considering the constant rise in energy consumption and costs. Furthermore, the transfer of the model to the Simulink environment using IF THEN rules is demonstrated, allowing for an evaluation of its performance. Through the comprehensive application of this approach, the aim is to optimize energy usage and reduce costs within household environments.}, - file = {/home/danesabo/Zotero/storage/H7H6FI9P/S1877050923012905.html} -} - @article{bansalIntroductionReachability, title = {Introduction to {{Reachability}}}, author = {Bansal, Somil}, @@ -1045,23 +637,7 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/EA5YJSPF/Bansal - Introduction to Reachability.pdf} } -@inproceedings{barkaouiSupervisoryControlDiscrete1997, - title = {Supervisory Control of Discrete Event Systems Based on Structure Theory of {{Petri}} Nets}, - booktitle = {Computational {{Cybernetics}} and {{Simulation}} 1997 {{IEEE International Conference}} on {{Systems}}, {{Man}}, and {{Cybernetics}}}, - author = {Barkaoui, K. and Chaoui, A. and Zouari, B.}, - date = {1997-10}, - volume = {4}, - pages = {3750-3755 vol.4}, - issn = {1062-922X}, - doi = {10.1109/ICSMC.1997.633253}, - url = {https://ieeexplore.ieee.org/abstract/document/633253}, - urldate = {2024-02-15}, - abstract = {The present work is related to the use of Petri nets structural techniques in the supervisory control of discrete event systems. A relevant property of the system behaviour under supervision is to be non-blocking, i.e. from any state reachable from initial state, it is always possible to reach a desirable (or marked) state. Recent works had shown that the synthesis of proper supervisors based on Petri net modelling of DES is an interesting approach. In this paper, we present a proper supervisor synthesis method based on a purely structural reasoning. This parametrized method is especially well-suited for a large class of discrete event systems, called G-Task, for modelling concurrent automated manufacturing systems with flexibility on routings and on synchronization patterns with shared resources. Also, it can be exploited for enforcing constraints on the reachability set of any bounded uncontrolled net.}, - eventtitle = {Computational {{Cybernetics}} and {{Simulation}} 1997 {{IEEE International Conference}} on {{Systems}}, {{Man}}, and {{Cybernetics}}}, - file = {/home/danesabo/Zotero/storage/NWBN4KDZ/Barkaoui et al. - 1997 - Supervisory control of discrete event systems base.pdf} -} - -@article{barnettRouthAlgorithmCentennial1977, +@article{barnettRouthsAlgorithmCentennial1977, title = {Routh’s {{Algorithm}}: {{A Centennial Survey}}}, shorttitle = {Routh’s {{Algorithm}}}, author = {Barnett, S. and {šiljak}, D. D.}, @@ -1131,52 +707,23 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/Q79V2USH/S1874548213000231.html} } -@misc{beamer, - title = {Beamer {{User Guide}}}, - file = {/home/danesabo/Zotero/storage/BW7CCP9X/beameruserguide.pdf} -} - -@inreference{BellLaPadulaModel2023, - title = {Bell–{{LaPadula}} Model}, - booktitle = {Wikipedia}, - date = {2023-09-09T07:32:26Z}, - url = {https://en.wikipedia.org/w/index.php?title=Bell%E2%80%93LaPadula_model&oldid=1174562903}, - urldate = {2023-10-03}, - abstract = {The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by David Elliott Bell, and Leonard J. LaPadula, subsequent to strong guidance from Roger R. Schell, to formalize the U.S. Department of Defense (DoD) multilevel security (MLS) policy. The model is a formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g., "Top Secret"), down to the least sensitive (e.g., "Unclassified" or "Public"). The Bell–LaPadula model is an example of a model where there is no clear distinction between protection and security.}, - langid = {english}, - annotation = {Page Version ID: 1174562903}, - file = {/home/danesabo/Zotero/storage/NA3GZQH4/Bell–LaPadula_model.html} -} - @article{beltaFormalMethodsControl2019, title = {Formal {{Methods}} for {{Control Synthesis}}: {{An Optimization Perspective}}}, shorttitle = {Formal {{Methods}} for {{Control Synthesis}}}, author = {Belta, Calin and Sadraddini, Sadra}, - date = {2019}, + date = {2019-05-03}, journaltitle = {Annual Review of Control, Robotics, and Autonomous Systems}, volume = {2}, - number = {1}, pages = {115--140}, + publisher = {Annual Reviews}, + issn = {2573-5144}, doi = {10.1146/annurev-control-053018-023717}, - url = {https://doi.org/10.1146/annurev-control-053018-023717}, - urldate = {2022-06-20}, - abstract = {In control theory, complicated dynamics such as systems of (nonlinear) differential equations are controlled mostly to achieve stability. This fundamental property, which can be with respect to a desired operating point or a prescribed trajectory, is often linked with optimality, which requires minimizing a certain cost along the trajectories of a stable system. In formal verification (model checking), simple systems, such as finite-state transition graphs that model computer programs or digital circuits, are checked against rich specifications given as formulas of temporal logics. The formal synthesis problem, in which the goal is to synthesize or control a finite system from a temporal logic specification, has recently received increased interest. In this article, we review some recent results on the connection between optimal control and formal synthesis. Specifically, we focus on the following problem: Given a cost and a correctness temporal logic specification for a dynamical system, generate an optimal control strategy that satisfies the specification. We first provide a short overview of automata-based methods, in which the dynamics of the system are mapped to a finite abstraction that is then controlled using an automaton corresponding to the specification. We then provide a detailed overview of a class of methods that rely on mapping the specification and the dynamics to constraints of an optimization problem. We discuss advantages and limitations of these two types of approaches and suggest directions for future research.} -} - -@book{beltaFormalMethodsDiscreteTime2017, - title = {Formal {{Methods}} for {{Discrete-Time Dynamical Systems}}}, - author = {Belta, Calin and Yordanov, Boyan and Aydin Gol, Ebru}, - date = {2017}, - series = {Studies in {{Systems}}, {{Decision}} and {{Control}}}, - volume = {89}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-319-50763-7}, - url = {http://link.springer.com/10.1007/978-3-319-50763-7}, - urldate = {2024-02-13}, - isbn = {978-3-319-50762-0 978-3-319-50763-7}, + url = {https://www.annualreviews.org/content/journals/10.1146/annurev-control-053018-023717}, + urldate = {2025-03-31}, + abstract = {In control theory, complicated dynamics such as systems of (nonlinear) differential equations are controlled mostly to achieve stability. This fundamental property, which can be with respect to a desired operating point or a prescribed trajectory, is often linked with optimality, which requires minimizing a certain cost along the trajectories of a stable system. In formal verification (model checking), simple systems, such as finite-state transition graphs that model computer programs or digital circuits, are checked against rich specifications given as formulas of temporal logics. The formal synthesis problem, in which the goal is to synthesize or control a finite system from a temporal logic specification, has recently received increased interest. In this article, we review some recent results on the connection between optimal control and formal synthesis. Specifically, we focus on the following problem: Given a cost and a correctness temporal logic specification for a dynamical system, generate an optimal control strategy that satisfies the specification. We first provide a short overview of automata-based methods, in which the dynamics of the system are mapped to a finite abstraction that is then controlled using an automaton corresponding to the specification. We then provide a detailed overview of a class of methods that rely on mapping the specification and the dynamics to constraints of an optimization problem. We discuss advantages and limitations of these two types of approaches and suggest directions for future research.}, + issue = {Volume 2, 2019}, langid = {english}, - file = {/home/danesabo/Zotero/storage/6I6QFSPQ/Belta et al. - 2017 - Formal Methods for Discrete-Time Dynamical Systems.pdf} + file = {/home/danesabo/Zotero/storage/9GDXVFRV/Belta and Sadraddini - 2019 - Formal Methods for Control Synthesis An Optimization Perspective.pdf} } @book{beltaFormalMethodsDiscretetime2017a, @@ -1311,29 +858,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/CUT9LFQ5/Besterfield-Sacre et al. - 2000 - Defining the outcomes a framework for EC-2000.pdf;/home/danesabo/Zotero/storage/834CICMU/848060.html} } -@article{bhandalApplicationDigitalTwin2022, - title = {The Application of Digital Twin Technology in Operations and Supply Chain Management: A Bibliometric Review}, - shorttitle = {The Application of Digital Twin Technology in Operations and Supply Chain Management}, - author = {Bhandal, Rajinder and Mcriton, Royston and Kavanagh, Richard Edward and Brown, Anthony}, - date = {2022-02-17}, - journaltitle = {Supply Chain Management-an International Journal}, - shortjournal = {Supply Chain Manag.}, - volume = {27}, - number = {2}, - pages = {182--206}, - publisher = {Emerald Group Publishing Ltd}, - location = {Bingley}, - issn = {1359-8546}, - doi = {10.1108/SCM-01-2021-0053}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {Purpose The application of digital twins to optimise operations and supply chain management functions is a bourgeoning practice. Scholars have attempted to keep pace with this development initiating a fast-evolving research agenda. The purpose of this paper is to take stock of the emerging research stream identifying trends and capture the value potential of digital twins to the field of operations and supply chain management. Design/methodology/approach In this work we employ a bibliometric literature review supported by bibliographic coupling and keyword co-occurrence network analysis to examine current trends in the research field regarding the value-added potential of digital twin in operations and supply chain management. Findings The main findings of this work are the identification of four value clusters and one enabler cluster. Value clusters are comprised of articles that describe how the application of digital twin can enhance supply chain activities at the level of business processes as well as the level of supply chain capabilities. Value clusters of production flow management and product development operate at the business processes level and are maturing communities. The supply chain resilience and risk management value cluster operates at the capability level, it is just emerging, and is positioned at the periphery of the main network. Originality/value This is the first study that attempts to conceptualise digital twin as a dynamic capability and employs bibliometric and network analysis on the research stream of digital twin in operations and supply chain management to capture evolutionary trends, literature communities and value-creation dynamics in a digital-twin-enabled supply chain.}, - langid = {english}, - keywords = {cyber-physical system}, - annotation = {WOS:000753838000001}, - file = {/home/danesabo/Zotero/storage/LLXN77UM/Bhandal et al. - 2022 - The application of digital twin technology in oper.pdf} -} - @inproceedings{bhurkeMethodsFormalAnalysis2021, title = {Methods of {{Formal Analysis}} for {{ICS Protocols}} and {{HART}} - {{IP CPN}} Modelling}, booktitle = {2021 {{Asian Conference}} on {{Innovation}} in {{Technology}} ({{ASIANCON}})}, @@ -1352,14 +876,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/YUG8WQ85/Bhurke and Kazi - 2021 - Methods of Formal Analysis for ICS Protocols and H.pdf} } -@article{biblatex-cheat, - title = {Biblatex {{Cheat Sheet}}}, - author = {Rees, Clea F}, - pages = {2}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/R32TBWM3/Rees - Biblatex Cheat Sheet.pdf} -} - @incollection{biereBoundedModelChecking2003, title = {Bounded {{Model Checking}}}, booktitle = {Advances in {{Computers}}}, @@ -1410,24 +926,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/DIDSY7TD/Biggs - 1996 - Enhancing teaching through constructive alignment.pdf} } -@inproceedings{biggsJuryMonolithicOS2018, - title = {The {{Jury Is In}}: {{Monolithic OS Design Is Flawed}}: {{Microkernel-based Designs Improve Security}}}, - shorttitle = {The {{Jury Is In}}}, - booktitle = {Proceedings of the 9th {{Asia-Pacific Workshop}} on {{Systems}}}, - author = {Biggs, Simon and Lee, Damon and Heiser, Gernot}, - date = {2018-08-27}, - pages = {1--7}, - publisher = {ACM}, - location = {Jeju Island Republic of Korea}, - doi = {10.1145/3265723.3265733}, - url = {https://dl.acm.org/doi/10.1145/3265723.3265733}, - urldate = {2025-01-22}, - eventtitle = {{{APSys}} '18: 9th {{Asia-Pacific Workshop}} on {{Systems}}}, - isbn = {978-1-4503-6006-7}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/KIMYMDUA/Biggs et al. - 2018 - The Jury Is In Monolithic OS Design Is Flawed Microkernel-based Designs Improve Security.pdf} -} - @article{blanchiniModelFreePlantTuning2017, title = {Model-{{Free Plant Tuning}}}, author = {Blanchini, Franco and Fenu, Gianfranco and Giordano, Giulia and Pellegrino, Felice Andrea}, @@ -1553,31 +1051,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/NLHQNXSN/Boldo et al. - 2013 - Wave Equation Numerical Resolution A Comprehensiv.pdf} } -@article{booktabs, - title = {Booktabs: Quality Tables in {{LATEX}}}, - author = {Fear, Simon}, - pages = {17}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/ZN2GFZDI/Fear - Publication quality tables in LATEX.pdf} -} - -@article{borchaniSurveyMultioutputRegression2015, - title = {A Survey on Multi-Output Regression}, - author = {Borchani, Hanen and Varando, Gherardo and Bielza, Concha and Larrañaga, Pedro}, - date = {2015}, - journaltitle = {WIREs Data Mining and Knowledge Discovery}, - volume = {5}, - number = {5}, - pages = {216--233}, - issn = {1942-4795}, - doi = {10.1002/widm.1157}, - url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/widm.1157}, - urldate = {2022-04-20}, - abstract = {In recent years, a plethora of approaches have been proposed to deal with the increasingly challenging task of multi-output regression. This study provides a survey on state-of-the-art multi-output regression methods, that are categorized as problem transformation and algorithm adaptation methods. In addition, we present the mostly used performance evaluation measures, publicly available data sets for multi-output regression real-world problems, as well as open-source software frameworks. WIREs Data Mining Knowl Discov 2015, 5:216–233. doi: 10.1002/widm.1157 This article is categorized under: Technologies {$>$} Machine Learning}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/548PCU92/Borchani et al. - 2015 - A survey on multi-output regression.pdf;/home/danesabo/Zotero/storage/THZZJIXI/widm.html} -} - @article{bourbouhCoCoSimCodeGeneration, title = {{{CoCoSim}}, a Code Generation Framework for Control/Command Applications {{An}} Overview of {{CoCoSim}} for Multi-Periodic Discrete {{Simulink}} Models}, author = {Bourbouh, Hamza and Garoche, Pierre-Loïc and Loquen, Thomas and Noulard, Éric and Pagetti, Claire}, @@ -1597,22 +1070,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/29RD9H85/Braje et al. - Adversary Safety by Construction in a Language of .pdf} } -@article{brandmanPhysicalHashPreventing2020, - title = {A Physical Hash for Preventing and Detecting Cyber-Physical Attacks in Additive Manufacturing Systems}, - author = {Brandman, Josh and Sturm, Logan and White, Jules and Williams, Chris}, - date = {2020-07-01}, - journaltitle = {Journal of Manufacturing Systems}, - shortjournal = {Journal of Manufacturing Systems}, - volume = {56}, - pages = {202--212}, - issn = {0278-6125}, - doi = {10.1016/j.jmsy.2020.05.014}, - url = {https://www.sciencedirect.com/science/article/pii/S0278612520300789}, - urldate = {2023-09-27}, - abstract = {Cyber-physical security is a major concern in the modern environment of digital manufacturing, wherein a cyber-attack has the potential to result in the production of defective parts, theft of IP, or damage to infrastructure or the operator have become a real threat that have the potential to create bad parts. Current cyber only solutions are insufficient due to the nature of manufacturing environments where it may not be feasible or even possible to upgrade physical equipment to the most current cyber security standards, necessitating an approach that addresses both the cyber and the physical components. This paper proposes a new method for detecting malicious cyber-physical attacks on additive manufacturing (AM) systems. The method makes use of a physical hash, which links digital data to the manufactured part via a disconnected side-channel measurement system. The disconnection ensures that if the network and/or AM system becomes compromised, the manufacturer can still rely on the measurement system for attack detection. The physical hash ensures protection of the intellectual property (IP) associated with both process and toolpath parameters while also enabling in situ quality assurance. In this paper, the physical hash takes the form of a QR code that contains a hash string of the nominal process parameters and toolpath. It is manufactured alongside the original geometry for the measurement system to scan and compare to the readings from its sensor suite. By taking measurements in situ, the measurement system can detect in real-time if the part being manufactured matches the designer’s specification. In this paper, the overall concept and underlying algorithm of the physical hash is presented. A proof-of-concept validation is realized on a material extrusion AM machine, to demonstrate the ability of a physical hash and in situ monitoring to detect the existence (and absence) of malicious attacks on the STL file, the printing process parameters, and the printing toolpath.}, - file = {/home/danesabo/Zotero/storage/NV4232RN/Brandman et al. - 2020 - A physical hash for preventing and detecting cyber.pdf} -} - @article{brandtnerEntropicRiskMeasures2018, title = {Entropic Risk Measures and Their Comparative Statics in Portfolio Selection: {{Coherence}} vs. Convexity}, shorttitle = {Entropic Risk Measures and Their Comparative Statics in Portfolio Selection}, @@ -1700,23 +1157,6 @@ Opportunities and Challenges toward Responsible AI.pdf} } @inproceedings{branickyStabilityHybridSystems1997, - title = {Stability of Hybrid Systems: State of the Art}, - shorttitle = {Stability of Hybrid Systems}, - booktitle = {Proceedings of the 36th {{IEEE Conference}} on {{Decision}} and {{Control}}}, - author = {Branicky, M.S.}, - date = {1997-12}, - volume = {1}, - pages = {120-125 vol.1}, - issn = {0191-2216}, - doi = {10.1109/CDC.1997.650600}, - url = {https://ieeexplore.ieee.org/document/650600}, - urldate = {2024-01-16}, - abstract = {This paper collects work on the stability analysis of hybrid systems. The hybrid systems considered are those that combine continuous dynamics (represented by differential or difference equations) with finite dynamics, usually thought of as being a finite automaton. We review multiple Lyapunov functions as a tool for analyzing Lyapunov stability of general hybrid systems. Background results, the author's introductory work, and subsequent extensions are covered. Specializing to hybrid systems with linear dynamics in each constituent mode and linear jump operators, we review some key theorems of Barabanov-Staroshilov (1988), and give corollaries encompassing several recently-derived "stability by first approximation" theorems in the literature. We also comment on the use of computational tests for stability of hybrid systems, and the general complexity. The result is a tutorial on the state of the art in theory and computation of hybrid systems stability.}, - eventtitle = {Proceedings of the 36th {{IEEE Conference}} on {{Decision}} and {{Control}}}, - file = {/home/danesabo/Zotero/storage/UUWDHV3I/Branicky - 1997 - Stability of hybrid systems state of the art.pdf;/home/danesabo/Zotero/storage/HWR8AGZP/650600.html} -} - -@inproceedings{branickyStabilityHybridSystems1997a, title = {Stability of Hybrid Systems: State of the Art}, shorttitle = {Stability of Hybrid Systems}, booktitle = {Proceedings of the 36th {{IEEE Conference}} on {{Decision}} and {{Control}}}, @@ -1733,6 +1173,23 @@ Opportunities and Challenges toward Responsible AI.pdf} isbn = {978-0-7803-4187-6} } +@inproceedings{branickyStabilityHybridSystems1997a, + title = {Stability of Hybrid Systems: State of the Art}, + shorttitle = {Stability of Hybrid Systems}, + booktitle = {Proceedings of the 36th {{IEEE Conference}} on {{Decision}} and {{Control}}}, + author = {Branicky, M.S.}, + date = {1997-12}, + volume = {1}, + pages = {120-125 vol.1}, + issn = {0191-2216}, + doi = {10.1109/CDC.1997.650600}, + url = {https://ieeexplore.ieee.org/document/650600}, + urldate = {2024-01-16}, + abstract = {This paper collects work on the stability analysis of hybrid systems. The hybrid systems considered are those that combine continuous dynamics (represented by differential or difference equations) with finite dynamics, usually thought of as being a finite automaton. We review multiple Lyapunov functions as a tool for analyzing Lyapunov stability of general hybrid systems. Background results, the author's introductory work, and subsequent extensions are covered. Specializing to hybrid systems with linear dynamics in each constituent mode and linear jump operators, we review some key theorems of Barabanov-Staroshilov (1988), and give corollaries encompassing several recently-derived "stability by first approximation" theorems in the literature. We also comment on the use of computational tests for stability of hybrid systems, and the general complexity. The result is a tutorial on the state of the art in theory and computation of hybrid systems stability.}, + eventtitle = {Proceedings of the 36th {{IEEE Conference}} on {{Decision}} and {{Control}}}, + file = {/home/danesabo/Zotero/storage/UUWDHV3I/Branicky - 1997 - Stability of hybrid systems state of the art.pdf;/home/danesabo/Zotero/storage/HWR8AGZP/650600.html} +} + @inproceedings{branickyStabilitySwitchedHybrid1994, title = {Stability of Switched and Hybrid Systems}, booktitle = {Proceedings of 1994 33rd {{IEEE Conference}} on {{Decision}} and {{Control}}}, @@ -1809,42 +1266,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/BH9FC2S4/Viz06_LS_Course_Notes.pdf} } -@unpublished{brockApplicationReinforcementLearning2021, - title = {An Application of Reinforcement Learning to Residential Energy Storage under Real-Time Pricing}, - author = {Brock, Eli and Bruckstein, Lauren and Connor, Patrick and Nguyen, Sabrina and Kerestes, Robert and Abdelhakim, Mai}, - date = {2021-11-22}, - eprint = {2111.11367}, - eprinttype = {arXiv}, - eprintclass = {cs, eess}, - url = {http://arxiv.org/abs/2111.11367}, - urldate = {2022-03-25}, - abstract = {With the proliferation of advanced metering infrastructure (AMI), more real-time data is available to electric utilities and consumers. Such high volumes of data facilitate innovative electricity rate structures beyond flat-rate and time-of-use (TOU) tariffs. One such innovation is real-time pricing (RTP), in which the wholesale market-clearing price is passed directly to the consumer on an hour-by-hour basis. While rare, RTP exists in parts of the United States and has been observed to reduce electric bills. Although these reductions are largely incidental, RTP may represent an opportunity for large-scale peak shaving, demand response, and economic efficiency when paired with intelligent control systems. Algorithms controlling flexible loads and energy storage have been deployed for demand response elsewhere in the literature, but few studies have investigated these algorithms in an RTP environment. If properly optimized, the dynamic between RTP and intelligent control has the potential to counteract the unwelcome spikes and dips of demand driven by growing penetration of distributed renewable generation and electric vehicles (EV). This paper presents a simple reinforcement learning (RL) application for optimal battery control subject to an RTP signal.}, - file = {/home/danesabo/Zotero/storage/HMQGDSL6/Brock et al. - 2021 - An application of reinforcement learning to reside.pdf;/home/danesabo/Zotero/storage/GGP87JEY/2111.html} -} - -@article{brosinskyEmbeddedDigitalTwins2020, - title = {Embedded {{Digital Twins}} in Future Energy Management Systems: Paving the Way for Automated Grid Control}, - shorttitle = {Embedded {{Digital Twins}} in Future Energy Management Systems}, - author = {Brosinsky, Christoph and Krebs, Rainer and Westermann, Dirk}, - date = {2020-09}, - journaltitle = {At-Automatisierungstechnik}, - shortjournal = {AT-Autom.}, - volume = {68}, - number = {9}, - pages = {750--764}, - publisher = {Walter De Gruyter Gmbh}, - location = {Berlin}, - issn = {0178-2312}, - doi = {10.1515/auto-2020-0086}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1?markedListId=List%202}, - urldate = {2022-03-08}, - abstract = {Emerging real-time applications in information technology, and operational technology enable new innovative concepts to design and operate cyber-physical systems. A promising approach, which has been discovered recently as key technology by several industries is the Digital Twin (DT) concept. A DT connects the virtual representation of a physical object, system or process by available information and sensor data streams, which allows to gather new information about the system it mirrors by applying analytic functions. Thereby the DT technology can help to fill sensor data gaps, e. g., to support anomaly detection, and to predict future operating conditions and system states. This paper discusses a dynamic power system DT as a cornerstone instance of a new generation of EMS, and a prospective new EMS architecture, to support the increasingly complex operation of electric power systems. Unlike in traditional offline power system models, the parameters are updated dynamically using measurement information from the supervisory control and data acquisition (SCADA) and a wide area monitoring system (WAMS) to tune the model. This allows to derive a highly accurate virtual representation of the mirrored physical objects. A simulation engine, the Digital Dynamic Mirror (DDM) is introduced, in order to be able to reproduce the state of a reference network in real-time. The validation of the approach is carried out by a case study. In a closed loop within EMS applications, the DDM can help to assess contingency mitigation strategies, thus it can support the decision-making process under variable system conditions. The next generation of control centre Energy Management System (EMS) can benefit from this development by augmentation of the dynamic observability, and the rise of operator situation awareness.}, - langid = {english}, - keywords = {key}, - annotation = {WOS:000565120800005}, - file = {/home/danesabo/Zotero/storage/W32NJ8MC/Brosinsky et al. - 2020 - Embedded Digital Twins in future energy management.pdf} -} - @article{brosinskyFortunateDecisionThat2024, title = {A {{Fortunate Decision That You Can Trust}}: {{Digital Twins}} as {{Enablers}} for the {{Next Generation}} of {{Energy Management Systems}} and {{Sophisticated Operator Assistance Systems}}}, shorttitle = {A {{Fortunate Decision That You Can Trust}}}, @@ -1863,19 +1284,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/6VNDBUGU/Brosinsky et al. - 2024 - A Fortunate Decision That You Can Trust Digital T.pdf;/home/danesabo/Zotero/storage/GB3C5QN3/10398577.html} } -@video{bruntonControlBootcampIntroduction, - entrysubtype = {video}, - title = {Control {{Bootcamp}}: {{Introduction}} to {{Robust Control}}}, - shorttitle = {Control {{Bootcamp}}}, - editor = {Brunton, Steven L.}, - editortype = {director}, - url = {https://www.youtube.com/watch?v=Y6MRgg_TGy0}, - urldate = {2024-10-09}, - abstract = {This video motivates robust control with the famous 1978 paper by John Doyle, titled "Guaranteed Margins for LQG Regulators"... Abstract: There are none. C...}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/8LUC2EFA/playlist.html} -} - @online{BuildingMathematicalLibrary2020, title = {Building the {{Mathematical Library}} of the {{Future}}}, date = {2020-10-01T16:05+00:00}, @@ -1884,24 +1292,7 @@ Opportunities and Challenges toward Responsible AI.pdf} abstract = {A small community of mathematicians is using a software program called Lean to build a new digital repository. They hope it represents the future of their field.} } -@article{bukkapatnamForecastingEvolutionNonlinear2010, - title = {Forecasting the Evolution of Nonlinear and Nonstationary Systems Using Recurrence-Based Local {{Gaussian}} Process Models}, - author = {Bukkapatnam, Satish T. S. and Cheng, Changqing}, - date = {2010-11-15}, - journaltitle = {Physical Review E}, - shortjournal = {Phys. Rev. E}, - volume = {82}, - number = {5}, - pages = {056206}, - publisher = {American Physical Society}, - doi = {10.1103/PhysRevE.82.056206}, - url = {https://link.aps.org/doi/10.1103/PhysRevE.82.056206}, - urldate = {2022-04-21}, - abstract = {An approach based on combining nonparametric Gaussian process (GP) modeling with certain local topological considerations is presented for prediction (one-step look ahead) of complex physical systems that exhibit nonlinear and nonstationary dynamics. The key idea here is to partition system trajectories into multiple near-stationary segments by aligning the boundaries of the partitions with those of the piecewise affine projections of the underlying dynamic system, and deriving nonparametric prediction models within each segment. Such an alignment is achieved through the consideration of recurrence and other local topological properties of the underlying system. This approach was applied for state and performance forecasting in Lorenz system under different levels of induced noise and nonstationarity, synthetic heart-rate signals, and a real-world time-series from an industrial operation known to exhibit highly nonlinear and nonstationary dynamics. The results show that local Gaussian process can significantly outperform not just classical system identification, neural network and nonparametric models, but also the sequential Bayesian Monte Carlo methods in terms of prediction accuracy and computational speed.}, - file = {/home/danesabo/Zotero/storage/SDWGB9IC/Bukkapatnam and Cheng - 2010 - Forecasting the evolution of nonlinear and nonstat.pdf;/home/danesabo/Zotero/storage/DDWB34PC/PhysRevE.82.html} -} - -@article{bullockHardwareloopSimulation2004, +@article{bullockHardwareintheloopSimulation2004, title = {Hardware-in-the-Loop Simulation}, author = {Bullock, Darcy and Johnson, Brian and Wells, Richard B. and Kyte, Michael and Li, Zhen}, date = {2004-02-01}, @@ -1940,15 +1331,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/5AXF69RI/Buşoniu et al. - 2010 - Approximate Dynamic Programming and Reinforcement .pdf} } -@article{calc, - title = {The Calc Package {{Infix}} Notation Arithmetic in {{LaTeX}}}, - author = {Thorup, Kresten Krab and Jensen, Frank and Rowley, Chris}, - pages = {17}, - abstract = {The calc package reimplements the LATEX commands \textbackslash setcounter, \textbackslash addtocounter, \textbackslash setlength, and \textbackslash addtolength. Instead of a simple value, these commands now accept an infix notation expression.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/K7SRMG7X/Thorup et al. - The calc package Infix notation arithmetic in LaTe.pdf} -} - @inreference{CalculusConstructions2023, title = {Calculus of Constructions}, booktitle = {Wikipedia}, @@ -1977,37 +1359,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/KZDEPX74/Calero et al. - 2011 - Autonomic and Trusted Computing.pdf} } -@article{caoSurveyEdgeEdgeCloud2021, - title = {A {{Survey}} on {{Edge}} and {{Edge-Cloud Computing Assisted Cyber-Physical Systems}}}, - author = {Cao, Kun and Hu, Shiyan and Shi, Yang and Colombo, Armando and Karnouskos, Stamatis and Li, Xin}, - date = {2021-11}, - journaltitle = {IEEE Transactions on Industrial Informatics}, - shortjournal = {IEEE Trans. Ind. Inf.}, - volume = {17}, - number = {11}, - pages = {7806--7819}, - issn = {1551-3203, 1941-0050}, - doi = {10.1109/TII.2021.3073066}, - url = {https://ieeexplore.ieee.org/document/9403939/}, - urldate = {2022-09-30}, - abstract = {In recent years, the investigations on cyberphysical systems (CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea of coupling edge computing, or edge-cloud computing into the design of CPS. However, this coupling process raises a diversity of challenges to the quality-of-services (QoS) of CPS applications. In this article, we present a survey on edge computing or edge-cloud computing assisted CPS designs from the QoS optimization perspective. We first discuss critical challenges in service latency, energy consumption, security, privacy, and reliability during the integration of CPS with edge computing or edge-cloud computing. Afterwards, we give an overview on the state-of-the-art works tackling different challenges for QoS optimization, and present a systematic classification during outlining literature for highlighting their similarities and differences. We finally summarize the experiences learned from surveyed works and envision future research directions on edge computing or edge-cloud computing assisted CPS optimization.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/8M6PJ9VH/Cao et al. - 2021 - A Survey on Edge and Edge-Cloud Computing Assisted.pdf} -} - -@article{caponnettoUniversalMultiTaskKernels2008, - title = {Universal {{Multi-Task Kernels}}}, - author = {Caponnetto, Andrea and Micchelli, Charles A. and Pontil, Massimiliano and Ying, Yiming}, - date = {2008-06-01}, - journaltitle = {The Journal of Machine Learning Research}, - shortjournal = {J. Mach. Learn. Res.}, - volume = {9}, - pages = {1615--1646}, - issn = {1532-4435}, - abstract = {In this paper we are concerned with reproducing kernel Hilbert spaces HK of functions from an input space into a Hilbert space Y, an environment appropriate for multi-task learning. The reproducing kernel K associated to HK has its values as operators on Y. Our primary goal here is to derive conditions which ensure that the kernel K is universal. This means that on every compact subset of the input space, every continuous function with values in Y can be uniformly approximated by sections of the kernel. We provide various characterizations of universal kernels and highlight them with several concrete examples of some practical importance. Our analysis uses basic principles of functional analysis and especially the useful notion of vector measures which we describe in sufficient detail to clarify our results.}, - file = {/home/danesabo/Zotero/storage/KRBHNSNG/Caponnetto et al. - 2008 - Universal Multi-Task Kernels.pdf} -} - @inproceedings{cardenasChallengesSecuringCyber2009, title = {Challenges for Securing Cyber Physical Systems}, booktitle = {Workshop on Future Directions in Cyber-Physical Systems Security}, @@ -2068,24 +1419,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/BR5ZCJH3/Carreira et al. - 2020 - Foundations of Multi-Paradigm Modelling for Cyber-.pdf} } -@inproceedings{carterCyberSecurityAssessment2017, - title = {Cyber {{Security Assessment}} of {{Distributed Energy Resources}}}, - booktitle = {2017 {{IEEE}} 44th {{Photovoltaic Specialist Conference}} ({{PVSC}})}, - author = {Carter, Cedric and Onunkwo, Ifeoma and Cordeiro, Patricia and Johnson, Jay}, - date = {2017-06}, - pages = {2135--2140}, - publisher = {IEEE}, - location = {Washington, DC}, - doi = {10.1109/PVSC.2017.8366503}, - url = {https://ieeexplore.ieee.org/document/8366503/}, - urldate = {2023-10-05}, - abstract = {New distributed energy resource (DER) interconnection standards require communications and interoperability to provide grid operators greater flexibility for delivering voltage and frequency support. These communication channels are designed to allow utilities, aggregators, and other grid operators the ability to enable and configure various grid-support functions. However, these capabilities expand the power system cyber security attack surface and pose a significant risk to the resilience of the electric grid if controlled in aggregate. To advise the solar industry, grid operators, and government of the current risks and provide evidence-based recommendations to the community, Sandia performed cyber security assessments of a communications-enabled PV inverter and remote grid-monitoring gateway. The team found several well-designed security features but also some weaknesses. Based on these findings, recommendations are provided to improve the security features of DER devices.}, - eventtitle = {2017 {{IEEE}} 44th {{Photovoltaic Specialists Conference}} ({{PVSC}})}, - isbn = {978-1-5090-5605-7}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/3TNQR3Y8/Carter et al. - 2017 - Cyber Security Assessment of Distributed Energy Re.pdf;/home/danesabo/Zotero/storage/CHYNQ6YG/Carter et al. - 2017 - Cyber Security Assessment of Distributed Energy Re.pdf;/home/danesabo/Zotero/storage/XNPBSGA8/8366503.html} -} - @inproceedings{carterEC2000Criterion2001, title = {{{EC}} 2000 {{Criterion}} 2: {{A Procedure For Creating}}, {{Assessing}}, {{And Documenting Program Educational Objectives}}}, shorttitle = {Ec 2000 {{Criterion}} 2}, @@ -2123,56 +1456,7 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/JLEGLRH9/Category_theory.html} } -@report{CESER-Blueprint, - title = {{{CESER}} Blueprint}, - author = {{Office of Cybersecurity, Energy Security, and Emergency Response}}, - date = {2021-01}, - institution = {U.S. Dept. of Energy}, - file = {/home/danesabo/Zotero/storage/GJPWR646/Office of Cybersecurity, Energy Security, and Emergency Response - 2021 - CESER blueprint.pdf} -} - -@misc{CfE, - title = {Center for {{Energy}}}, - year = {Date accessed 11/2021}, - url = {https://cfe.pitt.edu} -} - -@online{CH2_Sampled_Data_Analysis_Unfilledpptx2254ME, - title = {{{CH2}}\_{{Sampled}}\_{{Data}}\_{{Analysis}}\_{{Unfilled}}.Pptx: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19365215?module_item_id=5478186}, - urldate = {2025-01-09}, - file = {/home/danesabo/Zotero/storage/CDGP72KV/CH2_Sampled_Data_Analysis_Unfilled(1).pptx;/home/danesabo/Zotero/storage/GJGSRZXQ/CH2_Sampled_Data_Analysis_Unfilled.pdf} -} - -@article{CH3ZTransformDifference, - title = {{{CH3 The}} Z-{{Transform}} and the {{Difference Equation}}}, - journaltitle = {DIGITAL CONTROL SYSTEMS}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/YVUXYFW8/Chapter 3 The z-Transform and the Difference Equation.pdf} -} - -@online{CH4System_Representation_S2020pdf2254, - title = {{{CH4 System}}\_{{Representation}}\_{{S2020}}.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19520682?module_item_id=5521302}, - urldate = {2025-01-23}, - file = {/home/danesabo/Zotero/storage/V4AZ95G2/Chap4_System_Representation_S2020.pdf 2254 ME 2046 SEC1000 DIGITAL CONTROL SYSTEMS.pdf} -} - -@online{CH6_S2025_Filledpdf2254ME, - title = {{{CH6}}\_{{S2025}}\_{{Filled}}.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19865796?module_item_id=5570801}, - urldate = {2025-02-27}, - file = {/home/danesabo/Zotero/storage/JIE6J3MB/CH6_S2025_Filled.pdf 2254 ME 2046 SEC1000 DIGITAL CONTROL SYSTEMS.pdf;/home/danesabo/Zotero/storage/5ZDFVWKB/19865796.html} -} - -@online{CH8_S2025_PPT_Filledpdf2254ME, - title = {{{CH8}}\_{{S2025}}\_{{PPT}}\_{{Filled}}.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19953148?module_item_id=5580621}, - urldate = {2025-02-27}, - file = {/home/danesabo/Zotero/storage/94FDB47U/CH8_S2025_PPT_Filled.pdf 2254 ME 2046 SEC1000 DIGITAL CONTROL SYSTEMS.pdf} -} - -@incollection{championKindModelChecker2016, +@incollection{championKind2Model2016, title = {The {{Kind}} 2 {{Model Checker}}}, booktitle = {Computer {{Aided Verification}}}, author = {Champion, Adrien and Mebsout, Alain and Sticksel, Christoph and Tinelli, Cesare}, @@ -2207,19 +1491,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/B654ZQJB/Reasoning about Bayesian Network Classifiers} } -@online{Chap4_System_Representation_S2020pdf2254MEa, - title = {Chap4\_{{System}}\_{{Representation}}\_{{S2020}}.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19520682?module_item_id=5521302}, - urldate = {2025-01-23} -} - -@online{Chap5_System_Analysis_S2020pdf2254ME, - title = {Chap5\_{{System}}\_{{Analysis}}\_{{S2020}}.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19780672?module_item_id=5559115}, - urldate = {2025-02-13}, - file = {/home/danesabo/Zotero/storage/776LHVYY/Chap5_System_Analysis_S2020.pdf 2254 ME 2046 SEC1000 DIGITAL CONTROL SYSTEMS.pdf;/home/danesabo/Zotero/storage/JIL2TCMN/19780672.html} -} - @article{chappellatElementaryProofsClassical1990, title = {Elementary Proofs of Some Classical Stability Criteria}, author = {Chappellat, H. and Mansour, M. and Bhattacharyya, S.P.}, @@ -2253,37 +1524,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/8DZV9YCB/Charalambous et al. - 2023 - A New Era in Software Security Towards Self-Heali.pdf;/home/danesabo/Zotero/storage/SJ2HSCEP/2305.html} } -@inproceedings{chattopadhyaySecureCyberPhysicalSystems2017, - title = {Secure {{Cyber-Physical Systems}}: {{Current}} Trends, Tools and Open Research Problems}, - shorttitle = {Secure {{Cyber-Physical Systems}}}, - booktitle = {Design, {{Automation}} \& {{Test}} in {{Europe Conference}} \& {{Exhibition}} ({{DATE}}), 2017}, - author = {Chattopadhyay, Anupam and Prakash, Alok and Shafique, Muhammad}, - date = {2017-03}, - pages = {1104--1109}, - issn = {1558-1101}, - doi = {10.23919/DATE.2017.7927154}, - url = {https://ieeexplore.ieee.org/abstract/document/7927154?casa_token=QNqi0saUdwEAAAAA:KPTsWMHmdyoghPYxRzcnyQSieO7zVDZ4cEZZ2VQRaJv_bhT2cbReTvOea5GdjxYVJIMR7A56-A}, - urldate = {2023-09-27}, - abstract = {To understand and identify the attack surfaces of a Cyber-Physical System (CPS) is an essential step towards ensuring its security. The growing complexity of the cybernetics and the interaction of independent domains such as avionics, robotics and automotive is a major hindrance against a holistic view CPS. Furthermore, proliferation of communication networks have extended the reach of CPS from a user-centric single platform to a widely distributed network, often connecting to critical infrastructure, e.g., through smart energy initiative. In this manuscript, we reflect on this perspective and provide a review of current security trends and tools for secure CPS. We emphasize on both the design and execution flows and particularly highlight the necessity of efficient attack surface detection. We provide a detailed characterization of attacks reported on different cyber-physical systems, grouped according to their application domains, attack complexity, attack source and impact. Finally, we review the current tools, point out their inadequacies and present a roadmap of future research.}, - eventtitle = {Design, {{Automation}} \& {{Test}} in {{Europe Conference}} \& {{Exhibition}} ({{DATE}}), 2017}, - file = {/home/danesabo/Zotero/storage/V8VNW324/Chattopadhyay et al. - 2017 - Secure Cyber-Physical Systems Current trends, too.pdf} -} - -@inproceedings{chattopadhyaySecurityAutonomousVehicle2017, - title = {Security of Autonomous Vehicle as a Cyber-Physical System}, - booktitle = {2017 7th {{International Symposium}} on {{Embedded Computing}} and {{System Design}} ({{ISED}})}, - author = {Chattopadhyay, Anupam and Lam, Kwok-Yan}, - date = {2017-12}, - pages = {1--6}, - issn = {2473-9413}, - doi = {10.1109/ISED.2017.8303906}, - url = {https://ieeexplore.ieee.org/abstract/document/8303906?casa_token=iDWWXJEJpdQAAAAA:VIFwVpPaz4yT1ijG0OXWzSfrdOt5TpKejLYqj6GVW3EyO92bkjH82vri-s6QNCrHa_LL_ct8wg}, - urldate = {2023-09-27}, - abstract = {Security of (semi)-autonomous vehicles is a growing concern due to, first, the growing reliance of car functionalities on diverse (semi)-autonomous systems; second, the increased exposure of the such functionalities to potential attackers; third, the interaction of a single vehicle with myriads of other smart systems in an modern urban traffic infrastructure. In this paper, we review the security objectives of Autonomous Vehicle (AV) and argue that AV is a kind of Cyber-Physical System (CPS) for control and operations of the vehicle. We attempt to identify the core issues of securing an AV by modeling an AV as a special kind of CPS, which tend to be implemented by a complex interconnected embedded system hardware. Subsequently, the technical challenges of AV security are identified.}, - eventtitle = {2017 7th {{International Symposium}} on {{Embedded Computing}} and {{System Design}} ({{ISED}})}, - file = {/home/danesabo/Zotero/storage/XN6BIM6G/Chattopadhyay and Lam - 2017 - Security of autonomous vehicle as a cyber-physical.pdf} -} - @inproceedings{chekoleEnforcingMemorySafety2018, title = {Enforcing {{Memory Safety}} in {{Cyber-Physical Systems}}}, booktitle = {Computer {{Security}}}, @@ -2317,23 +1557,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/LQHDDLSW/Cheminod et al. - 2011 - Formal Vulnerability Analysis of a Security System.pdf} } -@article{chenDynamicAttackDetection2017, - title = {Dynamic {{Attack Detection}} in {{Cyber-Physical Systems With Side Initial State Information}}}, - author = {Chen, Yuan and Kar, Soummya and Moura, José M. F.}, - date = {2017-09}, - journaltitle = {IEEE Transactions on Automatic Control}, - volume = {62}, - number = {9}, - pages = {4618--4624}, - issn = {1558-2523}, - doi = {10.1109/TAC.2016.2626267}, - url = {https://ieeexplore.ieee.org/abstract/document/7738535?casa_token=L2XJAVNpixsAAAAA:NsDbRC_6b-skTa09odiexH7BsMjjU358Afx0HQ5NZqB6LnS8xSYj9LzQhSJ35oDgEMIIMj3_-w}, - urldate = {2023-09-27}, - abstract = {This technical note studies the impact of side initial state information on the detectability of data deception attacks against cyber-physical systems. We assume the attack detector has access to a linear function of the initial system state that cannot be altered by an attacker. First, we provide a necessary and sufficient condition for an attack to be undetectable by any dynamic attack detector under each specific side information pattern. Second, we characterize attacks that can be sustained for arbitrarily long periods without being detected. Third, we define the zero state inducing attack, the only type of attack that remains dynamically undetectable regardless of the side initial state information available to the attack detector. Finally, we design a dynamic attack detector that detects detectable attacks.}, - eventtitle = {{{IEEE Transactions}} on {{Automatic Control}}}, - file = {/home/danesabo/Zotero/storage/QXD5L4EW/Chen et al. - 2017 - Dynamic Attack Detection in Cyber-Physical Systems.pdf} -} - @inproceedings{chenFlowAnalyzerNonlinear2013, title = {Flow*: {{An Analyzer}} for {{Non-linear Hybrid Systems}}}, shorttitle = {Flow*}, @@ -2448,25 +1671,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/LXKWGYPQ/Chen et al. - 2012 - Taylor Model Flowpipe Construction for Non-linear .pdf} } -@article{chiccoDataConsistencyDataDriven2021, - title = {Data {{Consistency}} for {{Data-Driven Smart Energy Assessment}}}, - author = {Chicco, Gianfranco}, - date = {2021-05-13}, - journaltitle = {Frontiers in Big Data}, - shortjournal = {Front. Big Data}, - volume = {4}, - pages = {683682}, - publisher = {Frontiers Media Sa}, - location = {Lausanne}, - doi = {10.3389/fdata.2021.683682}, - url = {http://www.webofscience.com/wos/woscc/summary/ffb5b6d6-a673-4bef-9ff0-b8d88b1e6e37-287c2a9c/relevance/1}, - urldate = {2022-03-08}, - abstract = {In the smart grid era, the number of data available for different applications has increased considerably. However, data could not perfectly represent the phenomenon or process under analysis, so their usability requires a preliminary validation carried out by experts of the specific domain. The process of data gathering and transmission over the communication channels has to be verified to ensure that data are provided in a useful format, and that no external effect has impacted on the correct data to be received. Consistency of the data coming from different sources (in terms of timings and data resolution) has to be ensured and managed appropriately. Suitable procedures are needed for transforming data into knowledge in an effective way. This contribution addresses the previous aspects by highlighting a number of potential issues and the solutions in place in different power and energy system, including the generation, grid and user sides. Recent references, as well as selected historical references, are listed to support the illustration of the conceptual aspects.}, - langid = {english}, - annotation = {WOS:000659098500001}, - file = {/home/danesabo/Zotero/storage/3W93LTNE/Chicco - 2021 - Data Consistency for Data-Driven Smart Energy Asse.pdf;/home/danesabo/Zotero/storage/WNK9M53J/Chicco - 2021 - Data Consistency for Data-Driven Smart Energy Asse.pdf} -} - @book{chlipalaCertifiedProgrammingDependent2022, title = {Certified {{Programming}} with {{Dependent Types}}: {{A Pragmatic Introduction}} to the {{Coq Proof Assistant}}}, shorttitle = {Certified {{Programming}} with {{Dependent Types}}}, @@ -2529,28 +1733,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/H95MLW3Y/Chong et al. - Formal Methods for Security.pdf} } -@article{christianChaosMagneticPendulum2020, - title = {Chaos in the Magnetic Pendulum}, - author = {family=Christian, given=JM, given-i=JM and family=Middleton-Spencer, given=HAJ, given-i=HAJ}, - date = {2020-04}, - journaltitle = {Mathematics TODAY}, - file = {/home/danesabo/Zotero/storage/2UGFXDKR/Christian and Middleton-Spencer - 2020 - Chaos in the magnetic pendulum.pdf} -} - -@article{christianStudyCoreSupport2015, - title = {Study of Core Support Barrel Vibration Monitoring Using Ex-Core Neutron Noise Analysis and Fuzzy Logic Algorithm}, - author = {Christian, Robby and Song, Seon Ho and Kang, Hyun Gook}, - date = {2015}, - journaltitle = {Nuclear Engineering and Technology}, - volume = {47}, - number = {2}, - pages = {165--175}, - issn = {17385733}, - doi = {10.1016/j.net.2014.10.002}, - url = {https://www.sciencedirect.com/science/article/pii/S1738573315000042?via%3Dihub}, - abstract = {The application of neutron noise analysis (NNA) to the ex-core neutron detector signal for monitoring the vibration characteristics of a reactor core support barrel (CSB) was investigated. Ex-core flux data were generated by using a nonanalog Monte Carlo neutron transport method in a simulated CSB model where the implicit capture and Russian roulette technique were utilized. First and third order beam and shell modes of CSB vibration were modeled based on parallel processing simulation. A NNA module was developed to analyze the ex-core flux data based on its time variation, normalized power spectral density, normalized cross-power spectral density, coherence, and phase differences. The data were then analyzed with a fuzzy logic module to determine the vibration characteristics. The ex-core neutron signal fluctuation was directly proportional to the CSB's vibration observed at 8~Hz and 15~Hz in the beam mode vibration, and at 8~Hz in the shell mode vibration. The coherence result between flux pairs was unity at the vibration peak frequencies. A distinct pattern of phase differences was observed for each of the vibration models. The developed fuzzy logic module demonstrated successful recognition of the vibration frequencies, modes, orders, directions, and phase differences within 0.4~ms for the beam and shell mode vibrations.} -} - @article{cimattiSMTBasedVerificationHybrid2021, title = {{{SMT-Based Verification}} of {{Hybrid Systems}}}, author = {Cimatti, Alessandro and Mover, Sergio and Tonetta, Stefano}, @@ -2708,7 +1890,7 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/8BWNU6ZL/Competency Development_ 2-pager July 2023.pdf} } -@online{CompfilesREADMEMd, +@online{CompfilesREADMEmdMain, title = {Compfiles/{{README}}.Md at Main · Dwrensha/Compfiles}, url = {https://github.com/dwrensha/compfiles/blob/main/README.md}, urldate = {2024-03-28}, @@ -2729,29 +1911,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/MCCW3PB5/2017 - Front matter.pdf} } -@article{contiSidechannelAttacksMobile2022, - title = {Side-Channel Attacks on Mobile and {{IoT}} Devices for {{Cyber}}–{{Physical}} Systems}, - author = {Conti, Mauro and Losiouk, Eleonora and Poovendran, Radha and Spolaor, Riccardo}, - date = {2022-04-22}, - journaltitle = {Computer Networks}, - shortjournal = {Computer Networks}, - volume = {207}, - pages = {108858}, - issn = {1389-1286}, - doi = {10.1016/j.comnet.2022.108858}, - url = {https://www.sciencedirect.com/science/article/pii/S138912862200069X}, - urldate = {2023-09-27}, - abstract = {The attacks that leverage the side-channels produced by processes running on mobile and IoT devices are a concrete threat for cyber–physical systems. This special issue is focused on the most recent research work that investigates novel aspects of this topic. This editorial summarizes the contributions of the seven accepted papers for this special issue.}, - file = {/home/danesabo/Zotero/storage/H2VIPJCV/Conti et al. - 2022 - Side-channel attacks on mobile and IoT devices for.pdf} -} - -@online{ControlCOVID19System, - title = {Control of {{COVID-19}} System Using a Novel Nonlinear Robust Control Algorithm - {{ScienceDirect}}}, - url = {https://www.sciencedirect.com/science/article/pii/S1746809420304341?via%3Dihub}, - urldate = {2024-10-01}, - file = {/home/danesabo/Zotero/storage/IBIIV5TA/S1746809420304341.html} -} - @online{controltutorialsformatlab&simulinkInvertedPendulumSystem, type = {Tutorial}, title = {Inverted {{Pendulum}}: {{System Modeling}}}, @@ -2761,13 +1920,6 @@ Opportunities and Challenges toward Responsible AI.pdf} organization = {Control Tutorials For Matlab \& Simulink} } -@online{ControlTutorialsMATLAB, - title = {Control {{Tutorials}} for {{MATLAB}} and {{Simulink}} - {{Introduction}}: {{System Modeling}}}, - url = {https://ctms.engin.umich.edu/CTMS/index.php?example=Introduction§ion=SystemModeling#3}, - urldate = {2024-10-16}, - file = {/home/danesabo/Zotero/storage/6S3MHHH3/index.html} -} - @book{ConvergenceFacilitatingTransdisciplinary2014, title = {Convergence: {{Facilitating Transdisciplinary Integration}} of {{Life Sciences}}, {{Physical Sciences}}, {{Engineering}}, and {{Beyond}}}, shorttitle = {Convergence}, @@ -2806,24 +1958,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/6RINJL4G/Coquand and Huet - The calculus of constructions.pdf} } -@article{coralloCybersecurityAwarenessContext2022, - title = {Cybersecurity Awareness in the Context of the {{Industrial Internet}} of {{Things}}: {{A}} Systematic Literature Review}, - shorttitle = {Cybersecurity Awareness in the Context of the {{Industrial Internet}} of {{Things}}}, - author = {Corallo, Angelo and Lazoi, Mariangela and Lezzi, Marianna and Luperto, Angela}, - date = {2022-05}, - journaltitle = {Computers in Industry}, - shortjournal = {Computers in Industry}, - volume = {137}, - pages = {103614}, - issn = {01663615}, - doi = {10.1016/j.compind.2022.103614}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0166361522000094}, - urldate = {2022-09-30}, - abstract = {Cybersecurity is one of the main challenges faced by companies in the context of the Industrial Internet of Things (IIoT), in which a number of smart devices associated with machines, computers and people are networked and communicate with each other. In this connected industrial scenario, personnel need to be aware of cybersecurity issues in order to prevent or minimise the occurrence of cybersecurity incidents and corporate data breaches, and thus to make companies resilient to cyber-attacks. In addition, the recent increase in smart working due to the COVID-19 pandemic means that the need for cybersecurity awareness is more relevant than ever.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/Y2AIC6HE/Corallo et al. - 2022 - Cybersecurity awareness in the context of the Indu.pdf} -} - @book{councilDigitalInstrumentationControl1997, title = {Digital Instrumentation and Control Systems in Nuclear Power Plants: Safety and Reliability Issues}, author = {Council, National Research}, @@ -2833,10 +1967,6 @@ Opportunities and Challenges toward Responsible AI.pdf} file = {/home/danesabo/Zotero/storage/B88RJKSN/Council - 1997 - Digital instrumentation and control systems in nuc.pdf} } -@misc{CPS-def, - type = {misc} -} - @article{cremersFormalMethodsSecurity2003, title = {Formal Methods for Security Protocols: {{Three}} Examples of the Black-Box Approach}, author = {Cremers, C. J. F. and Mauw, S. and De Vink, E. P.}, @@ -2924,10 +2054,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/ABWFP6Q7/board.html} } -@misc{Cyber-X, - date = {2020-08/2022-02} -} - @online{CyberAttackGerman2015, title = {Cyber {{Attack}} on {{German Steel Mill Leads}} to ‘{{Massive}}’ {{Real World Damage}}}, date = {2015-01-08}, @@ -2945,26 +2071,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/7PU4N9BT/Sort_67122.pdf} } -@misc{CyberPhysicalSystems, - title = {Cyber Physical Systems Security Limitations Issues and Future Trends.Pdf} -} - -@article{CybersecurityCapabilityMaturity, - title = {Cybersecurity {{Capability Maturity Model}} {{White Paper}}}, - pages = {35}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/2VNSQKEE/Cybersecurity Capability Maturity Model .pdf} -} - -@online{CyberSecurityDigital, - title = {Cyber {{Security Digital Twin}}}, - url = {https://www.haruspexsecurity.com/cyber-security-digital-twin/}, - urldate = {2022-04-02}, - abstract = {What is a Digital Twin in Cyber Security?The term refers to a digital replica of assets, systems and devices that can be used for various purposes.}, - langid = {american}, - organization = {Haruspex} -} - @online{CybersecurityEmergingEngineering, title = {Cybersecurity in {{Emerging Engineering Systems}} | {{Academics}}}, url = {https://www.academics.pitt.edu/programs/cybersecurity-emerging-engineering-systems}, @@ -2985,43 +2091,7 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/XL5B2QC3/ML101180437.pdf} } -@article{dahlinParticleFilterbasedGaussian2014, - title = {Particle Filter-Based {{Gaussian}} Process Optimisation for Parameter Inference}, - author = {Dahlin, Johan and Lindsten, Fredrik}, - date = {2014}, - journaltitle = {IFAC Proceedings Volumes}, - shortjournal = {IFAC Proceedings Volumes}, - volume = {47}, - number = {3}, - pages = {8675--8680}, - issn = {14746670}, - doi = {10.3182/20140824-6-ZA-1003.00278}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S1474667016429824}, - urldate = {2022-04-21}, - abstract = {We propose a novel method for maximum-likelihood-based parameter inference in nonlinear and/or non-Gaussian state space models. The method is an iterative procedure with three steps. At each iteration a particle filter is used to estimate the value of the loglikelihood function at the current parameter iterate. Using these log-likelihood estimates, a surrogate objective function is created by utilizing a Gaussian process model. Finally, we use a heuristic procedure to obtain a revised parameter iterate, providing an automatic trade-off between exploration and exploitation of the surrogate model. The method is profiled on two state space models with good performance both considering accuracy and computational cost.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/SJS9AE88/Dahlin and Lindsten - 2014 - Particle filter-based Gaussian process optimisatio.pdf} -} - -@article{daiIndustrialEdgeComputing2019, - title = {Industrial {{Edge Computing}}: {{Enabling Embedded Intelligence}}}, - shorttitle = {Industrial {{Edge Computing}}}, - author = {Dai, Wenbin and Nishi, Hiroaki and Vyatkin, Valeriy and Huang, Victor and Shi, Yang and Guan, Xinping}, - date = {2019-12}, - journaltitle = {IEEE Industrial Electronics Magazine}, - shortjournal = {EEE Ind. Electron. Mag.}, - volume = {13}, - number = {4}, - pages = {48--56}, - issn = {1932-4529, 1941-0115}, - doi = {10.1109/MIE.2019.2943283}, - url = {https://ieeexplore.ieee.org/document/8941000/}, - urldate = {2022-09-30}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/7CXXH5QF/Dai et al. - 2019 - Industrial Edge Computing Enabling Embedded Intel.pdf} -} - -@incollection{dammLscBreathingLife1999, +@incollection{dammLscsBreathingLife1999, title = {Lsc’s: {{Breathing Life Into Message Sequence Charts}}}, shorttitle = {Lsc’s}, booktitle = {Formal {{Methods}} for {{Open Object-Based Distributed Systems}}}, @@ -3076,31 +2146,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/WJ76H7IQ/Darvas et al. - 2016 - Formal Verification of Safety PLC Based Control So.pdf} } -@article{dasSoKComprehensiveReexamination2020, - title = {{{SoK}}: {{A Comprehensive Reexamination}} of {{Phishing Research From}} the {{Security Perspective}}}, - shorttitle = {{{SoK}}}, - author = {Das, Avisha and Baki, Shahryar and El Aassal, Ayman and Verma, Rakesh and Dunbar, Arthur}, - date = {2020}, - journaltitle = {IEEE Communications Surveys \& Tutorials}, - volume = {22}, - number = {1}, - pages = {671--708}, - issn = {1553-877X}, - doi = {10.1109/COMST.2019.2957750}, - url = {https://ieeexplore.ieee.org/document/8924660}, - urldate = {2023-10-04}, - abstract = {Phishing and spear phishing are typical examples of masquerade attacks since trust is built up through impersonation for the attack to succeed. Given the prevalence of these attacks, considerable research has been conducted on these problems along multiple dimensions. We reexamine the existing research on phishing and spear phishing from the perspective of the unique needs of the security domain, which we call security challenges: real-time detection, active attacker, dataset quality and base-rate fallacy. We explain these challenges and then survey the existing phishing/spear phishing solutions in their light. This viewpoint consolidates the literature and illuminates several opportunities for improving existing solutions. We organize the existing literature based on detection techniques for different attack vectors (e.g., URLs, websites, emails) along with studies on user awareness. For detection techniques we examine properties of the dataset, feature extraction, detection algorithms used, and performance evaluation metrics. This work can help guide the development of more effective defenses for phishing, spear phishing and email masquerade attacks of the future, as well as provide a framework for a thorough evaluation and comparison.}, - eventtitle = {{{IEEE Communications Surveys}} \& {{Tutorials}}}, - file = {/home/danesabo/Zotero/storage/PRQGZWPM/Das et al. - 2020 - SoK A Comprehensive Reexamination of Phishing Res.pdf;/home/danesabo/Zotero/storage/ZUHNKVRW/8924660.html} -} - -@online{DataDrivenModelingCyberPhysical, - title = {Data-{{Driven Modeling}} of {{Cyber-Physical Systems Using Side-Channel Analysis}}}, - url = {https://www.google.com/books/edition/Data_Driven_Modeling_of_Cyber_Physical_S/2TbPDwAAQBAJ?hl=en&gbpv=1&pg=PR8&printsec=frontcover&bshm=rime/1}, - urldate = {2023-09-27}, - file = {/home/danesabo/Zotero/storage/67PIBQ6G/Data-Driven Modeling of Cyber-Physical Systems Usi.pdf;/home/danesabo/Zotero/storage/DEZLIM3W/2TbPDwAAQBAJ.html} -} - @article{dattaStabilityInertia1999, title = {Stability and Inertia}, author = {Datta, Biswa Nath}, @@ -3137,12 +2182,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/TSW5BQ6F/Davis - 1972 - Fidelity in Mathematical Discourse Is One and One.pdf} } -@misc{dci-map, - author = {{Economic Innovation Group}}, - year = {Date accessed 11/2021}, - url = {https://eig.org/dci/interactive-map} -} - @article{decarloPerspectivesResultsStability2000, title = {Perspectives and Results on the Stability and Stabilizability of Hybrid Systems}, author = {Decarlo, R.A. and Branicky, M.S. and Pettersson, S. and Lennartson, B.}, @@ -3196,7 +2235,7 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/3EZJGH5Z/De Millo et al. - 1979 - Social processes and proofs of theorems and progra.pdf} } -@article{demouraLeanTheoremProver, +@article{demouraLean4Theorem, title = {The {{Lean}} 4 {{Theorem Prover}} and {{Programming Language}} ({{System Description}})}, author = {family=Moura, given=Leonardo, prefix=de, useprefix=true and Ullrich, Sebastian}, abstract = {Lean 4 is a reimplementation of the Lean interactive theorem prover (ITP) in Lean itself. It addresses many shortcomings of the previous versions and contains many new features. Lean 4 is fully extensible: users can modify and extend the parser, elaborator, tactics, decision procedures, pretty printer, and code generator. The new system has a hygienic macro system custom-built for ITPs. It contains a new typeclass resolution procedure based on tabled resolution, addressing significant performance problems reported by the growing user base. Lean 4 is also an efficient functional programming language based on a novel programming paradigm called functional but in-place. Efficient code generation is crucial for Lean users because many write custom proof automation procedures in Lean itself.}, @@ -3239,21 +2278,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/VMQL5YJU/Deutschbein et al. - 2022 - Toward Hardware Security Property Generation at Sc.pdf} } -@online{dhariwalDiffusionModelsBeat2021, - title = {Diffusion {{Models Beat GANs}} on {{Image Synthesis}}}, - author = {Dhariwal, Prafulla and Nichol, Alex}, - date = {2021-06-01}, - eprint = {2105.05233}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - doi = {10.48550/arXiv.2105.05233}, - url = {http://arxiv.org/abs/2105.05233}, - urldate = {2023-10-05}, - abstract = {We show that diffusion models can achieve image sample quality superior to the current state-of-the-art generative models. We achieve this on unconditional image synthesis by finding a better architecture through a series of ablations. For conditional image synthesis, we further improve sample quality with classifier guidance: a simple, compute-efficient method for trading off diversity for fidelity using gradients from a classifier. We achieve an FID of 2.97 on ImageNet 128\$\textbackslash times\$128, 4.59 on ImageNet 256\$\textbackslash times\$256, and 7.72 on ImageNet 512\$\textbackslash times\$512, and we match BigGAN-deep even with as few as 25 forward passes per sample, all while maintaining better coverage of the distribution. Finally, we find that classifier guidance combines well with upsampling diffusion models, further improving FID to 3.94 on ImageNet 256\$\textbackslash times\$256 and 3.85 on ImageNet 512\$\textbackslash times\$512. We release our code at https://github.com/openai/guided-diffusion}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/AI9WPMRK/Dhariwal and Nichol - 2021 - Diffusion Models Beat GANs on Image Synthesis.pdf;/home/danesabo/Zotero/storage/LVTW6CH8/2105.html} -} - @article{dicairanoStabilizingDynamicControllers2014, title = {Stabilizing {{Dynamic Controllers}} for {{Hybrid Systems}}: {{A Hybrid Control Lyapunov Function Approach}}}, shorttitle = {Stabilizing {{Dynamic Controllers}} for {{Hybrid Systems}}}, @@ -3316,45 +2340,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/VL2AU6JP/digital-twins.html} } -@article{dingSurveySecurityControl2018, - title = {A Survey on Security Control and Attack Detection for Industrial Cyber-Physical Systems}, - author = {Ding, Derui and Han, Qing-Long and Xiang, Yang and Ge, Xiaohua and Zhang, Xian-Ming}, - date = {2018-01-31}, - journaltitle = {Neurocomputing}, - shortjournal = {Neurocomputing}, - volume = {275}, - pages = {1674--1683}, - publisher = {Elsevier}, - location = {Amsterdam}, - issn = {0925-2312}, - doi = {10.1016/j.neucom.2017.10.009}, - url = {http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=DOISource&SrcApp=WOS&KeyAID=10.1016%2Fj.neucom.2017.10.009&DestApp=DOI&SrcAppSID=8COHllwH67CX3cigLe5&SrcJTitle=NEUROCOMPUTING&DestDOIRegistrantName=Elsevier}, - urldate = {2022-03-08}, - abstract = {Cyber-physical systems (CPSs), which are an integration of computation, networking, and physical processes, play an increasingly important role in critical infrastructure, government and everyday life. Due to physical constraints, embedded computers and networks may give rise to some additional security vulnerabilities, which results in losses of enormous economy benefits or disorder of social life. As a result, it is of significant to properly investigate the security issue of CPSs to ensure that such systems are operating in a safe manner. This paper, from a control theory perspective, presents an overview of recent advances on security control and attack detection of industrial CPSs. First, the typical system modeling on CPSs is summarized to cater for the requirement of the performance analysis. Then three typical types of cyber-attacks, i.e. denial-of-service attacks, replay attacks, and deception attacks, are disclosed from an engineering perspective. Moreover, robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks. The development on attack detection for industrial CPSs is reviewed according to the categories on detection approaches. Furthermore, the security control and state estimation are discussed in detail. Finally, some challenge issues are raised for the future research. (c) 2017 Elsevier B.V. All rights reserved.}, - langid = {english}, - keywords = {DGC read,key}, - annotation = {WOS:000418370200157}, - file = {/home/danesabo/Zotero/storage/GUU8LBLK/Ding19.pdf} -} - -@article{djeziriRobustMonitoringElectric2009, - title = {Robust {{Monitoring}} of an {{Electric Vehicle With Structured}} and {{Unstructured Uncertainties}}}, - author = {Djeziri, Mohand Arab and Merzouki, Rochdi and Bouamama, Belkacem Ould}, - date = {2009-11}, - journaltitle = {IEEE Transactions on Vehicular Technology}, - volume = {58}, - number = {9}, - pages = {4710--4719}, - issn = {1939-9359}, - doi = {10.1109/TVT.2009.2026281}, - url = {https://ieeexplore.ieee.org/abstract/document/5130067?casa_token=mNjsfmKFCA4AAAAA:TxD0lmASLKB2CjqWYyaFLWCZCFE4bjaBqDuytDLbrGtMzeUAtVd64ulSh_WGNjKOcGhL7IGaHA}, - urldate = {2024-10-15}, - abstract = {This paper deals with a robust fault-detection and isolation (FDI) technique, which is applied to the traction system of an electric vehicle, in the presence of structured and unstructured uncertainties. Due to the structural and multidomain properties of the bond graph, the generation of a nonlinear model and residuals for the studied system with adaptive thresholds is synthesized. The parameters and structured uncertainties are identified by using a least-square algorithm. A super-twisting observer is used to estimate both unstructured uncertainties and unknown inputs. Cosimulation with real experimental data shows the robustness of the residuals to the considered uncertainties and their sensitivity to the faults.}, - eventtitle = {{{IEEE Transactions}} on {{Vehicular Technology}}}, - keywords = {Analytical redundancy relations (ARRs),bond graph (BG),Bonding,electric vehicle,Electric vehicles,Electrical fault detection,Fault detection,fault detection and isolation (FDI),Fault diagnosis,linear fractional transformations (LFTs),Monitoring,Redundancy,Robustness,structured and unstructured uncertainties,Uncertain systems,Uncertainty}, - file = {/home/danesabo/Zotero/storage/BPDWU2H7/Djeziri et al. - 2009 - Robust Monitoring of an Electric Vehicle With Structured and Unstructured Uncertainties.pdf} -} - @online{DoDCyberWorkforce, title = {{{DoD Cyber Workforce Framework}} – {{DoD Cyber Exchange}}}, url = {https://public.cyber.mil/wid/dcwf/}, @@ -3362,70 +2347,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/3EM5FBI9/dcwf.html} } -@report{DOE-TRL, - title = {Technology Readiness Assessment Guide}, - author = {{Office of Project Management Oversight \& Assessments}}, - date = {2011}, - number = {DOE G 413.3-4A}, - institution = {U.S. Department of Energy} -} - -@article{dollnerGeospatialArtificialIntelligence2020, - title = {Geospatial {{Artificial Intelligence}}: {{Potentials}} of {{Machine Learning}} for {{3D Point Clouds}} and {{Geospatial Digital Twins}}}, - shorttitle = {Geospatial {{Artificial Intelligence}}}, - author = {Döllner, Jürgen}, - date = {2020-02}, - journaltitle = {PFG – Journal of Photogrammetry, Remote Sensing and Geoinformation Science}, - shortjournal = {PFG}, - volume = {88}, - number = {1}, - pages = {15--24}, - issn = {2512-2789, 2512-2819}, - doi = {10.1007/s41064-020-00102-3}, - url = {http://link.springer.com/10.1007/s41064-020-00102-3}, - urldate = {2022-03-02}, - abstract = {Artificial intelligence (AI) is changing fundamentally the way how IT solutions are implemented and operated across all application domains, including the geospatial domain. This contribution outlines AI-based techniques for 3D point clouds and geospatial digital twins as generic components of geospatial AI. First, we briefly reflect on the term “AI” and outline technology developments needed to apply AI to IT solutions, seen from a software engineering perspective. Next, we characterize 3D point clouds as key category of geodata and their role for creating the basis for geospatial digital twins; we explain the feasibility of machine learning (ML) and deep learning (DL) approaches for 3D point clouds. In particular, we argue that 3D point clouds can be seen as a corpus with similar properties as natural language corpora and formulate a “Naturalness Hypothesis” for 3D point clouds. In the main part, we introduce a workflow for interpreting 3D point clouds based on ML/ DL approaches that derive domain-specific and application-specific semantics for 3D point clouds without having to create explicit spatial 3D models or explicit rule sets. Finally, examples are shown how ML/DL enables us to efficiently build and maintain base data for geospatial digital twins such as virtual 3D city models, indoor models, or building information models.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/46VFLZTD/Geospatial AI.pdf} -} - -@book{doyleFeedbackControlTheory2009, - title = {Feedback {{Control Theory}}}, - author = {Doyle, John and A, Francis and Tannenbaum, Allen}, - date = {2009-01-01}, - doi = {10.1007/978-0-387-85460-1_1}, - abstract = {In any system, if there exists a linear relationship between two variables, then it is said that it is a linear system.}, - file = {/home/danesabo/Zotero/storage/89YIQ9RE/Doyle et al. - 2009 - Feedback Control Theory.pdf} -} - -@article{doyleGuaranteedMarginsLQG1978, - title = {Guaranteed Margins for {{LQG}} Regulators}, - author = {Doyle, J.}, - date = {1978-08}, - journaltitle = {IEEE Transactions on Automatic Control}, - volume = {23}, - number = {4}, - pages = {756--757}, - issn = {1558-2523}, - doi = {10.1109/TAC.1978.1101812}, - url = {https://ieeexplore.ieee.org/document/1101812}, - urldate = {2024-10-09}, - abstract = {There are none.}, - eventtitle = {{{IEEE Transactions}} on {{Automatic Control}}}, - keywords = {Algorithm design and analysis,Filters,Gain,Guidelines,Noise measurement,Open loop systems,Regulators,Robustness,Three-term control,White noise}, - file = {/home/danesabo/Zotero/storage/UCVPYFXZ/Doyle - 1978 - Guaranteed margins for LQG regulators.pdf;/home/danesabo/Zotero/storage/E7UWBIQJ/1101812.html} -} - -@online{dragos2020, - title = {2020 {{ICS Cybersecurity Year}} in {{Review}} | {{Dragos}}}, - date = {2021-02-24T12:29:00Z}, - url = {https://www.dragos.com/blog/industry-news/2020-ics-cybersecurity-year-in-review/}, - urldate = {2022-03-25}, - abstract = {Today we published our 2020 ICS Cybersecurity Year in Review report, an annual analysis of Industrial Control System (ICS)/Operational Technology (OT) focused cyber threats, vulnerabilities, assessments, and incident response insights. The ICS/OT community has long struggled with a lack of public insights into these types of problem areas. It is Dragos’s goal to share the observations and lessons learned with the industrial community for data-driven analysis and...}, - langid = {american}, - file = {/home/danesabo/Zotero/storage/JCGXARU4/2020-ics-cybersecurity-year-in-review.html} -} - @article{dreierFormallyPracticallyVerifying2019, title = {Formally and Practically Verifying Flow Properties in Industrial Systems}, author = {Dreier, Jannik and Puys, Maxime and Potet, Marie-Laure and Lafourcade, Pascal and Roch, Jean-Louis}, @@ -3442,23 +2363,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/V3FNANF6/Dreier et al. - 2019 - Formally and practically verifying flow properties.pdf} } -@article{drmacQuadratureBasedVectorFitting2015, - title = {Quadrature-{{Based Vector Fitting}} for {{Discretized}} \$\textbackslash mathcal\{\vphantom\}{{H}}\vphantom\{\}\_2\$ {{Approximation}}}, - author = {Drmač, Z. and Gugercin, S. and Beattie, C.}, - date = {2015-01}, - journaltitle = {SIAM Journal on Scientific Computing}, - shortjournal = {SIAM J. Sci. Comput.}, - volume = {37}, - number = {2}, - pages = {A625-A652}, - issn = {1064-8275, 1095-7197}, - doi = {10.1137/140961511}, - url = {http://epubs.siam.org/doi/10.1137/140961511}, - urldate = {2024-11-08}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/996A8M9S/Drmač et al. - 2015 - Quadrature-Based Vector Fitting for Discretized $mathcal H _2$ Approximation.pdf} -} - @online{DSPACE, title = {{{dSPACE}}}, url = {https://www.dspace.com/en/inc/home.cfm}, @@ -3488,21 +2392,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/ETLC4293/Duggirala et al. - 2015 - C2E2 A Verification Tool for Stateflow Models.pdf} } -@online{duLearningUniversalPolicies2023, - title = {Learning {{Universal Policies}} via {{Text-Guided Video Generation}}}, - author = {Du, Yilun and Yang, Mengjiao and Dai, Bo and Dai, Hanjun and Nachum, Ofir and Tenenbaum, Joshua B. and Schuurmans, Dale and Abbeel, Pieter}, - date = {2023-02-01}, - eprint = {2302.00111}, - eprinttype = {arXiv}, - eprintclass = {cs}, - url = {http://arxiv.org/abs/2302.00111}, - urldate = {2023-10-05}, - abstract = {A goal of artificial intelligence is to construct an agent that can solve a wide variety of tasks. Recent progress in text-guided image synthesis has yielded models with an impressive ability to generate complex novel images, exhibiting combinatorial generalization across domains. Motivated by this success, we investigate whether such tools can be used to construct more general-purpose agents. Specifically, we cast the sequential decision making problem as a text-conditioned video generation problem, where, given a text-encoded specification of a desired goal, a planner synthesizes a set of future frames depicting its planned actions in the future, after which control actions are extracted from the generated video. By leveraging text as the underlying goal specification, we are able to naturally and combinatorially generalize to novel goals. The proposed policy-as-video formulation can further represent environments with different state and action spaces in a unified space of images, which, for example, enables learning and generalization across a variety of robot manipulation tasks. Finally, by leveraging pretrained language embeddings and widely available videos from the internet, the approach enables knowledge transfer through predicting highly realistic video plans for real robots.}, - langid = {english}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/5DQ68KBM/Du et al. - 2023 - Learning Universal Policies via Text-Guided Video .pdf} -} - @article{durethConditionalDiffusionbasedMicrostructure2023, title = {Conditional Diffusion-Based Microstructure Reconstruction}, author = {Düreth, Christian and Seibert, Paul and Rücker, Dennis and Handford, Stephanie and Kästner, Markus and Gude, Maik}, @@ -3519,40 +2408,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/IQ3XQTUG/Düreth et al. - 2023 - Conditional diffusion-based microstructure reconst.pdf} } -@article{durethConditionalDiffusionbasedMicrostructure2023a, - title = {Conditional Diffusion-Based Microstructure Reconstruction}, - author = {Düreth, Christian and Seibert, Paul and Rücker, Dennis and Handford, Stephanie and Kästner, Markus and Gude, Maik}, - date = {2023-06-01}, - journaltitle = {Materials Today Communications}, - shortjournal = {Materials Today Communications}, - volume = {35}, - pages = {105608}, - issn = {2352-4928}, - doi = {10.1016/j.mtcomm.2023.105608}, - url = {https://www.sciencedirect.com/science/article/pii/S2352492823002982}, - urldate = {2024-10-01}, - abstract = {Microstructure reconstruction, a major component of inverse computational materials engineering, is currently advancing at an unprecedented rate. While various training-based and training-free approaches are developed, the majority of contributions are based on generative adversarial networks. In contrast, diffusion models constitute a more stable alternative, which have recently become the new state of the art and currently attract much attention. The present work investigates the applicability of diffusion models to the reconstruction of real-world microstructure data. For this purpose, a highly diverse and morphologically complex data set is created by combining and processing databases from the literature, where the reconstruction of realistic micrographs for a given material class demonstrates the ability of the model to capture these features. Furthermore, a fiber composite data set is used to validate the applicability of diffusion models to small data set sizes that can realistically be created by a single lab. The quality and diversity of the reconstructed microstructures is quantified by means of descriptor-based error metrics as well as the Fréchet inception distance (FID) score. Although not present in the training data set, the generated samples are visually indistinguishable from real data to the untrained eye and various error metrics are computed. This demonstrates the utility of diffusion models in microstructure reconstruction and provides a basis for further extensions such as 2D-to-3D reconstruction or application to multiscale modeling and structure–property linkages.}, - keywords = {Diffusion models,Machine learning,Microstructure,Reconstruction}, - file = {/home/danesabo/Zotero/storage/MF34S2VQ/Düreth et al. - 2023 - Conditional diffusion-based microstructure reconstruction.pdf;/home/danesabo/Zotero/storage/IDF425PN/S2352492823002982.html} -} - -@book{duriezMachineLearningControl2017, - title = {Machine {{Learning Control}} – {{Taming Nonlinear Dynamics}} and {{Turbulence}}}, - author = {Duriez, Thomas and Brunton, Steven L. and Noack, Bernd R.}, - date = {2017}, - series = {Fluid {{Mechanics}} and {{Its Applications}}}, - volume = {116}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-319-40624-4}, - url = {http://link.springer.com/10.1007/978-3-319-40624-4}, - urldate = {2024-10-09}, - isbn = {978-3-319-40623-7 978-3-319-40624-4}, - langid = {english}, - keywords = {aerodynamic drag reduction,complex linear systems,control design,Dynamical systems,Fluid mechanics,fluid- and aerodynamics,Genetic programming,Machine learning,MLC,textbook}, - file = {/home/danesabo/Zotero/storage/KGSG4UQ6/Duriez et al. - 2017 - Machine Learning Control – Taming Nonlinear Dynamics and Turbulence.pdf} -} - @incollection{dutertreFormalModelingAnalysis2007, title = {Formal {{Modeling}} and {{Analysis}} of the {{Modbus Protocol}}}, booktitle = {Critical {{Infrastructure Protection}}}, @@ -3572,7 +2427,7 @@ NTRS Research Center: Langley Research Center (LaRC)}, file = {/home/danesabo/Zotero/storage/S78P2BS3/Dutertre - 2007 - Formal Modeling and Analysis of the Modbus Protoco.pdf} } -@article{dwDARPAExplainableArtificial2019, +@article{dwDARPAsExplainableArtificial2019, title = {{{DARPA}}’s Explainable Artificial Intelligence Program}, author = {DW, Gunning D. Aha}, date = {2019}, @@ -3584,44 +2439,6 @@ NTRS Research Center: Langley Research Center (LaRC)}, Artificial Intelligence Program.pdf} } -@misc{DyanmicDeceptionIndustrial, - title = {Dyanmic {{Deception}} for {{Industrial Automation}} and {{Control Systems}}}, - url = {https://attivonetworks.com/documentation/Attivo_Networks-Energy_Whitepaper.pdf}, - organization = {Attivo Networks}, - file = {/home/danesabo/Zotero/storage/88H2IMR9/Attivo_Networks-Energy_Whitepaper.pdf} -} - -@article{dyliaccoEnhancingPowerSystem1997, - title = {Enhancing Power System Security Control}, - author = {DyLiacco, T. E.}, - date = {1997-07}, - journaltitle = {Ieee Computer Applications in Power}, - shortjournal = {IEEE Comput. Appl. Power}, - volume = {10}, - number = {3}, - pages = {38--41}, - publisher = {Ieee-Inst Electrical Electronics Engineers Inc}, - location = {New York}, - issn = {0895-0156}, - doi = {10.1109/67.595291}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - langid = {english}, - keywords = {DGC read}, - annotation = {WOS:A1997XG57700009}, - file = {/home/danesabo/Zotero/storage/CFARXNQ6/DyLiacco - 1997 - Enhancing power system security control.pdf} -} - -@article{edmondsSECURITYANALYSISMULTILAYER, - title = {{{SECURITY ANALYSIS OF MULTILAYER SCADA PROTOCOLS}}: {{A MODBUS TCP CASE STUDY}}}, - author = {Edmonds, Janica and Papa, Mauricio and Shenoi, Sujeet}, - journaltitle = {CRITICAL INFRASTRUCTURE PROTECTION}, - pages = {17}, - abstract = {The layering of protocols in critical infrastructure networks – exemplified by Modbus TCP in the oil and gas sector and SS7oIP in the telecommunications sector – raises important security issues. The individual protocol stacks, e.g., Modbus and SS7, have certain vulnerabilities, and transporting these protocols using carrier protocols, e.g., TCP/IP, brings into play the vulnerabilities of the carrier protocols. Moreover, the layering produces unintended inter-protocol interactions and, possibly, new vulnerabilities. This paper describes a formal methodology for evaluating the security of multilayer SCADA protocols. The methodology, involving the analysis of peer-to-peer communications and multilayer protocol interactions, is discussed in the context of Modbus TCP, the predominant protocol used for oil and gas pipeline operations.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/EIXS9WGU/Edmonds et al. - SECURITY ANALYSIS OF MULTILAYER SCADA PROTOCOLS A.pdf} -} - @book{EffectiveHaskell, title = {Effective {{Haskell}}}, url = {https://learning.oreilly.com/library/view/effective-haskell/9798888650400/}, @@ -3632,7 +2449,7 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/PLQMGIZH/9798888650400.html} } -@video{egerstedtLectureHybridAutomata2014, +@video{egerstedtLecture52Hybrid2014, entrysubtype = {video}, title = {Lecture 5.2 - {{Hybrid Automata}}}, editor = {Egerstedt, Magnus}, @@ -3643,31 +2460,6 @@ Artificial Intelligence Program.pdf} urldate = {2023-11-14} } -@article{einickeRobustExtendedKalman1999, - title = {Robust Extended {{Kalman}} Filtering}, - author = {Einicke, G.A. and White, L.B.}, - date = {1999-09}, - journaltitle = {IEEE Transactions on Signal Processing}, - shortjournal = {IEEE Trans. Signal Process.}, - volume = {47}, - number = {9}, - pages = {2596--2599}, - issn = {1053587X}, - doi = {10.1109/78.782219}, - url = {http://ieeexplore.ieee.org/document/782219/}, - urldate = {2022-02-11}, - abstract = {Linearization errors inherent in the specification of an extended Kalman filter (EKF) can severely degrade its performance. This correspondence presents a new approach to the robust design of a discrete-time EKF by application of the robust linear design methods based on the H1 norm minimization criterion. The results of simulations are presented to demonstrate an advantage for signal demodulation and nonlinear equalization applications.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/5MBDQVW8/Einicke and White - 1999 - Robust extended Kalman filtering.pdf} -} - -@report{ElectricityGridModernization, - title = {Electricity {{Grid Modernization}}: {{Progress Being Made}} on {{Cybersecurity Guidelines}}, but {{Key Challenges Remain}} to Be {{Addressed}}}, - url = {https://www.gao.gov/assets/gao-11-117.pdf}, - urldate = {2022-03-22}, - file = {/home/danesabo/Zotero/storage/6WBLUWJY/gao-11-117.pdf} -} - @article{ellisonExtendingAADLSecurity2015, title = {Extending {{AADL}} for Security Design Assurance of Cyber-Physical Systems}, author = {Ellison, Robert and Householder, Allen and Hudak, John and Kazman, Rik and Woody, Carol}, @@ -3676,257 +2468,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/H2IWZM6I/Ellison et al. - Extending AADL for Security Design Assurance of Cy.pdf} } -@online{energySMAHTRConceptSmall2010, - title = {{{SMAHTR}} - {{A Concept}} for a {{Small}}, {{Modular Advanced High Temperature Reactor}} | {{ORNL}}}, - author = {family=Energy, given=UT-Battelle LLC for the US Department, prefix=of, useprefix=false}, - date = {2010-10-01}, - url = {https://www.ornl.gov/publication/smahtr-concept-small-modular-advanced-high-temperature-reactor}, - urldate = {2025-01-29}, - abstract = {Several new high temperature reactor concepts, referred to as Fluoride Salt Cooled High Temperature Reactors (FHRs), have been developed over the past decade. These FHRs use a liquid salt coolant combined with high temperature gas-cooled reactor fuels (TRISO) and graphite structural materials to provide a reactor that operates at very high temperatures and is scalable to large sizes – perhaps exceeding 2400 MWt. This paper presents a new small FHR – the Small Modular Advanced High Temperature Reactor or “SmAHTR”.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/H3YE9BZL/smahtr-concept-small-modular-advanced-high-temperature-reactor.html} -} - -@online{ENGR2100Module, - title = {{{ENGR}} 2100 {{Module}} 7.1 - {{Point Kinetics}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486309?module_item_id=5008204}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/BZCBC5EA/ENGR 2100 Module 7.1 - Point Kinetics.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/VYKI2KYI/17486309.html} -} - -@online{ENGR2100Modulea, - title = {{{ENGR}} 2100 {{Module}} 5 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486295?module_item_id=5008181}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/S3CN9V7B/ENGR 2100 Module 5 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleaa, - title = {{{ENGR}} 2100 {{Module}} 2.1 - {{Binding Energy}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486231?module_item_id=5008128}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/ZII4DNAP/ENGR 2100 Module 2.1 - Binding Energy.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleab, - title = {{{ENGR}} 2100 {{Module}} 3 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486237?module_item_id=5008150}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/4EY8DSX6/ENGR 2100 Module 3 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleac, - title = {{{ENGR}} 2100 {{Module}} 3.5 - {{Radiation Shielding}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486228?module_item_id=5008149}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/MTUUIMIW/ENGR 2100 Module 3.5 - Radiation Shielding.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulead, - title = {{{ENGR}} 2100 {{Module}} 3.4 - {{Estimating Radiation Dose Rates}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486246?module_item_id=5008148}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/BK9ESLNN/ENGR 2100 Module 3.4 - Estimating Radiation Dose Rates.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCL.pdf} -} - -@online{ENGR2100Moduleae, - title = {{{ENGR}} 2100 {{Module}} 3.3 - {{Radiation Protection Standards}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486272?module_item_id=5008147}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/PVUK34DK/ENGR 2100 Module 3.3 - Radiation Protection Standards.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLE.pdf} -} - -@online{ENGR2100Moduleaf, - title = {{{ENGR}} 2100 {{Module}} 3.2 - {{Radiation Damage}} in {{Biological Systems}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486242?module_item_id=5008146}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/GI4SIPXM/ENGR 2100 Module 3.2 - Radiation Damage in Biological Systems.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTA.pdf} -} - -@online{ENGR2100Moduleag, - title = {{{ENGR}} 2100 {{Module}} 2.3 - {{Nuclear Reactions}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486303?module_item_id=5008130}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/9DQW3AW8/ENGR 2100 Module 2.3 - Nuclear Reactions.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleah, - title = {{{ENGR}} 2100 {{Module}} 5.1 - {{Reactor Overview}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486193?module_item_id=5008177}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/3U2DTM8N/ENGR 2100 Module 5.1 - Reactor Overview.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleb, - title = {{{ENGR}} 2100 {{Module}} 5.4 - {{Criticality Control}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486218?module_item_id=5008180}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/TFD7HEZ5/ENGR 2100 Module 5.4 - Criticality Control.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulec, - title = {{{ENGR}} 2100 {{Module}} 5.3 - {{PWR}} and {{BWR Cores}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486253?module_item_id=5008179}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/N4IJCJT8/ENGR 2100 Module 5.3 - PWR and BWR Cores.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduled, - title = {{{ENGR}} 2100 {{Module}} 6 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486297?module_item_id=5008195}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/9T6YSYIW/ENGR 2100 Module 6 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulee, - title = {{{ENGR}} 2100 {{Module}} 6.4 - {{Multiplying Media}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486293?module_item_id=5008194}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/KMHM2JK2/ENGR 2100 Module 6.4 - Multiplying Media.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulef, - title = {{{ENGR}} 2100 {{Module}} 6.3 - {{Non-Multiplying Media}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486294?module_item_id=5008193}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/UF3D9R6K/ENGR 2100 Module 6.3 - Non-Multiplying Media.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleg, - title = {{{ENGR}} 2100 {{Module}} 6.2 - {{Diffusion Theory}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486279?module_item_id=5008192}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/T3YGV47M/ENGR 2100 Module 6.2 - Diffusion Theory.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleh, - title = {{{ENGR}} 2100 {{Module}} 6.1 - {{Neutron Balance}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486280?module_item_id=5008191}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/FWXDMAAY/ENGR 2100 Module 6.1 - Neutron Balance.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulei, - title = {{{ENGR}} 2100 {{Module}} 7 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486250?module_item_id=5008206}, - urldate = {2024-10-29} -} - -@online{ENGR2100Modulej, - title = {{{ENGR}} 2100 {{Module}} 7.2 - {{Reactivity Coefficients}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486310?module_item_id=5008205}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/UUQC82A7/ENGR 2100 Module 7.2 - Reactivity Coefficients.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulek, - title = {{{ENGR}} 2100 {{Module}} 4 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486268?module_item_id=5008168}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/LKE7M3DS/ENGR 2100 Module 4 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulel, - title = {{{ENGR}} 2100 {{Module}} 4.4 - {{Nuclear Materials}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486263?module_item_id=5008167}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/45PXPH3Y/ENGR 2100 Module 4.4 - Nuclear Materials.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulem, - title = {{{ENGR}} 2100 {{Module}} 4.3 - {{Reactor Types}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486252?module_item_id=5008166}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/HRN2L59G/ENGR 2100 Module 4.3 - Reactor Types.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulen, - title = {{{ENGR}} 2100 {{Module}} 4.2 - {{Fuel Cycle Back End}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486274?module_item_id=5008165}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/F7CZAE7N/ENGR 2100 Module 4.2 - Fuel Cycle Back End.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleo, - title = {{{ENGR}} 2100 {{Module}} 4.1 - {{Intro}} \& {{Fuel Cycle Front End}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486251?module_item_id=5008164}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/F5283757/ENGR 2100 Module 4.1 - Intro & Fuel Cycle Front End.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR.pdf} -} - -@online{ENGR2100Modulep, - title = {{{ENGR}} 2100 {{Module}} 5.2 - {{Neutron Multiplication}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486255?module_item_id=5008178}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/SRXCXH5Y/ENGR 2100 Module 5.2 - Neutron Multiplication.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduleq, - title = {{{ENGR}} 2100 {{Module}} 1 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486233?module_item_id=5008117}, - urldate = {2024-10-29} -} - -@online{ENGR2100Moduler, - title = {{{ENGR}} 2100 {{Module}} 1.3 - {{Decay Radiation}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486195?module_item_id=5008116}, - urldate = {2024-10-29} -} - -@online{ENGR2100Modules, - title = {{{ENGR}} 2100 {{Module}} 1.2 - {{Nuclear Decay}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486243?module_item_id=5008115}, - urldate = {2024-10-29} -} - -@online{ENGR2100Modulet, - title = {{{ENGR}} 2100 {{Module}} 1.1 - {{Fundamental Particles}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486249?module_item_id=5008114}, - urldate = {2024-10-29} -} - -@online{ENGR2100Moduleu, - title = {{{ENGR}} 2100 {{Module}} 2 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486192?module_item_id=5008134}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/FDD69ZAC/ENGR 2100 Module 2 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulev, - title = {{{ENGR}} 2100 {{Module}} 3.1 - {{Radiation Terminology}} and {{Units}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486209?module_item_id=5008145}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/8S3ZW8AQ/ENGR 2100 Module 3.1 - Radiation Terminology and Units.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCL.pdf} -} - -@online{ENGR2100Modulew, - title = {{{ENGR}} 2100 {{Module}} 2.6 - {{Neutron Reactions}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486247?module_item_id=5008133}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/K84ZCZ7D/ENGR 2100 Module 2.6 - Neutron Reactions.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulex, - title = {{{ENGR}} 2100 {{Module}} 2.5 - {{Atom Density}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486207?module_item_id=5008132}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/AYI48LNJ/ENGR 2100 Module 2.5 - Atom Density.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Moduley, - title = {{{ENGR}} 2100 {{Module}} 2.4 - {{Nuclear Fission}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486200?module_item_id=5008131}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/NF6FA8XG/ENGR 2100 Module 2.4 - Nuclear Fission.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - -@online{ENGR2100Modulez, - title = {{{ENGR}} 2100 {{Module}} 2.2 - {{Radiation Interactions}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486199?module_item_id=5008129}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/AGZDPXWJ/ENGR 2100 Module 2.2 - Radiation Interactions.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf} -} - @book{EnhancingEffectivenessTeam2015, title = {Enhancing the {{Effectiveness}} of {{Team Science}}}, date = {2015-07-15}, @@ -3941,24 +2482,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/P8PJ4FTW/2015 - Enhancing the Effectiveness of Team Science.pdf} } -@article{enumitem, - title = {Customizing Lists with the Enumitem Package}, - author = {Bezos, Javier}, - pages = {23}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/N5IWAHJE/Bezos - Customizing lists with the enumitem package.pdf} -} - -@article{erikstadMergingPhysicsBig, - title = {Merging {{Physics}}, {{Big Data Analytics}} and {{Simulation}} for the {{Next-Generation Digital Twins}}}, - author = {Erikstad, Stein Ove}, - pages = {11}, - abstract = {A digital twin is a model capable of rendering the state and behaviour of a unique real asset in (close to) real time. Thus, it offers opportunities beyond the capabilities offered by traditional CAD, CAE and PLM. In this paper, we will lay out the core principles on which digital twins are founded, pointing to its history from engineering analysis and simulation models. Further, we compare a physics-based digital twin solution with artificial intelligence and machine learning. Our proposition is that while the two are fundamentally different in how knowledge and insight is generated, they at the same time offer opportunities for innovative complementary solutions based on big data sensor platforms.}, - langid = {english}, - keywords = {DGC read}, - file = {/home/danesabo/Zotero/storage/HGUPGNGR/Merging physics, big data, and simulations for DTs.pdf} -} - @article{esmaeiliEnhancingDigitalRock2024, title = {Enhancing Digital Rock Analysis through Generative Artificial Intelligence: {{Diffusion}} Models}, shorttitle = {Enhancing Digital Rock Analysis through Generative Artificial Intelligence}, @@ -3984,19 +2507,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/R8V4TI8S/Estefan - 2008 - Survey of Model-Based Systems Engineering (MBSE) M.pdf} } -@report{ETA-report, - title = {Economic Review of Pennsylvania}, - date = {2021-08}, - institution = {Center for Workforce Information \& Analysis} -} - -@online{EVinciMicroreactorWestinghouse, - title = {{{eVinci}}™ {{Microreactor}} | {{Westinghouse Nuclear}}}, - url = {https://westinghousenuclear.com/energy-systems/evinci-microreactor/}, - urldate = {2024-12-10}, - file = {/home/danesabo/Zotero/storage/9S4TABYY/evinci-microreactor.html} -} - @online{ExplainableVerificationSurvey2024, title = {Explainable {{Verification}}: {{Survey}}, {{Situations}}, and {{New Ideas}}}, shorttitle = {Explainable {{Verification}}}, @@ -4009,6 +2519,24 @@ Artificial Intelligence Program.pdf} } @article{fabianPetriNetsControl1994, + title = {Petri {{Nets}} and {{Control Synthesis}}: {{An Object-Oriented Approach}}}, + shorttitle = {Petri {{Nets}} and {{Control Synthesis}}}, + author = {Fabian, M. and Lennartson, B.}, + date = {1994-06}, + journaltitle = {IFAC Proceedings Volumes}, + shortjournal = {IFAC Proceedings Volumes}, + volume = {27}, + number = {4}, + pages = {365--370}, + issn = {14746670}, + doi = {10.1016/S1474-6670(17)46051-4}, + url = {https://linkinghub.elsevier.com/retrieve/pii/S1474667017460514}, + urldate = {2024-02-15}, + langid = {english}, + file = {/home/danesabo/Zotero/storage/LICAU236/Fabian and Lennartson - 1994 - Petri Nets and Control Synthesis An Object-Orient.pdf} +} + +@article{fabianPetriNetsControl1994a, title = {Petri {{Nets}} and {{Control Synthesis}}: {{An Object-Oriented Approach}}}, shorttitle = {Petri {{Nets}} and {{Control Synthesis}}}, author = {Fabian, M. and Lennartson, B.}, @@ -4027,24 +2555,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/JZU3UPC4/S1474667017460514.html} } -@article{fabianPetriNetsControl1994a, - title = {Petri {{Nets}} and {{Control Synthesis}}: {{An Object-Oriented Approach}}}, - shorttitle = {Petri {{Nets}} and {{Control Synthesis}}}, - author = {Fabian, M. and Lennartson, B.}, - date = {1994-06}, - journaltitle = {IFAC Proceedings Volumes}, - shortjournal = {IFAC Proceedings Volumes}, - volume = {27}, - number = {4}, - pages = {365--370}, - issn = {14746670}, - doi = {10.1016/S1474-6670(17)46051-4}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S1474667017460514}, - urldate = {2024-02-15}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/LICAU236/Fabian and Lennartson - 1994 - Petri Nets and Control Synthesis An Object-Orient.pdf} -} - @online{FactSheetONCD2024, title = {Fact {{Sheet}}: {{ONCD Report Calls}} for {{Adoption}} of {{Memory Safe Programming Languages}} and {{Addressing}} the {{Hard Research Problem}} of {{Software Measurability}} | {{ONCD}}}, shorttitle = {Fact {{Sheet}}}, @@ -4093,71 +2603,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/5RSUFEFL/Fan et al. - 2016 - Automatic Reachability Analysis for Nonlinear Hybr.pdf} } -@inproceedings{fanOverviewCybersecurityIndustrial2015, - title = {Overview of Cyber-Security of Industrial Control System}, - booktitle = {2015 {{International Conference}} on {{Cyber Security}} of {{Smart Cities}}, {{Industrial Control System}} and {{Communications}} ({{SSIC}})}, - author = {Fan, Xiaohe and Fan, Kefeng and Wang, Yong and Zhou, Ruikang}, - date = {2015-08}, - pages = {1--7}, - publisher = {IEEE}, - location = {Shanghai, China}, - doi = {10.1109/SSIC.2015.7245324}, - url = {http://ieeexplore.ieee.org/document/7245324/}, - urldate = {2022-09-30}, - abstract = {With the development of information technology, the network connection of industrial control system (ICS) and information technology (IT) is becoming more and more closely. What’s more, the security issues of traditional IT systems in industrial control system are also more prominent. Early industrial control system mainly uses physical isolation approach to protect security. In this paper, we review the characteristics and reference models of industrial control system and analyze the current security status of industrial control system. Moreover, we propose a defense-in-depth system, security policies of active protection and passive monitoring for these security issues. Besides, we also discuss the key technologies and summarize the full text.}, - eventtitle = {2015 {{International Conference}} on {{Cyber Security}} of {{Smart}} Cities, {{Industrial Control System}} and {{Communications}} ({{SSIC}})}, - isbn = {978-1-4673-7977-9}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/E6FISREL/Fan et al. - 2015 - Overview of cyber-security of industrial control s.pdf} -} - -@article{farberRealtimeSupervisoryControl2017, - title = {Real-Time Supervisory Control Implementation of Smahtr Power Plant: 10th {{International Topical Meeting}} on {{Nuclear Plant Instrumentation}}, {{Control}}, and {{Human-Machine Interface Technologies}}, {{NPIC}} and {{HMIT}} 2017}, - shorttitle = {Real-Time Supervisory Control Implementation of Smahtr Power Plant}, - author = {Farber, Jacob A. and Cole, Daniel G.}, - date = {2017}, - journaltitle = {10th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT 2017}, - series = {10th {{International Topical Meeting}} on {{Nuclear Plant Instrumentation}}, {{Control}}, and {{Human-Machine Interface Technologies}}, {{NPIC}} and {{HMIT}} 2017}, - pages = {322--330}, - publisher = {American Nuclear Society}, - url = {http://www.scopus.com/inward/record.url?scp=85047732873&partnerID=8YFLogxK}, - urldate = {2025-01-07}, - abstract = {This paper discusses an implementation of a supervisory control system for a nuclear power plant model using Small modular Advanced High Temperature Reactors (SmAHTR). The simulation operates in real-time using a network of computer agents, implemented on Raspberry Pi's (RPi's), where each major task is performed by one or more RPi's running calculations in parallel. The system architecture contains local, module, master, and operator actions to automate all aspects of the plant. Local level controllers run individual control loops to ensure the desired reference signals are met. The module level controllers set the local level reference signals within each SMR unit and detect sensor and actuator failures to adjust those reference signals as needed. Master level controllers balance plant power by calculating required heat power from each reactor and electric power from each generator and sending that data to the module controllers. Finally, the operator level contains an operator interface to summarize data and faults gathered through the controller levels, with options to review plant and reactor details as desired. This control implementation allows the plant to run autonomously, load follow a desired electrical power curve, and detect a growing number of fault scenarios. Ultimately, this type of supervisory control system will reduce labor-intensive surveillance and testing and allow fewer operators to more safely monitor an entire plant.}, - keywords = {Hardware-in-the-loop,Hierarchical control,SmAHTR,Supervisory control}, - file = {/home/danesabo/Zotero/storage/MY28BEKE/Farber and Cole - 2017 - Real-time supervisory control implementation of smahtr power plant 10th International Topical Meeti.pdf} -} - -@inproceedings{faruqueDesignMethodologiesSecuring2015, - title = {Design Methodologies for Securing Cyber-Physical Systems}, - booktitle = {2015 {{International Conference}} on {{Hardware}}/{{Software Codesign}} and {{System Synthesis}} ({{CODES}}+{{ISSS}})}, - author = {Faruque, Mohammad Al and Regazzoni, Francesco and Pajic, Miroslav}, - date = {2015-10}, - pages = {30--36}, - doi = {10.1109/CODESISSS.2015.7331365}, - url = {https://ieeexplore.ieee.org/abstract/document/7331365}, - urldate = {2023-09-27}, - abstract = {Cyber-Physical Systems (CPS) are in most cases safety- and mission-critical. Standard design techniques used for securing embedded systems are not suitable for CPS due to the restricted computation and communication budget available in the latter. In addition, the sensitivity of sensed data and the presence of actuation components further increase the security requirements of CPS. To address these issues, it is necessary to provide new design methods in which security is considered from the beginning of the whole design flow and addressed in a holistic way. In this paper, we focus on the design of secure CPS as part of the complete CPS design process, and provide insights into new requirements on platform-aware design of control components, design methodologies and architectures posed by CPS design. We start by discussing methods for the multi-disciplinary modeling, simulation, tools, and software synthesis challenges for CPS. We also present a framework for design of secure control systems for CPS, while taking into account properties of the underlying computation and communication platforms. Finally, we describe the security challenges in the computing hardware that is used in CPS.}, - eventtitle = {2015 {{International Conference}} on {{Hardware}}/{{Software Codesign}} and {{System Synthesis}} ({{CODES}}+{{ISSS}})}, - keywords = {design}, - file = {/home/danesabo/Zotero/storage/AIM5XFAM/Faruque et al. - 2015 - Design methodologies for securing cyber-physical s.pdf} -} - -@inproceedings{farzanRobustControlSynthesis2020, - title = {Robust {{Control Synthesis}} and {{Verification}} for {{Wire-Borne Underactuated Brachiating Robots Using Sum-of-Squares Optimization}}}, - booktitle = {2020 {{IEEE}}/{{RSJ International Conference}} on {{Intelligent Robots}} and {{Systems}} ({{IROS}})}, - author = {Farzan, Siavash and Hu, Ai-Ping and Bick, Michael and Rogers, Jonathan}, - date = {2020-10}, - pages = {7744--7751}, - issn = {2153-0866}, - doi = {10.1109/IROS45743.2020.9341348}, - url = {https://ieeexplore.ieee.org/abstract/document/9341348?casa_token=rxbMIqFK310AAAAA:nxVupZ3MZnKxYVgYgu1goGtyknCyfF1LjpKYJUbNs154frxsOCGfetfcXIXJZtHaaV4GplE7yQ}, - urldate = {2024-10-15}, - abstract = {Control of wire-borne underactuated brachiating robots requires a robust feedback control design that can deal with dynamic uncertainties, actuator constraints and unmeasurable states. In this paper, we develop a robust feedback control for brachiating on flexible cables, building on previous work on optimal trajectory generation and time-varying LQR controller design. We propose a novel simplified model for approximation of the flexible cable dynamics, which enables inclusion of parametric model uncertainties in the system. We then use semidefinite programming (SDP) and sum-of-squares (SOS) optimization to synthesize a time-varying feedback control with formal robustness guarantees to account for model uncertainties and unmeasurable states in the system. Through simulation, hardware experiments and comparison with a time-varying LQR controller, it is shown that the proposed robust controller results in relatively large robust backward reachable sets and is able to reliably track a pre-generated optimal trajectory and achieve the desired brachiating motion in the presence of parametric model uncertainties, actuator limits, and unobservable states.}, - eventtitle = {2020 {{IEEE}}/{{RSJ International Conference}} on {{Intelligent Robots}} and {{Systems}} ({{IROS}})}, - keywords = {Actuators,Cable TV,Feedback control,Optimization,Parametric statistics,read,Trajectory,Uncertainty}, - file = {/home/danesabo/Zotero/storage/7WJD7TUD/Farzan et al. - 2020 - Robust Control Synthesis and Verification for Wire-Borne Underactuated Brachiating Robots Using Sum-.pdf;/home/danesabo/Zotero/storage/JGNKK6F7/9341348.html} -} - @article{faselEnsembleSINDyRobustSparse2022, title = {Ensemble-{{SINDy}}: {{Robust}} Sparse Model Discovery in the Low-Data, High-Noise Limit, with Active Learning and Control}, shorttitle = {Ensemble-{{SINDy}}}, @@ -4177,23 +2622,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/GEIIX8KL/Fasel et al. - 2022 - Ensemble-SINDy Robust sparse model discovery in t.pdf} } -@article{fayGaussianProcessModels2017, - title = {Gaussian {{Process}} Models for Ubiquitous User Comfort Preference Sampling; Global Priors, Active Sampling and Outlier Rejection}, - author = {Fay, Damien and O’Toole, Liam and Brown, Kenneth N.}, - date = {2017-08}, - journaltitle = {Pervasive and Mobile Computing}, - shortjournal = {Pervasive and Mobile Computing}, - volume = {39}, - pages = {135--158}, - issn = {15741192}, - doi = {10.1016/j.pmcj.2016.08.012}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S1574119216301651}, - urldate = {2022-04-21}, - abstract = {This paper presents a ubiquitous thermal comfort preference learning study in a noisy environment. We introduce Gaussian Process models into this field and show they are ideal, allowing rejection of outliers, deadband samples, and produce excellent estimates of a users preference function. In addition, informative combinations of users preferences becomes possible, some of which demonstrate well defined maxima ideal for control signals. Interestingly, while those users studied have differing preferences, their hyperparameters are concentrated allowing priors for new users. In addition, we present an active learning algorithm which estimates when to poll users to maximise the information returned.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/6FLNTKD5/Fay et al. - 2017 - Gaussian Process models for ubiquitous user comfor.pdf} -} - @article{FederalCybersecurityResearch2023, title = {Federal {{Cybersecurity Research}} and {{Development Strategic Plan}} (2023)}, date = {2023}, @@ -4222,7 +2650,7 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/3W8M5M5I/Fehnker and Ivančić - 2004 - Benchmarks for Hybrid Systems Verification.pdf} } -@article{felderABCENGINEERINGEDUCATION2004, +@article{felderABCSENGINEERINGEDUCATION2004, title = {{{THE ABC}}’{{S OF ENGINEERING EDUCATION}}: {{ABET}}, {{BLOOM}}’{{S TAXONOMY}}, {{COOPERATIVE LEARNING}}, {{AND SO ON}}}, author = {Felder, Richard M and Brent, Rebecca}, date = {2004}, @@ -4282,26 +2710,21 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/YWCFSEZ9/Ferrante et al. - 1999 - A simple proof of the Routh test.pdf;/home/danesabo/Zotero/storage/7Y7K6BSP/769396.html} } -@article{ferreiraSimulationIndustryStateoftheart2020, - title = {Simulation in Industry 4.0: {{A}} State-of-the-Art Review}, - shorttitle = {Simulation in Industry 4.0}, - author = {Ferreira, William de Paula and Armellini, Fabiano and De Santa-Eulalia, Luis Antonio}, - date = {2020-11}, - journaltitle = {Computers \& Industrial Engineering}, - shortjournal = {Comput. Ind. Eng.}, - volume = {149}, - pages = {106868}, - publisher = {Pergamon-Elsevier Science Ltd}, - location = {Oxford}, - issn = {0360-8352}, - doi = {10.1016/j.cie.2020.106868}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {Simulation is a key technology for developing planning and exploratory models to optimize decision making as well as the design and operations of complex and smart production systems. It could also aid companies to evaluate the risks, costs, implementation barriers, impact on operational performance, and roadmap toward Industry 4.0. Although several advances have been made in this domain, studies that systematically characterize and analyze the development of simulation-based research in Industry 4.0 are scarce. Therefore, this study aims to investigate the state-of-the-art research performed on the intersecting area of simulation and the field of Industry 4.0. Initially, a conceptual framework describing Industry 4.0 in terms of enabling technologies and design principles for modeling and simulation of Industry 4.0 scenarios is proposed. Thereafter, literature on simulation technologies and Industry 4.0 design principles is systematically reviewed using the preferred reporting items for systematic reviews and meta-analyses (PRISMA) methodology. This study reveals an increasing trend in the number of publications on simulation in Industry 4.0 within the last four years. In total, 10 simulation-based approaches and 17 Industry 4.0 design principles were identified. A cross-analysis of concepts and evaluation of models' development suggest that simulation can capture the design principles of Industry 4.0 and support the investigation of the Industry 4.0 phenomenon from different perspectives. Finally, the results of this study indicate hybrid simulation and digital twin as the primary simulation-based approaches in the context of Industry 4.0.}, - langid = {english}, - keywords = {DGC read}, - annotation = {WOS:000582320000073}, - file = {/home/danesabo/Zotero/storage/E3ZU3XVX/Ferreira et al. - 2020 - Simulation in industry 4.0 A state-of-the-art rev.pdf} +@article{ferrariFormalMethodsRailways2022, + title = {Formal {{Methods}} in {{Railways}}: {{A Systematic Mapping Study}}}, + shorttitle = {Formal {{Methods}} in {{Railways}}}, + author = {Ferrari, Alessio and Beek, Maurice H. Ter}, + date = {2022-11-21}, + journaltitle = {ACM Comput. Surv.}, + volume = {55}, + number = {4}, + pages = {69:1--69:37}, + issn = {0360-0300}, + doi = {10.1145/3520480}, + url = {https://dl.acm.org/doi/10.1145/3520480}, + urldate = {2025-03-31}, + abstract = {Formal methods are mathematically based techniques for the rigorous development of software-intensive systems. The railway signaling domain is a field in which formal methods have traditionally been applied, with several success stories. This article reports on a mapping study that surveys the landscape of research on applications of formal methods to the development of railway systems. Following the guidelines of systematic reviews, we identify 328 relevant primary studies, and extract information about their demographics, the characteristics of formal methods used and railway-specific aspects. Our main results are as follows: (i)\ we identify a total of 328 primary studies relevant to our scope published between 1989 and 2020, of which 44\% published during the last 5 years and 24\% involved industry; (ii)\ the majority of studies are evaluated through Examples\ (41\%) and Experience Reports\ (38\%), while full-fledged Case Studies are limited\ (1.5\%); (iii)\ Model checking is the most commonly adopted technique\ (47\%), followed by simulation\ (27\%) and theorem proving\ (19.5\%); (iv)\ the dominant languages are UML\ (18\%) and B\ (15\%), while frequently used tools are ProB\ (9\%), NuSMV\ (8\%), and UPPAAL\ (7\%); however, a diverse landscape of languages and tools is employed; (v)\ the majority of systems are interlocking products\ (40\%), followed by models of high-level control logic\ (27\%); and (vi)\ most of the studies focus on the Architecture\ (66\%) and Detailed Design\ (45\%) development phases. Based on these findings, we highlight current research gaps and expected actions. In particular, the need to focus on more empirically sound research methods, such as Case Studies and Controlled Experiments, and to lower the degree of abstraction, by applying formal methods and tools to development phases that are closer to software development. Our study contributes with an empirically based perspective on the future of research and practice in formal methods applications for railways. It can be used by formal methods researchers to better focus their scientific inquiries, and by railway practitioners for an improved understanding of the interplay between formal methods and their specific application domain.}, + file = {/home/danesabo/Zotero/storage/M4ZFK54A/Ferrari and Beek - 2022 - Formal Methods in Railways A Systematic Mapping Study.pdf} } @article{fischerRemarksMeasureRisk2007, @@ -4341,25 +2764,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/JF5DILLS/Fisher et al. - 2017 - The HACMS program using formal methods to elimina.pdf} } -@article{fisherHACMSProgramUsing2017a, - title = {The {{HACMS}} Program: Using Formal Methods to Eliminate Exploitable Bugs}, - shorttitle = {The {{HACMS}} Program}, - author = {Fisher, Kathleen and Launchbury, John and Richards, Raymond}, - date = {2017-10-13}, - journaltitle = {Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences}, - shortjournal = {Phil. Trans. R. Soc. A.}, - volume = {375}, - number = {2104}, - pages = {20150401}, - issn = {1364-503X, 1471-2962}, - doi = {10.1098/rsta.2015.0401}, - url = {https://royalsocietypublishing.org/doi/10.1098/rsta.2015.0401}, - urldate = {2025-01-22}, - abstract = {For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/RJ2PKUDM/Fisher et al. - 2017 - The HACMS program using formal methods to eliminate exploitable bugs.pdf} -} - @inproceedings{fitzgeraldCyberPhysicalSystemsDesign2015, title = {Cyber-{{Physical Systems Design}}: {{Formal Foundations}}, {{Methods}} and {{Integrated Tool Chains}}}, shorttitle = {Cyber-{{Physical Systems Design}}}, @@ -4379,17 +2783,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/FWTMMHFV/Fitzgerald et al. - 2015 - Cyber-Physical Systems Design Formal Foundations,.pdf} } -@online{five-worst, - title = {The Five Worst Cyberattacks against the Power Industry since 2014}, - date = {2020-04-02T16:59:05+00:00}, - url = {https://www.power-technology.com/features/the-five-worst-cyberattacks-against-the-power-industry-since2014/}, - urldate = {2022-03-22}, - abstract = {Power Technology investigates the five biggest cyberattacks to the power sector that took place in the last five years on a global scale.}, - langid = {american}, - organization = {Power Technology}, - file = {/home/danesabo/Zotero/storage/A99ZAMAK/the-five-worst-cyberattacks-against-the-power-industry-since2014.html} -} - @article{fleischhackerRelationshipEntropyDemand2015, title = {On the Relationship between Entropy, Demand Uncertainty, and Expected Loss}, author = {Fleischhacker, Adam J. and Fok, Pak-Wing}, @@ -4425,32 +2818,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/TS9KYZJ6/Foley et al. - 2021 - Operads for complex system design specification, a.pdf} } -@book{forkishElementsPizzaUnlocking2016, - title = {The {{Elements}} of {{Pizza}}: {{Unlocking}} the {{Secrets}} to {{World-Class Pies}} at {{Home}} [a {{Cookbook}}]}, - shorttitle = {The {{Elements}} of {{Pizza}}}, - author = {Forkish, Ken}, - date = {2016}, - publisher = {Potter/Ten Speed/Harmony/Rodale}, - location = {Erscheinungsort nicht ermittelbar}, - isbn = {978-1-60774-838-0 978-1-60774-839-7}, - langid = {english}, - pagetotal = {1}, - file = {/home/danesabo/Zotero/storage/C4YTLY4T/Forkish - 2016 - The Elements of Pizza Unlocking the Secrets to World-Class Pies at Home [a Cookbook].epub;/home/danesabo/Zotero/storage/HLEWJAN3/The Elements of Pizza.pdf} -} - -@book{forkishFlourWaterSalt2012, - title = {Flour {{Water Salt Yeast}}: {{The Fundamentals}} of {{Artisan Bread}} and {{Pizza}} [a {{Cookbook}}]}, - shorttitle = {Flour {{Water Salt Yeast}}}, - author = {Forkish, Ken}, - date = {2012}, - publisher = {Potter/Ten Speed/Harmony/Rodale}, - location = {Erscheinungsort nicht ermittelbar}, - isbn = {978-1-60774-274-6}, - langid = {english}, - pagetotal = {1}, - file = {/home/danesabo/Zotero/storage/6G8JGPQV/Forkish - 2012 - Flour Water Salt Yeast The Fundamentals of Artisan Bread and Pizza [a Cookbook].epub} -} - @online{FormalMethods, title = {Formal {{Methods}}}, url = {https://users.ece.cmu.edu/~koopman/des_s99/formal_methods/}, @@ -4459,15 +2826,15 @@ Artificial Intelligence Program.pdf} @online{FormalMethodsa, title = {Formal {{Methods}}}, - url = {https://users.ece.cmu.edu/~koopman/des_s99/formal_methods/#:~:text=Formal%20methods%20are%20techniques%20used,thorough%20fashion%20than%20empirical%20testing.}, - organization = {Formal Methods} + url = {https://users.ece.cmu.edu/~koopman/des_s99/formal_methods/}, + urldate = {2024-02-13}, + file = {/home/danesabo/Zotero/storage/2ZSBFVTQ/formal_methods.html} } @online{FormalMethodsb, title = {Formal {{Methods}}}, - url = {https://users.ece.cmu.edu/~koopman/des_s99/formal_methods/}, - urldate = {2024-02-13}, - file = {/home/danesabo/Zotero/storage/2ZSBFVTQ/formal_methods.html} + url = {https://users.ece.cmu.edu/~koopman/des_s99/formal_methods/#:~:text=Formal%20methods%20are%20techniques%20used,thorough%20fashion%20than%20empirical%20testing.}, + organization = {Formal Methods} } @online{FormalMethodsSafetyCritical2023, @@ -4489,57 +2856,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/IUHSL2GV/2014 - Wayback Machine.pdf} } -@book{fradenHandbookModernSensors2016, - title = {Handbook of {{Modern Sensors}}: {{Physics}}, {{Designs}}, and {{Applications}}}, - shorttitle = {Handbook of {{Modern Sensors}}}, - author = {Fraden, Jacob}, - date = {2016}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-319-19303-8}, - url = {https://link.springer.com/10.1007/978-3-319-19303-8}, - urldate = {2025-03-21}, - isbn = {978-3-319-19302-1 978-3-319-19303-8}, - langid = {english}, - keywords = {Accelerometers and Gyroscopes,Acoustic Sensors,Analog to Digital Converters,Chemical Sensors,Flow Sensors,Force Strain and Tactile Sensors,Humidity and Moisture Sensors,Light Detectors Handbook,Measuring Humidity,Meoms Books,Sensor Technology Handbook,Sensor Technology Reference}, - file = {/home/danesabo/Zotero/storage/DRU7VNQH/Fraden - 2016 - Handbook of Modern Sensors Physics, Designs, and Applications.pdf} -} - -@article{frickerProbabilisticUncertaintyAnalysis2011, - title = {Probabilistic Uncertainty Analysis of an {{FRF}} of a Structure Using a {{Gaussian}} Process Emulator}, - author = {Fricker, Thomas E. and Oakley, Jeremy E. and Sims, Neil D. and Worden, Keith}, - date = {2011-11-01}, - journaltitle = {Mechanical Systems and Signal Processing}, - shortjournal = {Mechanical Systems and Signal Processing}, - volume = {25}, - number = {8}, - pages = {2962--2975}, - issn = {0888-3270}, - doi = {10.1016/j.ymssp.2011.06.013}, - url = {https://www.sciencedirect.com/science/article/pii/S0888327011002354}, - urldate = {2022-04-21}, - abstract = {This paper introduces methods for probabilistic uncertainty analysis of a frequency response function (FRF) of a structure obtained via a finite element (FE) model. The methods are applicable to computationally expensive FE models, making use of a Bayesian metamodel known as an emulator. The emulator produces fast predictions of the FE model output, but also accounts for the additional uncertainty induced by only having a limited number of model evaluations. Two approaches to the probabilistic uncertainty analysis of FRFs are developed. The first considers the uncertainty in the response at discrete frequencies, giving pointwise uncertainty intervals. The second considers the uncertainty in an entire FRF across a frequency range, giving an uncertainty envelope function. The methods are demonstrated and compared to alternative approaches in a practical case study.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/P3VYXIIP/Fricker et al. - 2011 - Probabilistic uncertainty analysis of an FRF of a .pdf;/home/danesabo/Zotero/storage/563LVUXA/S0888327011002354.html} -} - -@article{frickTechnoeconomicAssessmentHydrogen2022, - title = {Technoeconomic Assessment of Hydrogen Cogeneration via High Temperature Steam Electrolysis with a Light-Water Reactor}, - author = {Frick, Konor and Wendt, Daniel and Talbot, Paul and Rabiti, Cristian and Boardman, Richard}, - date = {2022-01}, - journaltitle = {Applied Energy}, - shortjournal = {Applied Energy}, - volume = {306}, - pages = {118044}, - issn = {03062619}, - doi = {10.1016/j.apenergy.2021.118044}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0306261921013386}, - urldate = {2022-03-30}, - abstract = {Increased electricity production from renewable energy resources, coupled with low natural gas (NG) prices, has caused existing light-water reactors (LWRs) to experience diminishing returns from the electricity market. This reduction in revenue is forcing LWRs to consider alternative revenue streams, such as introduction hydrogen production or desalination, to remain profitable. This paper performs a technoeconomic assessment (TEA) regarding the viability of retrofitting existing pressurized-water reactors (PWRs) to produce green hydrogen (H2) via high-temperature steam electrolysis (HTSE). Such an integration would allow nuclear facilities to expand into additional markets that may be more profitable in the long term and eliminate CO2 emissions from the hydrogen production process. To accommodate such an integration, a detailed single market levelized cost of hydrogen (LCOH) and multimarket analyses were conducted of HTSE process operation, requirements, costing, and flex­ ibility. Alongside this costing analysis, market analyses were conducted on the electric and hydrogen markets in the PJM interconnect.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/IETRVMNW/Frick et al. - 2022 - Technoeconomic assessment of hydrogen cogeneration.pdf} -} - @book{friedmanLittleTyper2018, title = {The {{Little Typer}}}, author = {Friedman, Daniel P. and Christiansen, David Thrane}, @@ -4548,22 +2864,6 @@ Artificial Intelligence Program.pdf} isbn = {0-262-35100-5} } -@article{fromherzVerifiedEfficientEmbedding2019, - title = {A Verified, Efficient Embedding of a Verifiable Assembly Language}, - author = {Fromherz, Aymeric and Giannarakis, Nick and Hawblitzel, Chris and Parno, Bryan and Rastogi, Aseem and Swamy, Nikhil}, - date = {2019-01-02}, - journaltitle = {Source code for Article: A Verified, Efficient Embedding of A Verifiable Assembly Language}, - shortjournal = {Proc. ACM Program. Lang.}, - volume = {3}, - pages = {63:1--63:30}, - doi = {10.1145/3290376}, - url = {https://dl.acm.org/doi/10.1145/3290376}, - urldate = {2025-02-14}, - abstract = {High-performance cryptographic libraries often mix code written in a high-level language with code written in assembly. To support formally verifying the correctness and security of such hybrid programs, this paper presents an embedding of a subset of x64 assembly language in F* that allows efficient verification of both assembly and its interoperation with C code generated from F*. The key idea is to use the computational power of a dependent type system's type checker to run a verified verification-condition generator during type checking. This allows the embedding to customize the verification condition sent by the type checker to an SMT solver. By combining our proof-by-reflection style with SMT solving, we demonstrate improved automation for proving the correctness of assembly-language code. This approach has allowed us to complete the first-ever proof of correctness of an optimized implementation of AES-GCM, a cryptographic routine used by 90\% of secure Internet traffic.}, - issue = {POPL}, - file = {/home/danesabo/Zotero/storage/JAJSQPC2/Fromherz et al. - 2019 - A verified, efficient embedding of a verifiable assembly language.pdf} -} - @inproceedings{fultonKeYmaeraAxiomaticTactical2015, title = {{{KeYmaera~X}}: {{An Axiomatic Tactical Theorem Prover}} for {{Hybrid Systems}}}, shorttitle = {{{KeYmaera~X}}}, @@ -4635,23 +2935,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/92VUR955/030439759390011H.html} } -@inproceedings{gallois-wongCoqFormalizationDigital2018, - title = {A {{Coq Formalization}} of {{Digital Filters}}}, - booktitle = {Intelligent {{Computer Mathematics}}}, - author = {Gallois-Wong, Diane and Boldo, Sylvie and Hilaire, Thibault}, - editor = {Rabe, Florian and Farmer, William M. and Passmore, Grant O. and Youssef, Abdou}, - date = {2018}, - series = {Lecture {{Notes}} in {{Computer Science}}}, - pages = {87--103}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-319-96812-4_8}, - abstract = {Digital filters are small iterative algorithms, used as basic bricks in signal processing (filters) and control theory (controllers). They receive as input a stream of values, and output another stream of values, computed from their internal state and from the previous inputs. These systems can be found in communication, aeronautics, automotive, robotics, etc. As the application domain may be critical, we aim at providing a formal guarantee of the good behavior of these algorithms in time-domain. In particular, we formally proved in Coq some error analysis theorems about digital filters, namely the Worst-Case Peak Gain theorem and the existence of a filter characterizing the difference between the exact filter and the implemented one. Moreover, the digital signal processing literature provides us with many equivalent algorithms, called realizations. We formally defined and proved the equivalence of several realizations (Direct Forms and State-Space).}, - isbn = {978-3-319-96812-4}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/HWGP7DUB/Gallois-Wong et al. - 2018 - A Coq Formalization of Digital Filters.pdf} -} - @incollection{galvaoFormalVerificationFocused2019, title = {Formal {{Verification}}: {{Focused}} on the {{Verification Using}} a {{Plant Model}}}, shorttitle = {Formal {{Verification}}}, @@ -4728,7 +3011,7 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/ZI3JNAKD/Garcia et al. - 2019 - HyPLC hybrid programmable logic controller progra.pdf} } -@report{garciaREGULATORYEFFORTSCYBER, +@report{garciaUSAREGULATORYEFFORTS, title = {U.{{S}}.{{A}}. {{REGULATORY EFFORTS FOR CYBER SECURITY OF ADVANCED REACTORS}}}, author = {Garcia, I and Jauntirans, J and Rowland, M}, abstract = {Small Modular Reactors / Advanced Reactors (SMR/ARs) are expected to provide safe, secure, and economical power that have the potential to support initiatives aimed at combating climate change. Current proposed SMR/ARs involve diverse technologies that include next generation modular pressurized water reactors, high temperature gas cooled reactors, molten salt reactors, and liquid metal cooled fast reactors. These diverse technologies each have a unique set of functions and systems that support both nuclear safety and security. To address these challenges, the U.S. Nuclear Regulatory Commission (NRC) is moving toward a risk informed, performance based and technology-neutral regulation and associated regulatory guides. The U.S. NRC, supported by cyber security experts from DOE national laboratories and U.S. universities, has undertaken efforts to develop a regulatory guide (RG), to provide an advanced reactor licensee with an acceptable approach for meeting the requirements of the proposed cyber security rule for advanced reactors, 10 CFR 73.110, “Technology neutral requirements for protection of digital computer and communication systems and networks.” The RG aims to provide a process that accounts for the differing risk levels within advanced reactor technologies while providing reasonable assurance of adequate protection of public health and safety and promoting the common defense and security and protecting the environment. As such, a key RG outcome will be to provide the licensee with a risk-informed approach that would allow for the design and implementation of a cyber security program to meet demands for protection against the unacceptable consequences from a cyber attack. The RG is expected to leverage both the outcomes of the safety and security analyses performed for the associated reactor design.}, @@ -4736,46 +3019,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/T8QH76S6/Garcia et al. - U.S.A. REGULATORY EFFORTS FOR CYBER SECURITY OF AD.pdf} } -@article{garnierContinuoustimeModelIdentification2003, - title = {Continuous-Time Model Identification from Sampled Data: {{Implementation}} Issues and Performance Evaluation}, - shorttitle = {Continuous-Time Model Identification from Sampled Data}, - author = {Garnier, H. and Mensler, M. and Richard, A.}, - date = {2003-01}, - journaltitle = {International Journal of Control}, - shortjournal = {International Journal of Control}, - volume = {76}, - number = {13}, - pages = {1337--1357}, - issn = {0020-7179, 1366-5820}, - doi = {10.1080/0020717031000149636}, - url = {http://www.tandfonline.com/doi/abs/10.1080/0020717031000149636}, - urldate = {2024-11-08}, - langid = {english} -} - -@article{gawandSecuringCyberPhysical2017, - title = {Securing a {{Cyber Physical System}} in {{Nuclear Power Plants Using Least Square Approximation}} and {{Computational Geometric Approach}}}, - author = {Gawand, Hemangi Laxman and Bhattacharjee, A.K. and Roy, Kallol}, - date = {2017-04}, - journaltitle = {Nuclear Engineering and Technology}, - shortjournal = {Nuclear Engineering and Technology}, - volume = {49}, - number = {3}, - pages = {484--494}, - issn = {17385733}, - doi = {10.1016/j.net.2016.10.009}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S1738573316302881}, - urldate = {2022-09-30}, - abstract = {In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/KDTTK37C/Gawand et al. - 2017 - Securing a Cyber Physical System in Nuclear Power .pdf} -} - -@misc{GE, - year = {date accessed 03/24/2022}, - url = {https://www.ge.com/digital/applications/digital-twin} -} - @online{GenerativeModelingEstimating, title = {Generative {{Modeling}} by {{Estimating Gradients}} of the {{Data Distribution}} | {{Yang Song}}}, url = {https://yang-song.net/blog/2021/score/}, @@ -4783,65 +3026,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/LXHEU3GU/score.html} } -@article{gengSimplifiedReactorModel2024, - title = {Simplified {{Reactor Model}} for {{Microreactor Coupled}} with {{Helium Closed Brayton Cycle}}}, - author = {Geng, Xuyao and Wang, Jie}, - date = {2024-06-02}, - journaltitle = {Nuclear Technology}, - volume = {210}, - number = {6}, - pages = {941--957}, - publisher = {Taylor \& Francis}, - issn = {0029-5450}, - doi = {10.1080/00295450.2023.2273146}, - url = {https://doi.org/10.1080/00295450.2023.2273146}, - urldate = {2025-01-21}, - abstract = {Microreactors comprise a new actively developing class of very small advanced reactors that have the potential to be an alternative to carbon-intensive energy technologies. A microreactor based on high-temperature gas reactor (HTGR) technology is a very promising advanced reactor with inherent safety, and it can couple with a closed Brayton cycle for higher efficiency. Since dynamics characteristics are fundamental to analyzing a power generation system and a reactor is the main source of the dynamics characteristics of a system, it is necessary to study a microreactor model suitable for system analysis. The main goal is to simulate the performance of the previously mentioned integrated system, focusing on the details of the power conversion unit while still ensuring acceptable calculation times. Hence, a simplified reactor model is needed that could supply sufficiently accurate values of pressure drop and heat transfer across the core. In this paper, by simplifying the physical processes in a microreactor, a dynamic model described by differential algebraic equations is obtained based on the lumped parameter modeling methodology and the basic conservation of fluid mass, momentum, and energy. Coupling thermal hydraulics with neutron kinetics, the temperature coefficient of reactivity and xenon poisoning are considered. Finally, the model is programmed and calculated using Modelica language. The transient responses of the main parameters under typical perturbations are analyzed, and the results show that the responses are correct. Because of the effect of reactivity feedback, fluctuations of the main parameters caused by microperturbations eventually tend to stabilize. In addition, the effects of negative reactivity introduced by xenon poisoning under two typical dynamic processes are analyzed. In power regulation, excess reactivity is required to compensate for the negative reactivity introduced by 135Xe. The model and results can properly predict the systematic parameters and serve as a basis for system analysis of microreactor coupling with the helium closed Brayton cycle.}, - keywords = {microreactor,Modelica language,simplified model,System analysis} -} - -@article{gentonClassesKernelsMachine2001, - title = {Classes of {{Kernels}} for {{Machine Learning}}: {{A Statistics Perspective}}}, - shorttitle = {Classes of {{Kernels}} for {{Machine Learning}}}, - author = {Genton, Marc G.}, - date = {2001}, - journaltitle = {Journal of Machine Learning Research}, - volume = {2}, - pages = {299--312}, - issn = {ISSN 1533-7928}, - url = {https://www.jmlr.org/papers/v2/genton01a}, - urldate = {2022-04-28}, - abstract = {In this paper, we present classes of kernels for machine learning from a statistics perspective. Indeed, kernels are positive definite functions and thus also covariances. After discussing key properties of kernels, as well as a new formula to construct kernels, we present several important classes of kernels: anisotropic stationary kernels, isotropic stationary kernels, compactly supported kernels, locally stationary kernels, nonstationary kernels, and separable nonstationary kernels. Compactly supported kernels and separable nonstationary kernels are of prime interest because they provide a computational reduction for kernel-based methods. We describe the spectral representation of the various classes of kernels and conclude with a discussion on the characterization of nonlinear maps that reduce nonstationary kernels to either stationarity or local stationarity.}, - issue = {Dec}, - file = {/home/danesabo/Zotero/storage/MYQDSLG7/Genton - 2001 - Classes of Kernels for Machine Learning A Statist.pdf} -} - -@misc{geometry, - title = {Geometry {{Package}}}, - file = {/home/danesabo/Zotero/storage/XZDPUFRF/geometry.pdf} -} - -@online{GetAheadCyberattacks, - title = {Get {{Ahead}} of {{Cyberattacks}} with {{Digital Twins}} | {{Accenture}}}, - url = {https://www.accenture.com/us-en/blogs/technology-innovation/klein-engelberg-get-ahead-of-cyberattacks-with-digital-twins}, - urldate = {2022-04-02}, - file = {/home/danesabo/Zotero/storage/4PY7F8J9/klein-engelberg-get-ahead-of-cyberattacks-with-digital-twins.html} -} - -@unpublished{ghasemiBayesianApproachData2016, - title = {A {{Bayesian Approach}} to the {{Data Description Problem}}}, - author = {Ghasemi, Alireza and Rabiee, Hamid R. and Manzuri, Mohammad T. and Rohban, M. H.}, - date = {2016-02-24}, - eprint = {1602.07507}, - eprinttype = {arXiv}, - eprintclass = {cs}, - url = {http://arxiv.org/abs/1602.07507}, - urldate = {2022-04-21}, - abstract = {In this paper, we address the problem of data description using a Bayesian framework. The goal of data description is to draw a boundary around objects of a certain class of interest to discriminate that class from the rest of the feature space. Data description is also known as one-class learning and has a wide range of applications. The proposed approach uses a Bayesian framework to precisely compute the class boundary and therefore can utilize domain information in form of prior knowledge in the framework. It can also operate in the kernel space and therefore recognize arbitrary boundary shapes. Moreover, the proposed method can utilize unlabeled data in order to improve accuracy of discrimination.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/X8NRRRFN/Ghasemi et al. - 2016 - A Bayesian Approach to the Data Description Proble.pdf} -} - @incollection{gheorghiubobaruAutomatedAssumeGuaranteeReasoning2008, title = {Automated {{Assume-Guarantee Reasoning}} by {{Abstraction Refinement}}}, booktitle = {Computer {{Aided Verification}}}, @@ -4877,25 +3061,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/8M6R3PJ9/Gibou et al. - 2018 - A review of level-set methods and some recent appl.pdf;/home/danesabo/Zotero/storage/478XA3J7/S0021999117307441.html} } -@article{giraldoSecurityPrivacyCyberPhysical2017, - title = {Security and {{Privacy}} in {{Cyber-Physical Systems}}: {{A Survey}} of {{Surveys}}}, - shorttitle = {Security and {{Privacy}} in {{Cyber-Physical Systems}}}, - author = {Giraldo, Jairo and Sarkar, Esha and Cardenas, Alvaro A. and Maniatakos, Michail and Kantarcioglu, Murat}, - date = {2017-08}, - journaltitle = {IEEE Design \& Test}, - volume = {34}, - number = {4}, - pages = {7--17}, - issn = {2168-2364}, - doi = {10.1109/MDAT.2017.2709310}, - url = {https://ieeexplore.ieee.org/abstract/document/7935369?casa_token=MOko-Qoz5_sAAAAA:B7aBj7Fcy9X2COxaGpuLurum7X2JnNtLbzWtA-k__zag5Khe9ZoCV5E1klMpSZODmQjsKUM47w}, - urldate = {2023-09-27}, - abstract = {The following is a survey on surveys and may help the interested reader to find a way through the jungle of literature on the security and CPS topics out there already. In order to ease the search, the authors have provided a classification in CPS Domains, Attacks, Defenses, Research-trends, Network-security, Security level implementation, and Computational Strategies which makes this survey a unique and I believe very helpful article.}, - eventtitle = {{{IEEE Design}} \& {{Test}}}, - keywords = {survey}, - file = {/home/danesabo/Zotero/storage/YGVXJWDR/Giraldo et al. - 2017 - Security and Privacy in Cyber-Physical Systems A .pdf} -} - @inproceedings{girardInvariantSetsAssumeGuarantee2022, title = {Invariant {{Sets}} for {{Assume-Guarantee Contracts}}}, booktitle = {2022 {{IEEE}} 61st {{Conference}} on {{Decision}} and {{Control}} ({{CDC}})}, @@ -5039,49 +3204,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/JX7Y48DY/Gonthier et al. - 2016 - A Small Scale Reflection Extension for the Coq sys.pdf} } -@online{goodfellowGenerativeAdversarialNetworks2014, - title = {Generative {{Adversarial Networks}}}, - author = {Goodfellow, Ian J. and Pouget-Abadie, Jean and Mirza, Mehdi and Xu, Bing and Warde-Farley, David and Ozair, Sherjil and Courville, Aaron and Bengio, Yoshua}, - date = {2014-06-10}, - eprint = {1406.2661}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - url = {http://arxiv.org/abs/1406.2661}, - urldate = {2023-10-05}, - abstract = {We propose a new framework for estimating generative models via an adversarial process, in which we simultaneously train two models: a generative model G that captures the data distribution, and a discriminative model D that estimates the probability that a sample came from the training data rather than G. The training procedure for G is to maximize the probability of D making a mistake. This framework corresponds to a minimax two-player game. In the space of arbitrary functions G and D, a unique solution exists, with G recovering the training data distribution and D equal to 1/2 everywhere. In the case where G and D are defined by multilayer perceptrons, the entire system can be trained with backpropagation. There is no need for any Markov chains or unrolled approximate inference networks during either training or generation of samples. Experiments demonstrate the potential of the framework through qualitative and quantitative evaluation of the generated samples.}, - langid = {english}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/9DMPU6MU/Goodfellow et al. - 2014 - Generative Adversarial Networks.pdf} -} - -@online{goodinHowVPNVulnerability2021, - title = {How a {{VPN}} Vulnerability Allowed Ransomware to Disrupt Two Manufacturing Plants}, - author = {Goodin, Dan}, - date = {2021-04-07}, - url = {https://arstechnica.com/information-technology/2021/04/ransomware-shuts-down-production-at-two-manufacturing-plants/}, - urldate = {2022-04-02}, - abstract = {Patching in industrial settings is hard. Ransomware shutting down production is harder.}, - langid = {american}, - organization = {Ars Technica} -} - -@article{goodmanStatisticalAnalysisBased1963, - title = {Statistical {{Analysis Based}} on a {{Certain Multivariate Complex Gaussian Distribution}} ({{An Introduction}})}, - author = {Goodman, N. R.}, - date = {1963-03}, - journaltitle = {The Annals of Mathematical Statistics}, - shortjournal = {Ann. Math. Statist.}, - volume = {34}, - number = {1}, - pages = {152--177}, - issn = {0003-4851}, - doi = {10.1214/aoms/1177704250}, - url = {http://projecteuclid.org/euclid.aoms/1177704250}, - urldate = {2022-04-21}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/ZLIH62PD/Goodman - 1963 - Statistical Analysis Based on a Certain Multivaria.pdf} -} - @inproceedings{goubaultForwardInnerApproximatedReachability2017, title = {Forward {{Inner-Approximated Reachability}} of {{Non-Linear Continuous Systems}}}, booktitle = {Proceedings of the 20th {{International Conference}} on {{Hybrid Systems}}: {{Computation}} and {{Control}}}, @@ -5121,19 +3243,6 @@ Artificial Intelligence Program.pdf} file = {/home/danesabo/Zotero/storage/7TJMJH3J/toc.cryptobook.us.html} } -@book{gramacySurrogatesGaussianProcess2020, - title = {Surrogates: {{Gaussian}} Process Modeling, Design, and Optimization for the Applied Sciences}, - shorttitle = {Surrogates}, - author = {Gramacy, Robert B.}, - date = {2020}, - publisher = {CRC Press, Taylor \& Francis Group}, - location = {Boca Raton}, - abstract = {"Surrogates: a graduate textbook, or professional handbook, on topics at the interface between machine learning, spatial statistics, computer simulation, meta-modeling (i.e., emulation), design of experiments, and optimization. Experimentation through simulation, "human out-of-the-loop" statistical support (focusing on the science), management of dynamic processes, online and real-time analysis, automation, and practical application are at the forefront. Topics include: Gaussian process (GP) regression for flexible nonparametric and nonlinear modeling. Applications to uncertainty quantification, sensitivity analysis, calibration of computer models to field data, sequential design/active learning and (blackbox/Bayesian) optimization under uncertainty. Advanced topics include treed partitioning, local GP approximation, modeling of simulation experiments (e.g., agent-based models) with coupled nonlinear mean and variance (heteroskedastic) models. Treatment appreciates historical response surface methodology (RSM) and canonical examples, but emphasizes contemporary methods and implementation in R at modern scale. Rmarkdown facilitates a fully reproducible tour, complete with motivation from, application to, and illustration with, compelling real-data examples. Presentation targets numerically competent practitioners in engineering, physical, and biological sciences. Writing is statistical in form, but the subjects are not about statistics. Rather, they're about prediction and synthesis under uncertainty; about visualization and information, design and decision making, computing and clean code"--}, - isbn = {978-0-367-81549-3}, - pagetotal = {1}, - file = {/home/danesabo/Zotero/storage/949DZ8QM/surrogates.pdf} -} - @article{grandeAugmentedNeuralLyapunov2023, title = {Augmented {{Neural Lyapunov Control}}}, author = {Grande, Davide and Peruffo, Andrea and Anderlini, Enrico and Salavasidis, Georgios}, @@ -5160,50 +3269,7 @@ Artificial Intelligence Program.pdf} abstract = {A collection of resources for learning type theory and type theory adjacent fields.} } -@article{grayIndustryuniversityProjectsCenters1986, - title = {Industry-University Projects and Centers: {{An}} Empirical Comparison of Two Federally-Funded Models of Cooperative Science}, - author = {Gray, D. O. and Johnson, E. C. and Gidley, T. R.}, - date = {1986}, - journaltitle = {Evaluation Review}, - volume = {10}, - pages = {776--793} -} - -@report{greenePreConceptualDesignFluorideSaltCooled2011, - title = {Pre-{{Conceptual Design}} of a {{Fluoride-Salt-Cooled Small Modular Advanced High Temperature Reactor}} ({{SmAHTR}})}, - author = {Greene, Sherrell R. and Gehin, Jess C. and Holcomb, David Eugene and Carbajo, Juan J. and Ilas, Dan and Cisneros, Anselmo T. and Varma, Venugopal Koikal and Corwin, William R. and Wilson, Dane F. and Yoder, Jr and Qualls, A. L. and Peretz, Fred J. and Flanagan, George F. and Clayton, Dwight A. and Bradley, Eric Craig and Bell, Gary L. and Hunn, John D. and Pappano, Peter J. and Cetiner, Sacit M.}, - date = {2011-02-01}, - number = {ORNL/TM-2010/199}, - institution = {Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)}, - doi = {10.2172/1008830}, - url = {https://www.osti.gov/biblio/1008830}, - urldate = {2025-01-29}, - abstract = {This document presents the results of a study conducted at Oak Ridge National Laboratory during 2010 to explore the feasibility of small modular fluoride salt-cooled high temperature reactors (FHRs). A preliminary reactor system concept, SmATHR (for Small modular Advanced High Temperature Reactor) is described, along with an integrated high-temperature thermal energy storage or salt vault system. The SmAHTR is a 125 MWt, integral primary, liquid salt cooled, coated particle-graphite fueled, low-pressure system operating at 700 C. The system employs passive decay heat removal and two-out-of-three , 50\% capacity, subsystem redundancy for critical functions. The reactor vessel is sufficiently small to be transportable on standard commercial tractor-trailer transport vehicles. Initial transient analyses indicated the transition from normal reactor operations to passive decay heat removal is accomplished in a manner that preserves robust safety margins at all times during the transient. Numerous trade studies and trade-space considerations are discussed, along with the resultant initial system concept. The current concept is not optimized. Work remains to more completely define the overall system with particular emphasis on refining the final fuel/core configuration, salt vault configuration, and integrated system dynamics and safety behavior.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/HXHQI3IJ/Greene et al. - 2011 - Pre-Conceptual Design of a Fluoride-Salt-Cooled Small Modular Advanced High Temperature Reactor (SmA.pdf} -} - -@book{greenLinearRobustControl1995, - title = {Linear Robust Control}, - author = {Green, Michael}, - namea = {Limebeer, David J. N.}, - nameatype = {collaborator}, - date = {1995}, - series = {Prentice {{Hall}} Information and System Sciences Series}, - publisher = {Prentice Hall}, - location = {Englewood Cliffs, N.J}, - langid = {english}, - pagetotal = {xv+538}, - keywords = {Linear control systems,Linear systems} -} - -@misc{GRID-Institute, - author = {{GRID Institute}}, - year = {Date accessed 11/2021}, - url = {http://grid.pitt.edu/} -} - -@thesis{grobelnaGroblena_masterPdf2019, +@thesis{grobelnaGroblena_masterpdf2019, type = {mathesis}, title = {Groblena\_master.Pdf}, author = {Grobelna, Marta}, @@ -5226,7 +3292,7 @@ Protection: Unwrapping the Regulatory Premises.pdf} } -@article{gronlundGronlundWritingInstructional2009, +@article{gronlundGronlundsWritingInstructional2009, title = {Gronlund's Writing Instructional Objectives}, author = {Gronlund, Norman Edward and Brookhart, Susan M.}, date = {2009}, @@ -5241,40 +3307,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/IEXQ4VSQ/Application of a Model-based Fault Detection System to Nuclear Plant Signals .pdf} } -@article{guanDistributedAttackDetection2018, - title = {Distributed {{Attack Detection}} and {{Secure Estimation}} of {{Networked Cyber-Physical Systems Against False Data Injection Attacks}} and {{Jamming Attacks}}}, - author = {Guan, Yanpeng and Ge, Xiaohua}, - date = {2018-03}, - journaltitle = {IEEE Transactions on Signal and Information Processing over Networks}, - volume = {4}, - number = {1}, - pages = {48--59}, - issn = {2373-776X}, - doi = {10.1109/TSIPN.2017.2749959}, - url = {https://ieeexplore.ieee.org/abstract/document/8027127?casa_token=rllSka8MB9EAAAAA:vYDGy1ij41XuemTklUypRHekLdb8acjX_43kZZK_vxStbIOULex18bLWs9nPGjECIzNIQOMosQ}, - urldate = {2023-09-27}, - abstract = {This paper is concerned with the problem of joint distributed attack detection and distributed secure estimation for a networked cyber-physical system under physical and cyber attacks. The system is monitored by a wireless sensor network, in which a group of sensors is spatially distributed and the sensors' measurements are broadcast to remote estimators via a wireless network medium. A malicious adversary simultaneously launches a false data injection attack at the physical system layer to intentionally modify the system's state and jamming attacks at the cyber layer to block the wireless transmission channels between sensors and remote estimators. The sensors' measurements can be randomly dropped with mathematical probability if the corresponding transmission channels are deliberately jammed by the adversary. Resilient attack detection estimators are delicately constructed to provide locally reliable state estimations and detect the false data injection attack. Then, criteria for analyzing the estimation performance and designing the desired estimators are derived to guarantee the solvability of the problem. Finally, the effectiveness of the proposed approach is shown through an illustrative example.}, - eventtitle = {{{IEEE Transactions}} on {{Signal}} and {{Information Processing}} over {{Networks}}}, - file = {/home/danesabo/Zotero/storage/RB4JBYIB/Guan and Ge - 2018 - Distributed Attack Detection and Secure Estimation.pdf} -} - -@article{guanStabilityBasedControllerDesign2021, - title = {Stability-{{Based Controller Design}} of {{Cloud Control System With Uncertainties}}}, - author = {Guan, Shouping and Niu, Senlin}, - date = {2021}, - journaltitle = {IEEE Access}, - shortjournal = {IEEE Access}, - volume = {9}, - pages = {29056--29070}, - issn = {2169-3536}, - doi = {10.1109/ACCESS.2021.3059766}, - url = {https://ieeexplore.ieee.org/document/9354804/}, - urldate = {2022-09-30}, - abstract = {A cloud control system (CCS) is inherently uncertain due to the dynamic services and resources in cloud computing. In this paper, an approach of modeling and controller design for CCS is proposed that considers the uncertainties existing in the controlled plant, network, and controller simultaneously; then, a general framework for modeling and controlling uncertain control systems is constructed. First, a typical CCS structure is presented, and the uncertainties in the CCS are analyzed and decomposed. On this basis, a generalized uncertain state-space model is established, which includes the interval controlled plant and the stochastic network, considering the time-delay and packet loss. Meanwhile, the cloud controller model with interval parameters and stochastic time-delay is designed, which includes the state observer and control law. Then, based on the Lyapunov stability theorem and the linear matrix inequality (LMI) method, a stability criterion for obtaining the parameters of the cloud controller is proposed, in which all the results are expressed in the form of the LMI. Finally, simulation results show the effectiveness and generalization performance of the designed cloud controller.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/EI4QKM6C/Guan and Niu - 2021 - Stability-Based Controller Design of Cloud Control.pdf} -} - @book{guckenheimerNonlinearOscillationsDynamical2013, title = {Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields}, author = {Guckenheimer, John and Holmes, Philip}, @@ -5302,30 +3334,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/YQK398X2/Gu et al. - 2018 - Formal verification of an autonomous wheel loader .pdf} } -@misc{Guide_to_the_Systems_Engineering_Body_of_KnowledgePdf, - title = {Guide\_to\_the\_{{Systems}}\_{{Engineering}}\_{{Body}}\_of\_{{Knowledge}}.Pdf}, - file = {/home/danesabo/Zotero/storage/UD7HE99X/Guide_to_the_Systems_Engineering_Body_of_Knowledge.pdf} -} - -@article{guoDetectionStealthyFalse2022, - title = {Detection of {{Stealthy False Data Injection Attacks Against Cyber-Physical Systems}}: {{A Stochastic Coding Scheme}}}, - shorttitle = {Detection of {{Stealthy False Data Injection Attacks Against Cyber-Physical Systems}}}, - author = {Guo, Haibin and Pang, Zhonghua and Sun, Jian and Li, Jun}, - date = {2022-10-01}, - journaltitle = {Journal of Systems Science and Complexity}, - shortjournal = {J Syst Sci Complex}, - volume = {35}, - number = {5}, - pages = {1668--1684}, - issn = {1559-7067}, - doi = {10.1007/s11424-022-1005-z}, - url = {https://doi.org/10.1007/s11424-022-1005-z}, - urldate = {2023-09-27}, - abstract = {This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection (FDI) attacks that cannot be detected by a residual-based anomaly detector without other defensive measures. To detect such a class of FDI attacks, a stochastic coding scheme, which codes the sensor measurement with a Gaussian stochastic signal at the sensor side, is proposed to assist an anomaly detector to expose the FDI attack. In order to ensure the system performance in the normal operational context, a decoder is adopted to decode the coded sensor measurement when received at the controller side. With this detection scheme, the residual under the attack can be significantly different from that in the normal situation, and thus trigger an alarm. The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate. To minimize the trace of the coding signal covariance, the design problem of the coding signal is converted into a constraint non-convex optimization problem, and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance. A numerical example is given to verify the effectiveness of the proposed scheme.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/LER95QRN/Guo et al. - 2022 - Detection of Stealthy False Data Injection Attacks.pdf} -} - @article{guoNewModelbasedApproach2014, title = {A New Model-Based Approach for Power Plant {{Tube-ball}} Mill Condition Monitoring and Fault Detection}, author = {Guo, Shen and Wang, Jihong and Wei, Jianlin and Zachariades, Paschalis}, @@ -5343,29 +3351,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/4HFL5VK6/Guo et al. - 2014 - A new model-based approach for power plant Tube-ba.pdf} } -@online{HackerTriedPoison, - title = {A Hacker Tried to Poison the Water Supply in {{Oldsmar}}, {{Florida}}, Police Said - {{The Washington Post}}}, - url = {https://www.washingtonpost.com/nation/2021/02/09/oldsmar-water-supply-hack-florida/}, - urldate = {2022-04-02} -} - -@online{HackExposesVulnerability, - title = {Hack Exposes Vulnerability of Cash-Strapped {{US}} Water Plants | {{AP News}}}, - url = {https://apnews.com/article/business-water-utilities-florida-coronavirus-pandemic-utilities-e783b0f1ca2af02f19f5a308d44e6abb}, - urldate = {2022-04-02}, - file = {/home/danesabo/Zotero/storage/X7LUJZM7/business-water-utilities-florida-coronavirus-pandemic-utilities-e783b0f1ca2af02f19f5a308d44e6ab.html} -} - -@online{HackExposesVulnerability2021, - title = {Hack Exposes Vulnerability of Cash-Strapped {{US}} Water Plants}, - date = {2021-04-20T19:47:14Z}, - url = {https://apnews.com/article/business-water-utilities-florida-coronavirus-pandemic-utilities-e783b0f1ca2af02f19f5a308d44e6abb}, - urldate = {2022-04-02}, - abstract = {ST. PETERSBURG, Fla. (AP) — A hacker’s botched attempt to poison the water supply of a small Florida city is raising alarms about just how vulnerable the nation's water systems may be to attacks by more sophisticated intruders...}, - langid = {english}, - organization = {AP NEWS} -} - @article{hadiControlCOVID19System2021, title = {Control of {{COVID-19}} System Using a Novel Nonlinear Robust Control Algorithm}, author = {Hadi, Musadaq A. and Ali, Hazem I.}, @@ -5382,36 +3367,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/7EMIZIQ2/Hadi and Ali - 2021 - Control of COVID-19 system using a novel nonlinear.pdf} } -@article{hadiControlCOVID19System2021a, - title = {Control of {{COVID-19}} System Using a Novel Nonlinear Robust Control Algorithm}, - author = {Hadi, Musadaq A. and Ali, Hazem I.}, - date = {2021-02-01}, - journaltitle = {Biomedical Signal Processing and Control}, - shortjournal = {Biomedical Signal Processing and Control}, - volume = {64}, - pages = {102317}, - issn = {1746-8094}, - doi = {10.1016/j.bspc.2020.102317}, - url = {https://www.sciencedirect.com/science/article/pii/S1746809420304341}, - urldate = {2024-10-01}, - abstract = {COVID-19 has been a worldwide concern since the outbreak. Many strategies have been involved such as suppression and mitigation strategies to deal with this epidemic. In this paper, a new mathematical-engineering strategy is introduced in order to control the COVID-19 epidemic. Thereby, control theory is involved in controlling the unstable epidemic alongside with the other suggested strategies until the vaccine will hopefully be invented as soon as possible. A new robust control algorithm is introduced to compensate the COVID-19 nonlinear system by propose a proper controller after using necessary assumptions and analysis are made. In addition, the Variable Transformation Technique (VTT) is used to simplify the COVID-19 system. Furthermore, the Most Valuable Player Algorithm (MVPA) is applied in order to optimize the parameters of the proposed controller. The simulation results are based on the daily reports of two cities Hubei (China) and Lazio (Italy) since the outbreak. It can be concluded that the proposed control algorithm can effectively compensate the COVID-19 system. In addition, it can be considered as an effective mathematical-engineering strategy to control this epidemic alongside with the other strategies.}, - keywords = {Coronavirus,COVID-19,Most Valuable Player Algorithm,Nonlinear system,Robust control algorithm,Variable Transformation Technique} -} - -@report{hahnAdvancedReactorCyber2023, - title = {Advanced {{Reactor Cyber Analysis}} and {{Development Environment}} ({{ARCADE}}) for {{System-Level Design Analysis}}}, - author = {Hahn, Andrew Stuart and Maccarone, Lee T. and Rowland, Michael Terence}, - date = {2023-09-01}, - number = {SAND-2023-09408}, - institution = {Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)}, - doi = {10.2172/2430308}, - url = {https://www.osti.gov/biblio/2430308}, - urldate = {2025-01-29}, - abstract = {Cybersecurity is a persistent concern to the safety and security of Nuclear Power Plants (NPPs), but has lacked data-driven, evidence-based research. Rigorous cybersecurity analysis is critical for the licensing of advanced reactors using a performance-based approach. One tool that enables cybersecurity analysis is modeling and simulation. The nuclear industry makes extensive use of modeling and simulation throughout the decision process but lacks a method to incorporate cybersecurity analysis with existing models. To meet this need, the Advanced Reactor Cyber Analysis and Development Environment (ARCADE) was developed. ARCADE is a suite of publicly available tools that can be used to develop emulations of industrial control system devices and networks and integrate those emulations with physics simulators. This integration of cyber emulations and physics models enables rigorous cyber-physical analysis of cyber-attacks on NPP systems. This report provides an overview of key considerations for using ARCADE with existing physics models and demonstrates ARCADE’s capabilities for cybersecurity analysis. Using a model of the Small Modular Advanced High Temperature Reactor (SmAHTR), ARCADE was able to determine the sensitivity of the primary heat exchangers (PHX) to coordinated cyber-attacks. The analysis determined that while the PHX’s failures cause disruption to the reactor, they did not cause any safety limits to be exceeded because of the plant design, including passive safety features. Further development of ARCADE will enable rigorous, repeatable, and automated cyber-physical analysis of advanced reactor control systems. These efforts will also help reduce regulatory uncertainty by presenting similar types of cybersecurity analyses in a common format, driving standard approaches and reporting.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/NPKMTWW5/Hahn et al. - 2023 - Advanced Reactor Cyber Analysis and Development Environment (ARCADE) for System-Level Design Analysi.pdf} -} - @article{hahnAUTOMATEDCYBERSECURITY, title = {{{AUTOMATED CYBER SECURITY TESTING PLATFORM FOR INDUSTRIAL CONTROL SYSTEMS}}}, author = {Hahn, Andrew and Sandoval, Daniel R and Fasano, Raymond E and Lamb, Christopher}, @@ -5420,14 +3375,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/TDEZJ6BC/Hahn et al. - AUTOMATED CYBER SECURITY TESTING PLATFORM FOR INDU.pdf} } -@online{hahnSandialabsSMARTTSmall, - title = {Sandialabs/{{SMARTT}}: {{Small Modular Reactor Testing}} and {{Training}}}, - author = {Hahn, A S}, - url = {https://github.com/sandialabs/SMARTT?tab=readme-ov-file}, - urldate = {2025-01-29}, - file = {/home/danesabo/Zotero/storage/XT7ZLFAR/SMARTT.html} -} - @online{hahnSMARTTOT_Emulation_Data_BrokerMain, title = {{{SMARTT}}/{{OT}}\_{{Emulation}}\_{{Data}}\_{{Broker}} at Main · Sandialabs/{{SMARTT}}}, author = {Hahn, A S}, @@ -5453,37 +3400,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/M9EPIB2N/Hailesellasie and Hasan - 2018 - Intrusion Detection in PLC-Based Industrial Contro.pdf} } -@article{hamiltonjr.RobustControllerDesign1997, - title = {Robust {{Controller Design}} and {{Experimental Verification}} of {{I}}.c. {{Engine Speed Control}}}, - author = {Hamilton Jr., G. Kent and Franchek, Matthew A.}, - date = {1997}, - journaltitle = {International Journal of Robust and Nonlinear Control}, - volume = {7}, - number = {6}, - pages = {609--627}, - issn = {1099-1239}, - doi = {10.1002/(SICI)1099-1239(199706)7:6<609::AID-RNC294>3.0.CO;2-1}, - url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/%28SICI%291099-1239%28199706%297%3A6%3C609%3A%3AAID-RNC294%3E3.0.CO%3B2-1}, - urldate = {2024-10-15}, - abstract = {Presented in this paper is the robust idle speed control of a Ford 4⋅6 L V-8 fuel injected engine. The goal of this investigation is to design a robust feedback controller that maintains the idle speed within a 150 rpm tolerance about 600 rpm despite a 20 Nm step torque disturbance delivered by the power steering pump. The controlled input is the by-pass air valve which is subjected to an output saturation constraint. Issues complicating the controller design include the nonlinear nature of the engine dynamics, the induction-to-power delay of the manifold filling dynamics, and the saturation constraint of the by-pass air valve. An experimental verification of the proposed controller is included. © 1997 by John Wiley \& Sons, Ltd.}, - langid = {english}, - keywords = {disturbance rejection,internal combustion engines,robust control}, - file = {/home/danesabo/Zotero/storage/XZLUUDTS/Hamilton Jr. and Franchek - 1997 - Robust Controller Design and Experimental Verification of I.c. Engine Speed Control.pdf} -} - -@report{hancockIncorporationThermalHydraulic2021, - title = {Incorporation of {{Thermal Hydraulic Models}} for {{Thermal Power Dispatch}} into a {{PWR Power Plant Simulator}}}, - author = {Hancock, Stephen G. and Westover, Tyler L. and Luo, Yusheng}, - date = {2021-07-31}, - number = {INL/EXT-21-63226-Rev000}, - institution = {Idaho National Lab. (INL), Idaho Falls, ID (United States)}, - url = {https://www.osti.gov/biblio/1835110}, - urldate = {2022-03-30}, - abstract = {This report describes the development, modeling, and results of a generic pressurized water reactor power plant simulator that incorporates coupled electrical and thermal power dispatch to an industrial process located approximately one kilometer from the nuclear power plant. The simulator is a commercial PWR simulator that has been modified to include thermal power dispatch as described in past milestone reports [ , ]. The commercial PWR simulator is a generic simulator available from GSE SYSTEMS® (Sykesville, MD, USA) that is built using RELAP5-HDTM Real-Time Solution and in-house software developed by GSE Systems. This generic PWR (GPWR) simulator performs real-time simulation of the complete power plant from the reactor neutronics to the electricity generation and distribution. All primary, secondary, and auxiliary systems are modeled including all control logic in order to provide the most accurate representation of actual nuclear power plant (NPP) operation, and the simulator results have been rigorously verified by an actual NPP operating at approximately 1 GWe. This report is a continuation of worked performed in previous years, and supplemental information from previous reports is included in the appendix for reference.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/Q2CKD4KU/Hancock et al. - 2021 - Incorporation of Thermal Hydraulic Models for Ther.pdf;/home/danesabo/Zotero/storage/LWQI27R2/1835110.html} -} - @online{hanDeepLinkEquating2023, title = {The {{Deep Link Equating Math Proofs}} and {{Computer Programs}}}, author = {Han, Sheon}, @@ -5546,24 +3462,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/CN2BHTK4/Haspalamutgıl and Adali - 2017 - Adaptive switching method for Adaptive Cruise Cont.pdf;/home/danesabo/Zotero/storage/349JHJEW/8107024.html} } -@book{hastieElementsStatisticalLearning2009, - title = {The {{Elements}} of {{Statistical Learning Data Mining}}, {{Inference}}, and {{Prediction}}, {{Second Edition}}}, - author = {Hastie, Trevor}, - namea = {Tibshirani, Robert and Friedman, Jerome}, - nameatype = {collaborator}, - date = {2009}, - series = {Springer {{Series}} in {{Statistics}}}, - edition = {2nd ed. 2009.}, - publisher = {Springer New York}, - location = {New York, NY}, - doi = {10.1007/978-0-387-84858-7}, - abstract = {During the past decade there has been an explosion in computation and information technology. With it have come vast amounts of data in a variety of fields such as medicine, biology, finance, and marketing. The challenge of understanding these data has led to the development of new tools in the field of statistics, and spawned new areas such as data mining, machine learning, and bioinformatics. Many of these tools have common underpinnings but are often expressed with different terminology. This book describes the important ideas in these areas in a common conceptual framework. While the approach is statistical, the emphasis is on concepts rather than mathematics. Many examples are given, with a liberal use of color graphics. It is~a valuable resource for statisticians and anyone interested in data mining in science or industry. The book's coverage is broad, from supervised learning (prediction) to unsupervised learning. The many topics include neural networks, support vector machines, classification trees and boosting---the first comprehensive treatment of this topic in any book. This major new edition features many topics not covered in the original, including graphical models, random forests, ensemble methods, least angle regression and path algorithms for the lasso, non-negative matrix factorization, and spectral clustering. There is also a chapter on methods for ``wide'' data (p bigger than n), including multiple testing and false discovery rates. Trevor Hastie, Robert Tibshirani, and Jerome Friedman are professors of statistics at Stanford University. They are prominent researchers in this area: Hastie and Tibshirani developed generalized additive models and wrote a popular book of that title. Hastie co-developed much of the statistical modeling software and environment in R/S-PLUS and invented principal curves and surfaces. Tibshirani proposed the lasso and is co-author of the very successful An Introduction to the Bootstrap. Friedman is the co-inventor of many data-mining tools including CART, MARS, projection pursuit and gradient boosting.}, - isbn = {978-0-387-84858-7}, - langid = {english}, - pagetotal = {757}, - file = {/home/danesabo/Zotero/storage/AFAY94R6/Hastie - 2009 - The Elements of Statistical Learning Data Mining, .pdf} -} - @article{hatcherListRecommendedBooks, title = {A {{List}} of {{Recommended Books}} in {{Topology}}}, author = {Hatcher, Allen}, @@ -5571,7 +3469,7 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/58724NMS/Hatcher - A List of Recommended Books in Topology.pdf} } -@article{hauksdottirProvingRouthTheorem2020, +@article{hauksdottirProvingRouthsTheorem2020, title = {Proving {{Routh}}’s {{Theorem}} Using the {{Euclidean Algorithm}} and {{Cauchy}}’s {{Theorem}}⁎}, author = {Hauksdóttir, Anna Soffía and Sigurðsson, Sven Þ.}, date = {2020-01-01}, @@ -5738,51 +3636,6 @@ Regulatory Premises.pdf} annotation = {Page Version ID: 1184150662} } -@online{hoCascadedDiffusionModels2021, - title = {Cascaded {{Diffusion Models}} for {{High Fidelity Image Generation}}}, - author = {Ho, Jonathan and Saharia, Chitwan and Chan, William and Fleet, David J. and Norouzi, Mohammad and Salimans, Tim}, - date = {2021-12-17}, - eprint = {2106.15282}, - eprinttype = {arXiv}, - eprintclass = {cs}, - doi = {10.48550/arXiv.2106.15282}, - url = {http://arxiv.org/abs/2106.15282}, - urldate = {2023-10-05}, - abstract = {We show that cascaded diffusion models are capable of generating high fidelity images on the class-conditional ImageNet generation benchmark, without any assistance from auxiliary image classifiers to boost sample quality. A cascaded diffusion model comprises a pipeline of multiple diffusion models that generate images of increasing resolution, beginning with a standard diffusion model at the lowest resolution, followed by one or more super-resolution diffusion models that successively upsample the image and add higher resolution details. We find that the sample quality of a cascading pipeline relies crucially on conditioning augmentation, our proposed method of data augmentation of the lower resolution conditioning inputs to the super-resolution models. Our experiments show that conditioning augmentation prevents compounding error during sampling in a cascaded model, helping us to train cascading pipelines achieving FID scores of 1.48 at 64x64, 3.52 at 128x128 and 4.88 at 256x256 resolutions, outperforming BigGAN-deep, and classification accuracy scores of 63.02\% (top-1) and 84.06\% (top-5) at 256x256, outperforming VQ-VAE-2.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/KDKJ8J9B/Ho et al. - 2021 - Cascaded Diffusion Models for High Fidelity Image .pdf;/home/danesabo/Zotero/storage/KEELK7DP/2106.html} -} - -@online{hoClassifierFreeDiffusionGuidance2022, - title = {Classifier-{{Free Diffusion Guidance}}}, - author = {Ho, Jonathan and Salimans, Tim}, - date = {2022-07-25}, - eprint = {2207.12598}, - eprinttype = {arXiv}, - eprintclass = {cs}, - doi = {10.48550/arXiv.2207.12598}, - url = {http://arxiv.org/abs/2207.12598}, - urldate = {2023-10-05}, - abstract = {Classifier guidance is a recently introduced method to trade off mode coverage and sample fidelity in conditional diffusion models post training, in the same spirit as low temperature sampling or truncation in other types of generative models. Classifier guidance combines the score estimate of a diffusion model with the gradient of an image classifier and thereby requires training an image classifier separate from the diffusion model. It also raises the question of whether guidance can be performed without a classifier. We show that guidance can be indeed performed by a pure generative model without such a classifier: in what we call classifier-free guidance, we jointly train a conditional and an unconditional diffusion model, and we combine the resulting conditional and unconditional score estimates to attain a trade-off between sample quality and diversity similar to that obtained using classifier guidance.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/JECHSQTT/Ho and Salimans - 2022 - Classifier-Free Diffusion Guidance.pdf;/home/danesabo/Zotero/storage/VM4L2IMX/2207.html} -} - -@online{hoDenoisingDiffusionProbabilistic2020, - title = {Denoising {{Diffusion Probabilistic Models}}}, - author = {Ho, Jonathan and Jain, Ajay and Abbeel, Pieter}, - date = {2020-12-16}, - eprint = {2006.11239}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - doi = {10.48550/arXiv.2006.11239}, - url = {http://arxiv.org/abs/2006.11239}, - urldate = {2023-10-05}, - abstract = {We present high quality image synthesis results using diffusion probabilistic models, a class of latent variable models inspired by considerations from nonequilibrium thermodynamics. Our best results are obtained by training on a weighted variational bound designed according to a novel connection between diffusion probabilistic models and denoising score matching with Langevin dynamics, and our models naturally admit a progressive lossy decompression scheme that can be interpreted as a generalization of autoregressive decoding. On the unconditional CIFAR10 dataset, we obtain an Inception score of 9.46 and a state-of-the-art FID score of 3.17. On 256x256 LSUN, we obtain sample quality similar to ProgressiveGAN. Our implementation is available at https://github.com/hojonathanho/diffusion}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/RFFVZQ88/Ho et al. - 2020 - Denoising Diffusion Probabilistic Models.pdf;/home/danesabo/Zotero/storage/MMSGEYTW/2006.html} -} - @article{hoElementaryDerivationRouthHurwitz1998, title = {An Elementary Derivation of the {{Routh-Hurwitz}} Criterion}, author = {Ho, Ming-Tzu and Datta, A. and Bhattacharyya, S.P.}, @@ -5800,53 +3653,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/LXDFETQM/Ho et al. - 1998 - An elementary derivation of the Routh-Hurwitz crit.pdf;/home/danesabo/Zotero/storage/2NANUARD/661607.html} } -@article{hoelldoblerInnovationsModelbasedSoftware2019, - title = {Innovations in {{Model-based Software And Systems Engineering}}}, - author = {Hoelldobler, Katrin and Michael, Judith and Ringert, Jan Oliver and Rumpe, Bernhard and Wortmann, Andreas}, - date = {2019-03}, - journaltitle = {JOURNAL OF OBJECT TECHNOLOGY}, - shortjournal = {J. Object Technol.}, - volume = {18}, - number = {1}, - publisher = {Journal Object Technology}, - location = {Zurich}, - issn = {1660-1769}, - doi = {10.5381/jot.2019.18.1.r1}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {Engineering software and software intensive systems has become increasingly complex over the last decades. In the ongoing digitalization of all aspects of our lives in almost every domain, including, e.g., mechanical engineering, electrical engineering, medicine, entertainment, or jurisdiction, software is not only used to enable low-level controls of machines, but also to understand system conditions and optimizations potentials. To remain in control of all these heterogeneous systems of systems, a precise, but abstract understanding of these systems is necessary. To this end, models in their various forms are an important prerequisite to gain this understanding. In this article, we summarize research activities focusing on the development and use of models in software and systems engineering. This research has been carried out by the working group of Bernhard Rumpe, which started 25 years ago in Munich, continued in Braunschweig, and since 10 years carries on at RWTH Aachen University.}, - langid = {english}, - pagetotal = {60}, - annotation = {Web of Science ID: WOS:000473335400001}, - file = {/home/danesabo/Zotero/storage/XKNKBTGT/Hoelldobler et al. - 2019 - Innovations in Model-based Software And Systems En.pdf} -} - -@inproceedings{hosseinzadehActiveAttackDetection2021, - title = {Active {{Attack Detection}} and {{Control}} in {{Constrained Cyber-Physical Systems Under Prevented Actuation Attack}}}, - booktitle = {2021 {{American Control Conference}} ({{ACC}})}, - author = {Hosseinzadeh, Mehdi and Sinopoli, Bruno}, - date = {2021-05}, - pages = {3242--3247}, - issn = {2378-5861}, - doi = {10.23919/ACC50511.2021.9483322}, - url = {https://ieeexplore.ieee.org/abstract/document/9483322?casa_token=etSNFI1RR-UAAAAA:LRARzvbUxXqEaWa7yA7CCYYeeOeo-a6bYbasgkN7hW_KG23z08aFlAHos33wMuccwrqkfmOX9g}, - urldate = {2023-09-27}, - abstract = {This paper proposes an active attack detection scheme for constrained cyber-physical systems. Despite passive approaches where the detection is based on the analysis of the input-output data, active approaches interact with the system by designing the control input so to improve detection. This paper focuses on the prevented actuation attack, where the attacker prevents the exchange of information between the controller and actuators. The proposed scheme consists of two units: 1) detection, and 2) control. The detection unit includes a set of parallel detectors, which are designed based on the multiple-model adaptive estimation approach to detect the attack and to identify the attacked actuator(s). For what regards the control unit, a constrained optimization approach is developed to determine the control input such that the control and detection aims are achieved. In the formulation of the detection and control objective functions, a probabilistic approach is used to reap the benefits of the a priori information availability. The effectiveness of the proposed scheme is demonstrated through a simulation study on an irrigation channel.}, - eventtitle = {2021 {{American Control Conference}} ({{ACC}})}, - keywords = {detection}, - file = {/home/danesabo/Zotero/storage/YJ5PJ47W/Hosseinzadeh and Sinopoli - 2021 - Active Attack Detection and Control in Constrained.pdf} -} - -@inproceedings{HotStandbyState, - title = {Hot {{Standby State Observers}} for {{Sensor Fault-Tolerance}} in {{Small Modular Reactors}} | {{Request PDF}}}, - booktitle = {{{ResearchGate}}}, - url = {https://www.researchgate.net/publication/305489284_Hot_Standby_State_Observers_for_Sensor_Fault-Tolerance_in_Small_Modular_Reactors}, - urldate = {2025-01-29}, - abstract = {Request PDF | On Nov 8, 2015, Christopher Dangelo and others published Hot Standby State Observers for Sensor Fault-Tolerance in Small Modular Reactors | Find, read and cite all the research you need on ResearchGate}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/PTLCFTN8/305489284_Hot_Standby_State_Observers_for_Sensor_Fault-Tolerance_in_Small_Modular_Reactors.html} -} - @book{hristu-varsakelisHandbookNetworkedEmbedded2005, title = {Handbook of Networked and Embedded Control Systems}, author = {Hristu-Varsakelis, Dimitrios and Levine, William S.}, @@ -5868,63 +3674,24 @@ Regulatory Premises.pdf} isbn = {1-4757-3892-7} } -@online{HttpsEnergySandia, +@online{HttpsEnergysandiagovWpcontent, title = {{{https://energy.sandia.gov/wp-content/uploads/2024/01/Maccarone\_DCSA-FY23-M2.pdf}}}, url = {https://energy.sandia.gov/wp-content/uploads/2024/01/Maccarone_DCSA-FY23-M2.pdf}, urldate = {2024-08-08} } -@online{HttpsVbnaaudkWs, - title = {{{https://vbn.aau.dk/ws/portalfiles/portal/140575/fulltext}}}, - url = {https://vbn.aau.dk/ws/portalfiles/portal/140575/fulltext}, - urldate = {2024-10-30}, - file = {/home/danesabo/Zotero/storage/3LAD5CQX/fulltext.pdf} -} - -@online{HttpsWwwinfedacukTeaching, - title = {{{https://www.inf.ed.ac.uk/teaching/courses/seoc/2008\_2009/resources/ariane5.pdf}}}, - url = {https://www.inf.ed.ac.uk/teaching/courses/seoc/2008_2009/resources/ariane5.pdf}, - urldate = {2024-11-11}, - file = {/home/danesabo/Zotero/storage/5HM8P7BE/ariane5.pdf} -} - -@online{HttpsWwwnrcgovDocs, - title = {{{https://www.nrc.gov/docs/ml0929/ml092950511.pdf}}}, - url = {https://www.nrc.gov/docs/ml0929/ml092950511.pdf}, - urldate = {2024-12-10}, - file = {/home/danesabo/Zotero/storage/L5XNSBSG/ml092950511.pdf} -} - -@online{HttpsWwwWhitehouse, +@online{HttpsWwwwhitehousegovWpcontent, title = {{{https://www.whitehouse.gov/wp-content/uploads/2024/02/Final-ONCD-Technical-Report.pdf}}}, url = {https://www.whitehouse.gov/wp-content/uploads/2024/02/Final-ONCD-Technical-Report.pdf}, urldate = {2024-08-14} } -@online{HttpsWwwWhitehousea, +@online{HttpsWwwwhitehousegovWpcontenta, title = {{{https://www.whitehouse.gov/wp-content/uploads/2024/02/Final-ONCD-Technical-Report.pdf}}}, url = {https://www.whitehouse.gov/wp-content/uploads/2024/02/Final-ONCD-Technical-Report.pdf}, urldate = {2024-08-14} } -@article{huangCyberphysicalSystemSecurity2015, - title = {Cyber-Physical System Security for Networked Industrial Processes}, - author = {Huang, Shuang and Zhou, Chun-Jie and Yang, Shuang-Hua and Qin, Yuan-Qing}, - date = {2015-12}, - journaltitle = {International Journal of Automation and Computing}, - shortjournal = {Int. J. Autom. Comput.}, - volume = {12}, - number = {6}, - pages = {567--578}, - issn = {1476-8186, 1751-8520}, - doi = {10.1007/s11633-015-0923-9}, - url = {http://link.springer.com/10.1007/s11633-015-0923-9}, - urldate = {2022-09-30}, - abstract = {Cyber-physical systems (CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology (IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language (AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/24PZINTV/Huang et al. - 2015 - Cyber-physical system security for networked indus.pdf} -} - @article{huangFuzzyModelPredictive2000, title = {Fuzzy Model Predictive Control}, author = {Huang, Y.L. and Lou, H.H. and Gong, J.P. and Edgar, T.F.}, @@ -5971,64 +3738,7 @@ Regulatory Premises.pdf} keywords = {Functional programming (Computer science)} } -@article{huffModelbasedSystemsEngineering2019, - title = {A Model-Based Systems Engineering Approach to Critical Infrastructure Vulnerability Assessment and Decision Analysis}, - author = {Huff, Johnathon and Medal, Hugh and Griendling, Kelly}, - date = {2019-03}, - journaltitle = {SYSTEMS ENGINEERING}, - shortjournal = {Syst. Eng.}, - volume = {22}, - number = {2}, - pages = {114--133}, - publisher = {Wiley}, - location = {Hoboken}, - issn = {1098-1241, 1520-6858}, - doi = {10.1002/sys.21460}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/3}, - urldate = {2023-10-03}, - abstract = {Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model-based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)-based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile.}, - langid = {english}, - pagetotal = {20}, - annotation = {Web of Science ID: WOS:000461577200003} -} - -@article{huldtStateofpracticeSurveyModelbased2019, - title = {State-of-Practice Survey of Model-Based Systems Engineering}, - author = {Huldt, T. and Stenius, I.}, - date = {2019-03}, - journaltitle = {SYSTEMS ENGINEERING}, - shortjournal = {Syst. Eng.}, - volume = {22}, - number = {2}, - pages = {134--145}, - publisher = {Wiley}, - location = {Hoboken}, - issn = {1098-1241, 1520-6858}, - doi = {10.1002/sys.21466}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {This paper aims to examine and document the current state of practice of model-based systems engineering (MBSE), and how organizations look toward the future. The paper is based on a survey of how MBSE has been applied and factors that influenced the perceived benefits and results. The survey was designed to evaluate the maturity and status of the implementation of MBSE (also called model-centric systems engineering), within industry, academia, and governments. The approach to the survey development is described along with the survey results. The study indicates that one of the main hurdles to introducing a model-based approach is the lack of clear and adopted organizational structures and an understanding of required conditions and needs at a management level. The survey also indicates that 50-75\% of the respondents noted some improvement or a significant improvement across almost all systems engineering tasks.}, - langid = {english}, - pagetotal = {12}, - annotation = {Web of Science ID: WOS:000461577200004} -} - -@unpublished{humayedCyberPhysicalSystemsSecurity2017, - title = {Cyber-{{Physical Systems Security}} -- {{A Survey}}}, - author = {Humayed, Abdulmalik and Lin, Jingqiang and Li, Fengjun and Luo, Bo}, - date = {2017-01-16}, - eprint = {1701.04525}, - eprinttype = {arXiv}, - eprintclass = {cs}, - url = {http://arxiv.org/abs/1701.04525}, - urldate = {2022-03-02}, - abstract = {With the exponential growth of cyber-physical systems (CPS), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lack a systematic study of CPS security issues. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it very difficult to study the problem with one generalized model. In this paper, we capture and systematize existing research on CPS security under a unified framework. The framework consists of three orthogonal coordinates: (1) from the security perspective, we follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; (2)from the CPS components perspective, we focus on cyber, physical, and cyber-physical components; and (3) from the CPS systems perspective, we explore general CPS features as well as representative systems (e.g., smart grids, medical CPS and smart cars). The model can be both abstract to show general interactions of a CPS application and specific to capture any details when needed. By doing so, we aim to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components. Such abstract decoupling makes it possible to gain a systematic understanding of CPS security, and to highlight the potential sources of attacks and ways of protection.}, - langid = {english}, - keywords = {DGC read}, - file = {/home/danesabo/Zotero/storage/KLXWDK5I/Humayed et al. - 2017 - Cyber-Physical Systems Security-A Survey.pdf;/home/danesabo/Zotero/storage/X652UMCD/Humayed17.pdf} -} - -@article{humayedCyberPhysicalSystemsSecurity2017a, +@article{humayedCyberPhysicalSystemsSecurity2017, title = {Cyber-{{Physical Systems Security}}—{{A Survey}}}, author = {Humayed, Abdulmalik and Lin, Jingqiang and Li, Fengjun and Luo, Bo}, date = {2017-12}, @@ -6064,11 +3774,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/SYTBDVYV/Hwang and Lee - 2021 - E-SFD Explainable Sensor Fault Detection in the I.pdf} } -@misc{IBM, - year = {date accessed 03/24/2022}, - url = {https://www.ibm.com/topics/what-is-a-digital-twin} -} - @online{IEC6113132013, title = {{{IEC}} 61131-3:2013}, shorttitle = {{{IEC}} 61131-3}, @@ -6085,12 +3790,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/WLYLUPG2/stamp.html} } -@report{IFO-report, - title = {Pennsylvania Electricity Update}, - date = {2022-03}, - institution = {Independent Fiscal Office} -} - @inproceedings{immlerNumericalAnalysisOrdinary2012, title = {Numerical {{Analysis}} of {{Ordinary Differential Equations}} in {{Isabelle}}/{{HOL}}}, booktitle = {Interactive {{Theorem Proving}}}, @@ -6116,26 +3815,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/YXH6RCU8/An Impossible Asylum.pdf;/home/danesabo/Zotero/storage/XSLV4JNS/00029890.2023.html} } -@article{inghamSpecialIssueModelbased2019, - title = {Special Issue on Model-Based Systems Engineering}, - author = {Ingham, Michel D.}, - date = {2019-03}, - journaltitle = {SYSTEMS ENGINEERING}, - shortjournal = {Syst. Eng.}, - volume = {22}, - number = {2}, - pages = {97--97}, - publisher = {Wiley}, - location = {Hoboken}, - issn = {1098-1241, 1520-6858}, - doi = {10.1002/sys.21483}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - langid = {english}, - pagetotal = {1}, - annotation = {Web of Science ID: WOS:000461577200001} -} - @book{instituteofelectricalandelectronicsengineers2014IEEE53rd2014, title = {2014 {{IEEE}} 53rd {{Annual Conference}} on {{Decision}} and {{Control}} ({{CDC}} 2014): {{Los Angeles}}, {{California}}, {{USA}}, 15 - 17 {{December}} 2014}, shorttitle = {2014 {{IEEE}} 53rd {{Annual Conference}} on {{Decision}} and {{Control}} ({{CDC}} 2014)}, @@ -6166,17 +3845,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/QGRVUY42/j.1538-7305.1970.tb01763.html} } -@book{international2007iaea, - title = {Assessment and Management of Ageing of Major Nuclear Power Plant Components Important to Safety: {{PWR}} Vessel Internals}, - date = {2007}, - series = {{{TECDOC}} Series}, - number = {1557}, - publisher = {INTERNATIONAL ATOMIC ENERGY AGENCY}, - location = {Vienna}, - url = {https://www.iaea.org/publications/7740/assessment-and-management-of-ageing-of-major-nuclear-power-plant-components-important-to-safety-pwr-vessel-internals}, - isbn = {978-92-0-105107-3} -} - @online{IntroductionDiffusionModels2022, title = {Introduction to {{Diffusion Models}} for {{Machine Learning}}}, date = {2022-05-12T15:19:03}, @@ -6188,16 +3856,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/YRRXJPJQ/diffusion-models-for-machine-learning-introduction.html} } -@online{IntroductionModelBasedSystems2020, - title = {An {{Introduction}} to {{Model-Based Systems Engineering}} ({{MBSE}})}, - date = {2020-12-21}, - url = {https://insights.sei.cmu.edu/blog/introduction-model-based-systems-engineering-mbse/}, - urldate = {2023-10-06}, - abstract = {Model-based systems engineering (MBSE) is a formalized methodology that is used to support the requirements, design, analysis, verification, and validation associated with the development of complex systems. In this blog post, I provide a brief introduction to MBSE.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/EQGZXJYS/introduction-model-based-systems-engineering-mbse.html} -} - @article{ioannouAutonomousIntelligentCruise1993, title = {Autonomous Intelligent Cruise Control}, author = {Ioannou, P.A. and Chien, C.C.}, @@ -6234,33 +3892,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/VQYZ7YWF/isa-iec-62443-series-of-standards.html} } -@online{ISAIEC62443a, - title = {{{ISA}}/{{IEC}} 62443 {{Series}} of {{Standards}} - {{ISA}}}, - url = {https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards}, - urldate = {2023-10-03}, - abstract = {These standards set best practices for cybersecurity and provide a way to assess the level of security performance.}, - langid = {english}, - organization = {isa.org} -} - -@misc{IT-def, - date = {2021} -} - -@report{jacksonMARVELReactivityControl2023, - title = {{{MARVEL Reactivity Control System}} ({{RCS}})}, - author = {Jackson, John Howard}, - date = {2023-10-03}, - number = {INL/RPT-24-77818; TFR-2578}, - institution = {Idaho National Laboratory (INL), Idaho Falls, ID (United States)}, - doi = {10.2172/2346136}, - url = {https://www.osti.gov/biblio/2346136}, - urldate = {2025-03-13}, - abstract = {MARVEL plans to be the first new operational reactor at INL in many years. These documents are being made publicly available to disseminate key information on the MARVEL reactor for private sector use towards reactor development.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/J47ZWPVQ/Jackson - 2023 - MARVEL Reactivity Control System (RCS).pdf} -} - @inproceedings{jackyPyModelModelbasedTesting2011, title = {{{PyModel}}: {{Model-based}} Testing in {{Python}}}, shorttitle = {{{PyModel}}}, @@ -6295,18 +3926,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/IIZ4QAYT/Jagvaral et al. - 2024 - Unified Framework for Diffusion Generative Models .pdf} } -@inproceedings{jasimFormalProofsFeedback2017, - title = {Towards Formal Proofs of Feedback Control Theory}, - booktitle = {2017 21st {{International Conference}} on {{System Theory}}, {{Control}} and {{Computing}} ({{ICSTCC}})}, - author = {Jasim, Omar A. and Veres, Sandor M.}, - date = {2017-10}, - pages = {43--48}, - doi = {10.1109/ICSTCC.2017.8107009}, - abstract = {Control theory can establish properties of systems which hold with all signals within the system and hence cannot be proven by simulation. The most basic of such property is the stability of a control subsystem or the overall system. Other examples are statements on robust control performance in the face of dynamical uncertainties and disturbances in sensing and actuation. Until now these theories were developed and checked for their correctness by control scientist manually using their mathematical knowledge. With the emergence of formal methods, there is now the possibility to derive and prove robust control theory by symbolic computation on computers. There is a demand for this approach from industry for the verification of practical control systems with concrete numerical values where the applicability of a control theorem is specialised to an application with given numerical boundaries of parameter variations. The paper gives an overview of the challenges of the area and illustrates them on a computer-based formal proof of the Small-gain theorem and conclusions are drawn from these initial experiences.}, - eventtitle = {2017 21st {{International Conference}} on {{System Theory}}, {{Control}} and {{Computing}} ({{ICSTCC}})}, - file = {/home/danesabo/Zotero/storage/QHPSTMRE/Jasim and Veres - 2017 - Towards formal proofs of feedback control theory.pdf;/home/danesabo/Zotero/storage/H7EQGGX9/8107009.html} -} - @article{jenkinsUseResidueNumber1977, title = {The Use of Residue Number Systems in the Design of Finite Impulse Response Digital Filters}, author = {Jenkins, W. and Leon, B.}, @@ -6324,28 +3943,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/QXLHCVRK/Jenkins and Leon - 1977 - The use of residue number systems in the design of.pdf;/home/danesabo/Zotero/storage/4LS9LL59/1084321.html} } -@article{jiangIndustrialApplicationsDigital2021, - title = {Industrial Applications of Digital Twins}, - author = {Jiang, Yuchen and Yin, Shen and Li, Kuan and Luo, Hao and Kaynak, Okyay}, - date = {2021-10-04}, - journaltitle = {Philosophical Transactions of the Royal Society a-Mathematical Physical and Engineering Sciences}, - shortjournal = {Philos. Trans. R. Soc. A-Math. Phys. Eng. Sci.}, - volume = {379}, - number = {2207}, - pages = {20200360}, - publisher = {Royal Soc}, - location = {London}, - issn = {1364-503X}, - doi = {10.1098/rsta.2020.0360}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {A digital twin (DT) is classically defined as the virtual replica of a real-world product, system, being, communities, even cities that are continuously updated with data from its physical counterpart, as well as its environment. It bridges the virtual cyberspace with the physical entities and, as such, is considered to be the pillar of Industry 4.0 and the innovation backbone of the future. A DT is created and used throughout the whole life cycle of the entity it replicates, from cradle to grave, so to speak. This article focuses on the present state of the art of DTs, concentrating on the use of DTs in industry in the context of smart manufacturing, especially from the point of view of plantwide optimization. The main capabilities of DTs (mirroring, shadowing and threading) are discussed in this context. The article concludes with a perspective on the future. This article is part of the theme issue 'Towards symbiotic autonomous systems'.}, - langid = {english}, - keywords = {maybe}, - annotation = {WOS:000685707500016}, - file = {/home/danesabo/Zotero/storage/ABXW4VHP/Jiang et al. - 2021 - Industrial applications of digital twins.pdf} -} - @inproceedings{jinModelingPROFINETActions2015, title = {Modeling \{\vphantom\}{{PROFINET}}\vphantom\{\} Actions with Timing Pi-Calculus}, booktitle = {First {{International Conference}} on {{Information Sciences}}, {{Machinery}}, {{Materials}} and {{Energy}}}, @@ -6380,44 +3977,6 @@ Regulatory Premises.pdf} isbn = {978-1-4673-6090-6 978-1-4799-7746-8 978-1-4799-7745-1} } -@article{juarezDigitalTwinsReview2021, - title = {Digital {{Twins}}: {{Review}} and {{Challenges}}}, - shorttitle = {Digital {{Twins}}}, - author = {Juarez, Maria G. and Botti, Vicente J. and Giret, Adriana S.}, - date = {2021-06-01}, - journaltitle = {Journal of Computing and Information Science in Engineering}, - shortjournal = {J. Comput. Inf. Sci. Eng.}, - volume = {21}, - number = {3}, - pages = {030802}, - publisher = {Asme}, - location = {New York}, - issn = {1530-9827}, - doi = {10.1115/1.4050244}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {With the arises of Industry 4.0, numerous concepts have emerged; one of the main concepts is the digital twin (DT). DT is being widely used nowadays, however, as there are several uses in the existing literature; the understanding of the concept and its functioning can be diffuse. The main goal of this paper is to provide a review of the existing literature to clarify the concept, operation, and main characteristics of DT, to introduce the most current operating, communication, and usage trends related to this technology, and to present the performance of the synergy between DT and multi-agent system (MAS) technologies through a computer science approach.}, - langid = {english}, - keywords = {DGC read,key}, - annotation = {WOS:000651510900012}, - file = {/home/danesabo/Zotero/storage/2UI8QV8E/Juarez et al. - 2021 - Digital Twins Review and Challenges.pdf} -} - -@article{julierUnscentedFilteringNonlinear2004, - title = {Unscented {{Filtering}} and {{Nonlinear Estimation}}}, - author = {Julier, S.J. and Uhlmann, J.K.}, - date = {2004}, - journaltitle = {Proceedings of the IEEE}, - shortjournal = {Proceedings of the IEEE}, - volume = {92}, - number = {3}, - pages = {401--422}, - publisher = {{Institute of Electrical and Electronics Engineers (IEEE)}}, - issn = {0018-9219}, - doi = {10.1109/jproc.2003.823141}, - url = {https://dx.doi.org/10.1109/jproc.2003.823141} -} - @article{jyotishPerformanceMeasurementSafetycritical2023, title = {Performance Measurement of Safety-Critical Systems Based on Ordinary Differential Equations and {{Petri}} Nets: {{A}} Case Study of Nuclear Power Plant}, shorttitle = {Performance Measurement of Safety-Critical Systems Based on Ordinary Differential Equations and {{Petri}} Nets}, @@ -6437,21 +3996,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/QIQWIAJ6/Jyotish et al. - 2023 - Performance measurement of safety-critical systems.pdf} } -@article{kabirNeuralNetworkBasedUncertainty2018, - title = {Neural {{Network-Based Uncertainty Quantification}}: {{A Survey}} of {{Methodologies}} and {{Applications}}}, - shorttitle = {Neural {{Network-Based Uncertainty Quantification}}}, - author = {Kabir, H. M. Dipu and Khosravi, Abbas and Hosen, Mohammad Anwar and Nahavandi, Saeid}, - date = {2018}, - journaltitle = {IEEE Access}, - volume = {6}, - pages = {36218--36234}, - issn = {2169-3536}, - doi = {10.1109/ACCESS.2018.2836917}, - abstract = {Uncertainty quantification plays a critical role in the process of decision making and optimization in many fields of science and engineering. The field has gained an overwhelming attention among researchers in recent years resulting in an arsenal of different methods. Probabilistic forecasting and in particular prediction intervals (PIs) are one of the techniques most widely used in the literature for uncertainty quantification. Researchers have reported studies of uncertainty quantification in critical applications such as medical diagnostics, bioinformatics, renewable energies, and power grids. The purpose of this survey paper is to comprehensively study neural network-based methods for construction of prediction intervals. It will cover how PIs are constructed, optimized, and applied for decision-making in presence of uncertainties. Also, different criteria for unbiased PI evaluation are investigated. The paper also provides some guidelines for further research in the field of neural network-based uncertainty quantification.}, - eventtitle = {{{IEEE Access}}}, - file = {/home/danesabo/Zotero/storage/EA8FH385/Kabir et al. - 2018 - Neural Network-Based Uncertainty Quantification A.pdf} -} - @article{kamwaBuzzwordSolutionsDigital2024, title = {From {{Buzzword To Solutions}}: {{Digital Twins}} in {{Power Systems}} [{{Editor}}’s {{Voice}}]}, shorttitle = {From {{Buzzword To Solutions}}}, @@ -6537,40 +4081,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/82RCGKD8/Karatzas and Chassiakos - 2020 - System-Theoretic Process Analysis (STPA) for Hazar.pdf} } -@book{karimipourSecurityCyberPhysicalSystems2020, - title = {Security of {{Cyber-Physical Systems}}: {{Vulnerability}} and {{Impact}}}, - shorttitle = {Security of {{Cyber-Physical Systems}}}, - editor = {Karimipour, Hadis and Srikantha, Pirathayini and Farag, Hany and Wei-Kocsis, Jin}, - date = {2020}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-030-45541-5}, - url = {http://link.springer.com/10.1007/978-3-030-45541-5}, - urldate = {2023-09-27}, - isbn = {978-3-030-45540-8 978-3-030-45541-5}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/YGY8BYUJ/Karimipour et al. - 2020 - Security of Cyber-Physical Systems Vulnerability .pdf} -} - -@article{kayanCybersecurityIndustrialCyberPhysical2022, - title = {Cybersecurity of {{Industrial Cyber-Physical Systems}}: {{A Review}}}, - shorttitle = {Cybersecurity of {{Industrial Cyber-Physical Systems}}}, - author = {Kayan, Hakan and Nunes, Matthew and Rana, Omer and Burnap, Pete and Perera, Charith}, - date = {2022-01-31}, - journaltitle = {ACM Computing Surveys}, - shortjournal = {ACM Comput. Surv.}, - volume = {54}, - pages = {1--35}, - issn = {0360-0300, 1557-7341}, - doi = {10.1145/3510410}, - url = {https://dl.acm.org/doi/10.1145/3510410}, - urldate = {2022-09-30}, - abstract = {Industrial cyber-physical systems ( ICPSs ) manage critical infrastructures by controlling the processes based on the “physics” data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the “security by obscurity” principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessment reports have shown that a variety of new vulnerabilities have occurred due to this transition. Although there are existing surveys in this context, very little is mentioned regarding the outputs of these reports. While these reports show that the most exploited vulnerabilities occur due to weak boundary protection, these vulnerabilities also occur due to limited or ill-defined security policies. However, current literature focuses on intrusion detection systems ( IDSs ), network traffic analysis ( NTA ) methods, or anomaly detection techniques. Hence, finding a solution for the problems mentioned in these reports is relatively hard. We bridge this gap by defining and reviewing ICPSs from a cybersecurity perspective. In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents. Finally, we identify the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions.}, - issue = {11s}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/D45MW8IV/Kayan et al. - 2022 - Cybersecurity of Industrial Cyber-Physical Systems.pdf} -} - @article{kaysDigitalTwinNew2024, title = {The Digital Twin: {{New}} Species, Evolution, or Revolution? [{{In}} My View]}, shorttitle = {The Digital Twin}, @@ -6589,24 +4099,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/TMGV4GSA/Kays - 2024 - The digital twin New species, evolution, or revol.pdf;/home/danesabo/Zotero/storage/BV39AE4U/10398573.html} } -@article{kemmlerOneclassClassificationGaussian2013, - title = {One-Class Classification with {{Gaussian}} Processes}, - author = {Kemmler, Michael and Rodner, Erik and Wacker, Esther-Sabrina and Denzler, Joachim}, - date = {2013-12}, - journaltitle = {Pattern Recognition}, - shortjournal = {Pattern Recognition}, - volume = {46}, - number = {12}, - pages = {3507--3518}, - issn = {00313203}, - doi = {10.1016/j.patcog.2013.06.005}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0031320313002574}, - urldate = {2022-04-21}, - abstract = {Detecting instances of unknown categories is an important task for a multitude of problems such as object recognition, event detection, and defect localization. This article investigates the use of Gaussian process (GP) priors for this area of research. Focusing on the task of one-class classification, we analyze different measures derived from GP regression and approximate GP classification. We also study important theoretical connections to other approaches and discuss their underlying assumptions. Experiments are performed using a large number of datasets and different image kernel functions. Our findings show that our approaches can outperform the well-known support vector data description approach indicating the high potential of Gaussian processes for one-class classification. Furthermore, we show the suitability of our methods in the area of attribute prediction, defect localization, bacteria recognition, and background subtraction. These applications and experiments highlight the easy applicability of our method as well as its state-of-the-art performance compared to established methods. \& 2013 Elsevier Ltd. All rights reserved.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/FFDXNVSK/Kemmler et al. - 2013 - One-class classification with Gaussian processes.pdf} -} - @article{kennedyBayesianCalibrationComputer2001, title = {Bayesian {{Calibration}} of {{Computer Models}}}, author = {Kennedy, Marc C. and O'Hagan, Anthony}, @@ -6642,63 +4134,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/ZE4R2AF4/Kern and Greenstreet - 1999 - Formal verification in hardware design a survey.pdf} } -@incollection{khalidOverviewSecuritySmart2020, - title = {Overview of {{Security}} for {{Smart Cyber-Physical Systems}}}, - booktitle = {Security of {{Cyber-Physical Systems}}: {{Vulnerability}} and {{Impact}}}, - author = {Khalid, Faiq and Rehman, Semeen and Shafique, Muhammad}, - editor = {Karimipour, Hadis and Srikantha, Pirathayini and Farag, Hany and Wei-Kocsis, Jin}, - date = {2020}, - pages = {5--24}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-030-45541-5_2}, - url = {https://doi.org/10.1007/978-3-030-45541-5_2}, - urldate = {2023-09-27}, - abstract = {The tremendous growth of interconnectivity and dependencies of physical and cyber domains in cyber-physical systems (CPS) makes them vulnerable to several security threats like remote cyber-attacks, hardware, and software-based side-channel attacks, especially in safety-critical applications, i.e., healthcare, autonomous driving, etc. Though traditional software or hardware security measures can address these attacks in the respective domains due to enormous data and interdependencies of the physical-world and cyber-world, these techniques cannot be used directly. Therefore, to address these challenges, machine learning-based security measures have been proposed. This chapter first presents a brief overview of various security threats at different CPS layers, their respective threat models, and associated research challenges towards developing robust security measures. Towards the end, we briefly discuss and present a preliminary analysis of the state-of-the-art online anomaly detection techniques that leverage the machine learning algorithms and property-specific language, respectively.}, - isbn = {978-3-030-45541-5}, - langid = {english}, - keywords = {survey}, - file = {/home/danesabo/Zotero/storage/DDTJ7GSV/Khalid et al. - 2020 - Overview of Security for Smart Cyber-Physical Syst.pdf} -} - -@article{khanIDEAIntrusionDetection2021, - title = {{{IDEA}}: {{Intrusion Detection}} through {{Electromagnetic-Signal Analysis}} for {{Critical Embedded}} and {{Cyber-Physical Systems}}}, - shorttitle = {{{IDEA}}}, - author = {Khan, Haider Adnan and Sehatbakhsh, Nader and Nguyen, Luong N. and Callan, Robert L. and Yeredor, Arie and Prvulovic, Milos and Zajić, Alenka}, - date = {2021-05}, - journaltitle = {IEEE Transactions on Dependable and Secure Computing}, - volume = {18}, - number = {3}, - pages = {1150--1163}, - issn = {1941-0018}, - doi = {10.1109/TDSC.2019.2932736}, - url = {https://ieeexplore.ieee.org/abstract/document/8786207?casa_token=QhKm6TQJknAAAAAA:mnt3qtOGbc0DatEXNTOzKkA5HfPk4JctZOjFAx2mF5xcuEsJFY4E3-vQ6-3maSAsIAsfG9il2Q}, - urldate = {2023-09-27}, - abstract = {We propose a novel framework called IDEA that exploits electromagnetic (EM) side-channel signals to detect malicious activity on embedded and cyber-physical systems (CPS). IDEA first records EM emanations from an uncompromised reference device to establish a baseline of reference EM patterns. IDEA then monitors the target device's EM emanations. When the observed EM emanations deviate from the reference patterns, IDEA reports this as an anomalous or malicious activity. IDEA does not require any resource or infrastructure on, or any modification to, the monitored system itself. In fact, IDEA is isolated from the target device, and monitors the device without any physical contact. We evaluate IDEA by monitoring the target device while it is executing embedded applications with malicious code injections such as Distributed Denial of Service (DDoS), Ransomware and code modification. We further implement a control-flow hijack attack, an advanced persistent threat, and a firmware modification on three CPSs: an embedded medical device called SyringePump, an industrial Proportional-Integral-Derivative (PID) Controller, and a Robotic Arm, using a popular embedded system, Arduino UNO. The results demonstrate that IDEA can detect different attacks with excellent accuracy (AUC {$>$} 99.5\%, and 100 percent detection with less than 1 percent false positives) from distances up to 3 m.}, - eventtitle = {{{IEEE Transactions}} on {{Dependable}} and {{Secure Computing}}}, - file = {/home/danesabo/Zotero/storage/EEM9BV5D/Khan et al. - 2021 - IDEA Intrusion Detection through Electromagnetic-.pdf} -} - -@article{khanRequirementsDigitalTwindriven2020, - title = {On the Requirements of Digital Twin-Driven Autonomous Maintenance}, - author = {Khan, Samir and Farnsworth, Michael and McWilliam, Richard and Erkoyuncu, John}, - date = {2020}, - journaltitle = {Annual Reviews in Control}, - shortjournal = {Annu. Rev. Control}, - volume = {50}, - pages = {13--28}, - publisher = {Pergamon-Elsevier Science Ltd}, - location = {Oxford}, - issn = {1367-5788}, - doi = {10.1016/j.arcontrol.2020.08.003}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {Autonomy has become a focal point for research and development in many industries. Whilst this was traditionally achieved by modelling self-engineering behaviours at the component-level, efforts are now being focused on the sub-system and system-level through advancements in artificial intelligence. Exploiting its benefits requires some innovative thinking to integrate overarching concepts from big data analysis, digitisation, sensing, optimisation, information technology, and systems engineering. With recent developments in Industry 4.0, machine learning and digital twin, there has been a growing interest in adapting these concepts to achieve autonomous maintenance; the automation of predictive maintenance scheduling directly from operational data and for in-built repair at the systems-level. However, there is still ambiguity whether state-of-the-art developments are truly autonomous or they simply automate a process. In light of this, it is important to present the current perspectives about where the technology stands today and indicate possible routes for the future. As a result, this effort focuses on recent trends in autonomous maintenance before moving on to discuss digital twin as a vehicle for decision making from the viewpoint of requirements, whilst the role of AI in assisting with this process is also explored. A suggested framework for integrating digital twin strategies within maintenance models is also discussed. Finally, the article looks towards future directions on the likely evolution and implications for its development as a sustainable technology.}, - langid = {english}, - annotation = {WOS:000600551200002}, - file = {/home/danesabo/Zotero/storage/NPQ338UH/Khan et al. - 2020 - On the requirements of digital twin-driven autonom.pdf} -} - @article{khattakReviewCyberSecurity2017, title = {Review of Cyber Security Applications in Nuclear Power Plants}, author = {Khattak, Muhammad Adil and Shaharuddin, Muhammad Khairy Harmaini and Haris, Muhammad Saiful Islam and Aminuddin, Muhammad Zuhaili Mohammad and Azhar, Nik Mohamad Amirul Nik and Ahmad, Nik Muhammad Hakimi Nik}, @@ -6711,24 +4146,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/22SMP5EI/Review of cyber security applications in nuclear power plants.pdf} } -@article{kimCyberAttackTaxonomy2020, - title = {Cyber Attack Taxonomy for Digital Environment in Nuclear Power Plants}, - author = {Kim, Seungmin and Heo, Gyunyoung and Zio, Enrico and Shin, Jinsoo and Song, Jae-gu}, - date = {2020-05}, - journaltitle = {Nuclear Engineering and Technology}, - shortjournal = {Nuclear Engineering and Technology}, - volume = {52}, - number = {5}, - pages = {995--1001}, - issn = {17385733}, - doi = {10.1016/j.net.2019.11.001}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S1738573319305443}, - urldate = {2022-09-30}, - abstract = {With the development of digital instrumentation and control (I\&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/62DY99RU/Kim et al. - 2020 - Cyber attack taxonomy for digital environment in n.pdf} -} - @online{kimInterpretabilityFeatureAttribution2018, title = {Interpretability {{Beyond Feature Attribution}}: {{Quantitative Testing}} with {{Concept Activation Vectors}} ({{TCAV}})}, shorttitle = {Interpretability {{Beyond Feature Attribution}}}, @@ -6745,7 +4162,7 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/QYN2BG7D/Kim et al. - 2018 - Interpretability Beyond Feature Attribution Quant.pdf} } -@article{kimNuDEFormalMethodbased2017, +@article{kimNuDE20Formal2017, title = {{{NuDE}} 2.0: {{A Formal Method-based Software Development}}, {{Verification}} and {{Safety Analysis Environment}} for {{Digital I}}\&{{Cs}} in {{NPPs}}}, shorttitle = {{{NuDE}} 2.0}, author = {Kim, Eui-Sub and Lee, Dong-Ah and Jung, Sejin and Yoo, Junbeom and Choi, Jong-Gyun and Lee, Jang-Soo}, @@ -6763,7 +4180,7 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/3SUWT244/Kim et al. - 2017 - NuDE 2.0 A Formal Method-based Software Developme.pdf} } -@article{kimNuDEFormalMethodbased2017a, +@article{kimNuDE20Formal2017a, title = {{{NuDE}} 2.0: {{A Formal Method-based Software Development}}, {{Verification}} and {{Safety Analysis Environment}} for {{Digital I}}\&{{Cs}} in {{NPPs}}}, shorttitle = {{{NuDE}} 2.0}, author = {Kim, Eui-Sub and Lee, Dong-Ah and Jung, Sejin and Yoo, Junbeom and Choi, Jong-Gyun and Lee, Jang-Soo}, @@ -6790,78 +4207,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/MWZM2L3R/Kim et al. - Sign-off with Bounded Formal Verification Proofs.pdf} } -@article{kimSurveyMachineLearningBased2021, - title = {A {{Survey}} on {{Machine-Learning Based Security Design}} for {{Cyber-Physical Systems}}}, - author = {Kim, Sangjun and Park, Kyung-Joon}, - date = {2021-06}, - journaltitle = {Applied Sciences-Basel}, - shortjournal = {Appl. Sci.-Basel}, - volume = {11}, - number = {12}, - pages = {5458}, - publisher = {Mdpi}, - location = {Basel}, - doi = {10.3390/app11125458}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.}, - langid = {english}, - annotation = {WOS:000666134100001}, - file = {/home/danesabo/Zotero/storage/Y2LF649M/Kim and Park - 2021 - A Survey on Machine-Learning Based Security Design.pdf} -} - -@online{kingmaAutoEncodingVariationalBayes2022, - title = {Auto-{{Encoding Variational Bayes}}}, - author = {Kingma, Diederik P. and Welling, Max}, - date = {2022-12-10}, - eprint = {1312.6114}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - doi = {10.48550/arXiv.1312.6114}, - url = {http://arxiv.org/abs/1312.6114}, - urldate = {2023-10-05}, - abstract = {How can we perform efficient inference and learning in directed probabilistic models, in the presence of continuous latent variables with intractable posterior distributions, and large datasets? We introduce a stochastic variational inference and learning algorithm that scales to large datasets and, under some mild differentiability conditions, even works in the intractable case. Our contributions are two-fold. First, we show that a reparameterization of the variational lower bound yields a lower bound estimator that can be straightforwardly optimized using standard stochastic gradient methods. Second, we show that for i.i.d. datasets with continuous latent variables per datapoint, posterior inference can be made especially efficient by fitting an approximate inference model (also called a recognition model) to the intractable posterior using the proposed lower bound estimator. Theoretical advantages are reflected in experimental results.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/VCZMGLBD/Kingma and Welling - 2022 - Auto-Encoding Variational Bayes.pdf;/home/danesabo/Zotero/storage/5PDKNG4K/1312.html} -} - -@article{kirschSurvivableSCADAIntrusionTolerant2014, - title = {Survivable {{SCADA Via Intrusion-Tolerant Replication}}}, - author = {Kirsch, Jonathan and Goose, Stuart and Amir, Yair and Wei, Dong and Skare, Paul}, - date = {2014-01}, - journaltitle = {IEEE Transactions on Smart Grid}, - volume = {5}, - number = {1}, - pages = {60--70}, - issn = {1949-3061}, - doi = {10.1109/TSG.2013.2269541}, - abstract = {Providers of critical infrastructure services strive to maintain the high availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system-one that is able to ensure correct behavior with minimal performance degradation even during cyber attacks that compromise part of the system. We describe the challenges we faced when integrating modern intrusion-tolerant protocols with a conventional SCADA architecture and present the techniques we developed to overcome these challenges. The results illustrate that our survivable SCADA system not only functions correctly in the face of a cyber attack, but that it also processes in excess of 20 000 messages per second with a latency of less than 30 ms, making it suitable for even large-scale deployments managing thousands of remote terminal units.}, - eventtitle = {{{IEEE Transactions}} on {{Smart Grid}}}, - file = {/home/danesabo/Zotero/storage/S2IDWZTW/Kirsch et al. - 2014 - Survivable SCADA Via Intrusion-Tolerant Replicatio.pdf;/home/danesabo/Zotero/storage/UW52ABP8/6576306.html} -} - -@article{kirshnerModelBasedSystemsEngineering2023, - title = {Model-{{Based Systems Engineering Cybersecurity}} for {{Space Systems}}}, - author = {Kirshner, Mitchell}, - date = {2023-02}, - journaltitle = {AEROSPACE}, - shortjournal = {Aerospace}, - volume = {10}, - number = {2}, - pages = {116}, - publisher = {MDPI}, - location = {Basel}, - issn = {2226-4310}, - doi = {10.3390/aerospace10020116}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {As industries in various sectors increasingly adopt model-based systems engineering (MBSE) for system lifecycle design and development, engineers can manage and describe systems of higher complexity than ever before. This is especially true for the field of space systems; while past missions have developed using document-based planning, it is only in the last several years that NASA and other organizations in the space industry have begun using MBSE. One crucial factor of space systems development that is often overlooked is cybersecurity. As space systems become more complex and cyberphysical in nature, cybersecurity requirements become more difficult to capture, especially through document-based methods; a need for a means by which to continuously verify and validate systems cybersecurity for cyberphysical space missions arises. By expanding upon a National Institute of Standards and Technology (NIST) framework for cyber resiliency, this work proposes a methodology that uses MBSE traceability functionality to demonstrate adequate cybersecurity for cyberphysical space systems using SysML requirements modeling capabilities. Key goals, objectives, and strategic principles leading to achieving cybersecurity at all levels of the system's architectural hierarchy are presented. Recommendations for the future of space cybersecurity include the addition of the space sector to the Department of Homeland Security Cybersecurity \& Infrastructure Security Agency's list of critical infrastructure sectors to improve standardization and control of space cyberinfrastructure.}, - langid = {english}, - pagetotal = {17}, - annotation = {Web of Science ID: WOS:000938268900001}, - file = {/home/danesabo/Zotero/storage/P6YLUP6I/Kirshner - 2023 - Model-Based Systems Engineering Cybersecurity for .pdf} -} - @article{kleinComprehensiveFormalVerification2014, title = {Comprehensive {{Formal Verification}} of an {{OS Microkernel}}}, author = {Klein, Gerwin and Andronick, June and Elphinstone, Kevin and Murray, Toby and Sewell, Thomas and Kolanski, Rafal and Heiser, Gernot}, @@ -6901,24 +4246,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/XNCF39K8/Klein et al. - 2018 - Formally verified software in the real world.pdf} } -@article{kleinFormallyVerifiedSoftware2018a, - title = {Formally Verified Software in the Real World}, - author = {Klein, Gerwin and Andronick, June and Fernandez, Matthew and Kuz, Ihor and Murray, Toby and Heiser, Gernot}, - date = {2018-09-26}, - journaltitle = {Communications of the ACM}, - shortjournal = {Commun. ACM}, - volume = {61}, - number = {10}, - pages = {68--77}, - issn = {0001-0782, 1557-7317}, - doi = {10.1145/3230627}, - url = {https://dl.acm.org/doi/10.1145/3230627}, - urldate = {2024-11-11}, - abstract = {Verified software secures the Unmanned Little Bird autonomous helicopter against mid-flight cyber attacks.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/EUFBUXNE/Klein et al. - 2018 - Formally verified software in the real world.pdf} -} - @inproceedings{kleinSeL4FormalVerification2009, title = {{{seL4}}: Formal Verification of an {{OS}} Kernel}, shorttitle = {{{seL4}}}, @@ -6937,60 +4264,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/P6TTYKPW/Klein et al. - 2009 - seL4 formal verification of an OS kernel.pdf} } -@book{knollRadiationDetectionMeasurement2010, - title = {Radiation Detection and Measurement}, - author = {Knoll, Glenn F.}, - date = {2010}, - edition = {4th ed}, - publisher = {John Wiley}, - location = {Hoboken, N.J}, - abstract = {"This is the resource that engineers turn to in the study of radiation detection. The fourth edition takes into account the technical developments that continue to enhance the instruments and techniques available for the detection and spectroscopy of ionizing radiation. New coverage is presented on ROC curves, micropattern gas detectors, new sensors for scintillation light, and the excess noise factor. Revised discussions are also included on TLDs and cryogenic spectrometers, radiation backgrounds, and the VME standard. Engineers will gain a strong understanding of the field with this updated book."--}, - isbn = {978-0-470-13148-0}, - langid = {english}, - pagetotal = {830}, - keywords = {Measurement,Nuclear counters,Radiation}, - annotation = {OCLC: ocn612350364}, - file = {/home/danesabo/Zotero/storage/YBCE8JLY/Knoll - 2010 - Radiation detection and measurement.pdf} -} - -@article{kochunasDigitalTwinConcepts2021, - title = {Digital {{Twin Concepts}} with {{Uncertainty}} for {{Nuclear Power Applications}}}, - author = {Kochunas, Brendan and Huan, Xun}, - date = {2021-07-14}, - journaltitle = {Energies}, - shortjournal = {Energies}, - volume = {14}, - number = {14}, - pages = {4235}, - issn = {1996-1073}, - doi = {10.3390/en14144235}, - url = {https://www.mdpi.com/1996-1073/14/14/4235}, - urldate = {2022-03-02}, - abstract = {Digital Twins (DTs) are receiving considerable attention from multiple disciplines. Much of the literature at this time is dedicated to the conceptualization of digital twins, and associated enabling technologies and challenges. In this paper, we consider these propositions for the specific application of nuclear power. Our review finds that the current DT concepts are amenable to nuclear power systems, but benefit from some modifications and enhancements. Further, some areas of the existing modeling and simulation infrastructure around nuclear power systems are adaptable to DT development, while more recent efforts in advanced modeling and simulation are less suitable at this time. For nuclear power applications, DT development should rely first on mechanistic model-based methods to leverage the extensive experience and understanding of these systems. Model-free techniques can then be adopted to selectively, and correctively, augment limitations in the model-based approaches. Challenges to the realization of a DT are also discussed, with some being unique to nuclear engineering, however most are broader. A challenging aspect we discuss in detail for DTs is the incorporation of uncertainty quantification (UQ). Forward UQ enables the propagation of uncertainty from the digital representations to predict behavior of the physical asset. Similarly, inverse UQ allows for the incorporation of data from new measurements obtained from the physical asset back into the DT. Optimization under uncertainty facilitates decision support through the formal methods of optimal experimental design and design optimization that maximize information gain, or performance, of the physical asset in an uncertain environment.}, - langid = {english}, - keywords = {DGC read,uncertainty quantification}, - file = {/home/danesabo/Zotero/storage/RCXS8AQS/DT concepts with uncertainty for NP applications.pdf} -} - -@article{koGPBayesFiltersBayesianFiltering2009, - title = {{{GP-BayesFilters}}: {{Bayesian}} Filtering Using {{Gaussian}} Process Prediction and Observation Models}, - shorttitle = {{{GP-BayesFilters}}}, - author = {Ko, Jonathan and Fox, Dieter}, - date = {2009-07-01}, - journaltitle = {Autonomous Robots}, - shortjournal = {Auton Robot}, - volume = {27}, - number = {1}, - pages = {75--90}, - issn = {1573-7527}, - doi = {10.1007/s10514-009-9119-x}, - url = {https://doi.org/10.1007/s10514-009-9119-x}, - urldate = {2022-04-21}, - abstract = {Bayesian filtering is a general framework for recursively estimating the state of a dynamical system. Key components of each Bayes filter are probabilistic prediction and observation models. This paper shows how non-parametric Gaussian process (GP) regression can be used for learning such models from training data. We also show how Gaussian process models can be integrated into different versions of Bayes filters, namely particle filters and extended and unscented Kalman filters. The resulting GP-BayesFilters can have several advantages over standard (parametric) filters. Most importantly, GP-BayesFilters do not require an accurate, parametric model of the system. Given enough training data, they enable improved tracking accuracy compared to parametric models, and they degrade gracefully with increased model uncertainty. These advantages stem from the fact that GPs consider both the noise in the system and the uncertainty in the model. If an approximate parametric model is available, it can be incorporated into the GP, resulting in further performance improvements. In experiments, we show different properties of GP-BayesFilters using data collected with an autonomous micro-blimp as well as synthetic data.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/SQPJYKLF/Ko and Fox - 2009 - GP-BayesFilters Bayesian filtering using Gaussian.pdf} -} - @article{kohlerCloudBasedDigitalTwin2024, title = {Cloud-{{Based Digital Twin}} for {{Distribution Grids}}: {{What Is Already Available Today}}}, shorttitle = {Cloud-{{Based Digital Twin}} for {{Distribution Grids}}}, @@ -7042,13 +4315,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/PC3HFWNV/Kong et al. - 2015 - dReach δ-Reachability Analysis for Hybrid Systems.pdf} } -@article{korsahNUREGCR6992Instrumentation, - title = {{{NUREG}}/{{CR-6992}}, {{Instrumentation}} and {{Controls}} in {{Nuclear Power Plants}}: {{An Emerging Technologies Update}}.}, - author = {Korsah, Kofi}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/IHLKJNGI/Korsah - NUREGCR-6992, Instrumentation and Controls in Nuclear Power Plants An Emerging Technologies Updat.pdf} -} - @inproceedings{kottlerFormalVerificationLadder2017, title = {Formal Verification of Ladder Logic Programs Using {{NuSMV}}}, booktitle = {{{SoutheastCon}} 2017}, @@ -7067,57 +4333,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/FSKKZK3C/Kottler et al. - 2017 - Formal verification of ladder logic programs using.pdf} } -@inproceedings{kovacsFrameworkUsingFormal2010, - title = {A {{Framework}} for {{Using Formal Methods}} in {{Process Control}}}, - booktitle = {Proceedings of the 1st {{ISW}} on {{DCS}}}, - author = {Kovacs, Gabor and Pietrac, Laurent}, - date = {2010}, - pages = {66--76}, - url = {http://lpietrac.free.fr/publis/Kovacs-2010-iswdcs.pdf}, - urldate = {2022-06-20}, - eventtitle = {1st {{ISW}} on {{DCS}}}, - isbn = {978-963-661-950-3}, - file = {/home/danesabo/Zotero/storage/7BGPLBH2/Kovacs-2010-iswdcs.pdf} -} - -@article{krauseCybersecurityPowerGrids2021, - title = {Cybersecurity in {{Power Grids}}: {{Challenges}} and {{Opportunities}}}, - shorttitle = {Cybersecurity in {{Power Grids}}}, - author = {Krause, Tim and Ernst, Raphael and Klaer, Benedikt and Hacker, Immanuel and Henze, Martin}, - date = {2021-09-16}, - journaltitle = {Sensors}, - shortjournal = {Sensors}, - volume = {21}, - number = {18}, - eprint = {2105.00013}, - eprinttype = {arXiv}, - pages = {6225}, - issn = {1424-8220}, - doi = {10.3390/s21186225}, - url = {http://arxiv.org/abs/2105.00013}, - urldate = {2022-03-22}, - abstract = {Increasing volatilities within power transmission and distribution force power grid operators to amplify their use of communication infrastructure to monitor and control their grid. The resulting increase in communication creates a larger attack surface for malicious actors. Indeed, cyber attacks on power grids have already succeeded in causing temporary, large-scale blackouts in the recent past. In this paper, we analyze the communication infrastructure of power grids to derive resulting fundamental challenges of power grids with respect to cybersecurity. Based on these challenges, we identify a broad set of resulting attack vectors and attack scenarios that threaten the security of power grids. To address these challenges, we propose to rely on a defense-in-depth strategy, which encompasses measures for (i) device and application security, (ii) network security, (iii) physical security, as well as (iv) policies, procedures, and awareness. For each of these categories, we distill and discuss a comprehensive set of state-of-the art approaches, and identify further opportunities to strengthen cybersecurity in interconnected power grids.}, - keywords = {DGC read}, - file = {/home/danesabo/Zotero/storage/4G3A2ZG6/Krause et al. - 2021 - Cybersecurity in Power Grids Challenges and Oppor.pdf;/home/danesabo/Zotero/storage/6M69ML7H/2105.html} -} - -@article{krishnamurthyGeneralisedResilienceModels2020, - title = {Generalised Resilience Models for Power Systems and Dependent Infrastructure during Extreme Events}, - author = {Krishnamurthy, Vaidyanathan and Huang, Bing and Kwasinski, Alexis and Pierce, Evan and Baldick, Ross}, - date = {2020}, - journaltitle = {IET Smart Grid}, - volume = {3}, - number = {2}, - pages = {194--206}, - issn = {2515-2947}, - doi = {10.1049/iet-stg.2019.0170}, - url = {https://onlinelibrary.wiley.com/doi/abs/10.1049/iet-stg.2019.0170}, - urldate = {2022-03-25}, - abstract = {This study presents a generalised critical infrastructures resilience model for extreme events with a focus on power grids. Infrastructures are modelled as three domains – physical, cyber, and human. Each domain is described with respect to the services it provides. Each domain is represented by geometric graphs for each service it provides. The resilience models use geometric graphs with each graph's nodes and edges characterised based on relevant attributes. This study also discusses various applied aspects related to resilience models including the impact of changing operating environment, human-driven processes, such as logistics, and service buffers. Due to their stated particular importance in the U.S. Presidential Policy Directive 21, particular attention is placed on the power infrastructure and its impact on the public communication infrastructures as a main critical load. This study focuses on the multi-time scale power system operation to capture cascading outages within, and subsequently to its dependent infrastructure – the public communication system (e.g. wireless or ‘cellular’ communication networks) as a main critical load. This study illustrates the merits of the proposed models in calculating resilience in extreme events and derives physical domain representation for electric and communication systems using cell tower and substation data from the USA.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/5Q83LXXE/Krishnamurthy et al. - 2020 - Generalised resilience models for power systems an.pdf} -} - @online{Kry10TechnicalOverview, title = {Kry10 {{Technical Overview}}}, url = {https://uploads-ssl.webflow.com/635675151c946163c2012450/66395a8a675c74f82097a749_kry10-technical-overview.pdf}, @@ -7220,45 +4435,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/EBGSC6L2/Kusmenko et al. - 2017 - Modeling Architectures of Cyber-Physical Systems.pdf} } -@report{kwasinskiConceptualFrameworkAssessing2016, - title = {A {{Conceptual Framework}} for {{Assessing Resilience}} at the {{Community Scale}}}, - author = {Kwasinski, Alexis and Trainor, Joseph and Wolshon, Brian and Lavelle, Francis M.}, - date = {2016-01}, - number = {NIST GCR 16-001}, - pages = {NIST GCR 16-001}, - institution = {{National Institute of Standards and Technology}}, - doi = {10.6028/NIST.GCR.16-001}, - url = {https://nvlpubs.nist.gov/nistpubs/gcr/2016/NIST.GCR.16-001.pdf}, - urldate = {2022-03-25}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/E4R2PHQ2/Kwasinski et al. - 2016 - A Conceptual Framework for Assessing Resilience at.pdf} -} - -@inproceedings{kwasinskiGeneralizedIntegratedFramework2017, - title = {Generalized Integrated Framework for Modelling Communications and Electric Power Infrastructure Resilience}, - booktitle = {2017 {{IEEE International Telecommunications Energy Conference}} ({{IN}}℡{{EC}})}, - author = {Kwasinski, Alexis and Krishnamurthy, Vaidyanathan}, - date = {2017-10}, - pages = {99--106}, - issn = {0275-0473}, - doi = {10.1109/INTLEC.2017.8211686}, - abstract = {This paper presents a quantitative framework for modeling electric power and communications infrastructures resilience. While in the past, resilience models applied to these infrastructures have focused on technological aspects, a fundamental novel aspect of the herein presented framework is the integral inclusion of models for human-driven processes, such as logistics, that influences recovery speed. Another fundamental novel aspect of the presented modeling framework is the generalized representation of dependencies and the characterization of the role that service buffers, such as energy storage, have on representing dependencies of associated services. Infrastructure system models combine three interconnected domains, each mathematically represented by at least one graph: a physical domain, a human/organizational domain, and a cyber domain. Each of the graphs that form the proposed framework represent the provision of a service. Thus, modeling of functional dependencies is inherently part of the developed models.}, - eventtitle = {2017 {{IEEE International Telecommunications Energy Conference}} ({{IN}}℡{{EC}})}, - file = {/home/danesabo/Zotero/storage/5VKLB6R2/Kwasinski and Krishnamurthy - 2017 - Generalized integrated framework for modelling com.pdf} -} - -@inproceedings{kwasinskiModelingCyberPhysicalIntraDependencies2020, - title = {Modeling of {{Cyber-Physical Intra-Dependencies}} in {{Electric Power Grids}} and {{Their Effect}} on {{Resilience}}}, - booktitle = {2020 8th {{Workshop}} on {{Modeling}} and {{Simulation}} of {{Cyber-Physical Energy Systems}}}, - author = {Kwasinski, Alexis}, - date = {2020-04}, - pages = {1--6}, - doi = {10.1109/MSCPES49613.2020.9133702}, - abstract = {This paper studies the modeling of cyber-physical dependencies observed within power grids and the effects of these intra-dependencies, on power grid resilience, which is evaluated quantitatively. A fundamental contribution of this paper is the description of the critically important role played by cyber-physical buffers as key components to limit the negative effect of intra-dependencies on power grids resilience. Although resilience issues in the electric power provision service could be limited thanks to the use of local energy storage devices as the realization of service buffers, minimal to no autonomy in data connectivity buffers make cyber vulnerabilities specially critical in terms of resilience. This paper also explains how these models can be used for improved power grids resilience planning considering internal cyber-physical interactions.}, - eventtitle = {2020 8th {{Workshop}} on {{Modeling}} and {{Simulation}} of {{Cyber-Physical Energy Systems}}}, - file = {/home/danesabo/Zotero/storage/KVH4THGY/Kwasinski - 2020 - Modeling of Cyber-Physical Intra-Dependencies in E.pdf} -} - @article{kwonReachabilityAnalysisSafety2018, title = {Reachability {{Analysis}} for {{Safety Assurance}} of {{Cyber-Physical Systems Against Cyber Attacks}}}, author = {Kwon, Cheolhyeon and Hwang, Inseok}, @@ -7274,51 +4450,6 @@ Regulatory Premises.pdf} urldate = {2023-11-03} } -@article{kyoung-daekimCyberPhysicalSystems2012, - title = {Cyber–{{Physical Systems}}: {{A Perspective}} at the {{Centennial}}}, - shorttitle = {Cyber–{{Physical Systems}}}, - author = {{Kyoung-Dae Kim} and Kumar, P. R.}, - date = {2012-05}, - journaltitle = {Proceedings of the IEEE}, - shortjournal = {Proc. IEEE}, - volume = {100}, - pages = {1287--1308}, - issn = {0018-9219, 1558-2256}, - doi = {10.1109/JPROC.2012.2189792}, - url = {http://ieeexplore.ieee.org/document/6176187/}, - urldate = {2023-09-27}, - abstract = {Cyber–physical systems (CPSs) are the next generation of engineered systems in which computing, communication, and control technologies are tightly integrated. Research on CPSs is fundamentally important for engineered systems in many important application domains such as transportation, energy, and medical systems. We overview CPS research from both a historical point of view in terms of technologies developed for early generations of control systems, as well as recent results on CPSs in many relevant research domains such as networked control, hybrid systems, real-time computing, real-time networking, wireless sensor networks, security, and model-driven development. We outline the potential for CPSs in many societally important application domains.}, - issue = {Special Centennial Issue}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/NC537RQV/Kyoung-Dae Kim and Kumar - 2012 - Cyber–Physical Systems A Perspective at the Cente.pdf} -} - -@book{lamarshIntroductionNuclearEngineering2018, - title = {Introduction to Nuclear Engineering}, - author = {Lamarsh, John R. and Baratta, Anthony John}, - date = {2018}, - edition = {Fourth edition}, - publisher = {Pearson Education}, - location = {Hoboken}, - isbn = {978-0-13-457005-1}, - langid = {english}, - pagetotal = {802}, - file = {/home/danesabo/Zotero/storage/NRS6A7PT/Lamarsh and Baratta - 2018 - Introduction to nuclear engineering.pdf} -} - -@book{lamportSpecifyingSystemsTLA2003, - title = {Specifying Systems: The {{TLA}}+ Language and Tools for Hardware and Software Engineers}, - shorttitle = {Specifying Systems}, - author = {Lamport, Leslie}, - date = {2003}, - publisher = {Addison-Wesley}, - location = {Boston, Mass.}, - isbn = {978-0-321-14306-8}, - langid = {english}, - pagetotal = {364}, - file = {/home/danesabo/Zotero/storage/BQR2M725/Lamport - 2003 - Specifying systems the TLA+ language and tools for hardware and software engineers.pdf} -} - @article{langFormalVerificationApplied, title = {Formal {{Verification Applied}} to {{Autonomous Spacecraft Attitude Control}}}, author = {Lang, Kendra and Klett, Corbin and Hawkins, Kelsey and Feron, Eric and Tsiotras, Panagiotis and Phillips, Sean}, @@ -7341,33 +4472,12 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/3VGFTA43/Lang et al. - 2021 - Formal verification applied to autonomous spacecra.pdf} } -@inproceedings{langFormalVerificationApplied2021a, - title = {Formal {{Verification Applied}} to {{Spacecraft Attitude Control}}}, - booktitle = {{{AIAA Scitech}} 2021 {{Forum}}}, - author = {Lang, Kendra and Klett, Corbin and Hawkins, Kelsey and Feron, Eric and Tsiotras, Panagiotis and Phillips, Sean}, - date = {2021-01-11}, - publisher = {{American Institute of Aeronautics and Astronautics}}, - location = {VIRTUAL EVENT}, - doi = {10.2514/6.2021-1126}, - url = {https://arc.aiaa.org/doi/10.2514/6.2021-1126}, - urldate = {2024-11-11}, - eventtitle = {{{AIAA Scitech}} 2021 {{Forum}}}, - isbn = {978-1-62410-609-5}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/IR3BDVLE/Lang et al. - 2021 - Formal Verification Applied to Spacecraft Attitude Control.pdf} -} - @online{LangleyFormalMethods, title = {Langley {{Formal Methods}}}, url = {https://shemesh.larc.nasa.gov/fm/index.html}, organization = {Langley Formal Methods} } -@misc{latex-primer, - title = {{{LaTeX Primer}}}, - file = {/home/danesabo/Zotero/storage/VS3WVQJB/ltxprimer-1.0.pdf} -} - @inproceedings{lattmannComponentbasedModelingDynamic2012, title = {Component-Based Modeling of Dynamic Systems Using Heterogeneous Composition}, booktitle = {Proceedings of the 6th {{International Workshop}} on {{Multi-Paradigm Modeling}}}, @@ -7399,13 +4509,6 @@ Regulatory Premises.pdf} file = {/home/danesabo/Zotero/storage/KW86DCFW/adam.math.hhu.de.html} } -@online{LearningTLA, - title = {Learning {{TLA}}+}, - url = {https://lamport.azurewebsites.net/tla/learning.html}, - urldate = {2025-02-27}, - file = {/home/danesabo/Zotero/storage/NP5P569H/learning.html} -} - @online{LearnYouHaskell, title = {Learn {{You}} a {{Haskell}} for {{Great Good}}!}, url = {http://learnyouahaskell.com/}, @@ -7432,20 +4535,6 @@ Regulatory Premises.pdf} for defect classification of TFT–LCD panels.pdf} } -@book{leeIntroductionEmbeddedSystems2017, - title = {Introduction to Embedded Systems: A Cyber-Physical Systems Approach}, - shorttitle = {Introduction to Embedded Systems}, - author = {Lee, Edward A. and Seshia, Sanjit A.}, - date = {2017}, - edition = {Second edition}, - publisher = {MIT Press}, - location = {Cambridge, Massachuetts}, - isbn = {978-0-262-53381-2}, - langid = {english}, - pagetotal = {537}, - file = {/home/danesabo/Zotero/storage/H9MK8VB7/Lee and Seshia - 2017 - Introduction to embedded systems a cyber-physical.pdf} -} - @article{leePresentFutureCyberPhysical2015, title = {The {{Past}}, {{Present}} and {{Future}} of {{Cyber-Physical Systems}}: {{A Focus}} on {{Models}}}, shorttitle = {The {{Past}}, {{Present}} and {{Future}} of {{Cyber-Physical Systems}}}, @@ -7480,21 +4569,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/UJTW62B6/Lee et al. - 2021 - Quantifying and Generalizing the CAP Theorem.pdf} } -@article{leibrandtGuideSystemsEngineering2002, - title = {A {{Guide}} to the {{Systems Engineering Body}} of {{Knowledge}} ({{SEBoK}}) {{Introduction}}}, - author = {Leibrandt, Rob}, - date = {2002-04}, - journaltitle = {INSIGHT}, - volume = {5}, - number = {1}, - pages = {7--7}, - issn = {2156485X}, - doi = {10.1002/inst.2002517}, - url = {https://onlinelibrary.wiley.com/doi/10.1002/inst.2002517}, - urldate = {2023-10-06}, - langid = {english} -} - @inproceedings{lernerUsingHighlevelSynthesis2014, title = {Using High-Level Synthesis and Formal Analysis to Predict and Preempt Attacks on Industrial Control Systems}, booktitle = {Proceedings of the 2014 {{ACM}}/{{SIGDA}} International Symposium on {{Field-programmable}} Gate Arrays}, @@ -7546,32 +4620,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/78F7AYKB/steam.pdf} } -@article{levesonImprovedDesignProcess2019, - title = {An {{Improved Design Process}} for {{Complex Control-Based Systems Using STPA}} and a {{Conceptual Architecture}}}, - author = {Leveson, Nancy}, - date = {2019}, - journaltitle = {Massachusetts Institute of Technology, White Paper}, - file = {/home/danesabo/Zotero/storage/TH8TQZIS/Leveson - An Improved Design Process for Complex, Control-Ba.pdf} -} - -@article{levesonInvestigationTherac25Accidents1992, - title = {An Investigation of the {{Therac-25}} Accidents}, - author = {Leveson, Nancy G. and Turner, Clark S.}, - date = {1992}, - url = {https://escholarship.org/uc/item/5dr206s3}, - urldate = {2024-11-11}, - abstract = {Risk in any complex technology is unavoidable. However, important lessons can be learned from accidents which can be used to design procedures for reducing risk in the future. Although descriptions of the Therac-25 medical electron accelerator accidents have been published previously, they are incomplete and often misleading. This paper contains a detailed account of these accidents, along with some lessons that can be learned from them in terms of system engineering, software engineering, and government regulation of safety-critical systems involving software.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/CGFZR2HJ/Leveson and Turner - 1992 - An investigation of the Therac-25 accidents.pdf} -} - -@book{levesonSTPAHandbook, - title = {{{STPA Handbook}}}, - author = {Leveson, Nancy and Thomas, John}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/Z3NMIDYF/Leveson - This handbook is intended for those interested in .pdf} -} - @book{lewisOptimalControl2012, title = {Optimal Control}, author = {Lewis, Frank L. and Vrabie, Draguna L. and Syrmos, Vassilis L.}, @@ -7584,62 +4632,6 @@ for defect classification of TFT–LCD panels.pdf} keywords = {DAS Get from Library} } -@article{liDynamicBayesianNetwork2017, - title = {Dynamic {{Bayesian Network}} for {{Aircraft Wing Health Monitoring Digital Twin}}}, - author = {Li, Chenzhao and Mahadevan, Sankaran and Ling, You and Choze, Sergio and Wang, Liping}, - date = {2017-03}, - journaltitle = {AIAA Journal}, - shortjournal = {AIAA Journal}, - volume = {55}, - number = {3}, - pages = {930--941}, - issn = {0001-1452, 1533-385X}, - doi = {10.2514/1.J055201}, - url = {https://arc.aiaa.org/doi/10.2514/1.J055201}, - urldate = {2022-03-02}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/84GMPWDD/DBN for aircraft wing health monitoring DT.pdf} -} - -@article{linInnovativeSuccessiveApproximation2021, - title = {An {{Innovative Successive Approximation Register Analog-to-Digital Converter}} for a {{Nine-Axis Sensing System}}}, - author = {Lin, Chih-Hsuan and Wen, Kuei-Ann}, - date = {2021-03}, - journaltitle = {Journal of Low Power Electronics and Applications}, - volume = {11}, - number = {1}, - pages = {3}, - publisher = {Multidisciplinary Digital Publishing Institute}, - issn = {2079-9268}, - doi = {10.3390/jlpea11010003}, - url = {https://www.mdpi.com/2079-9268/11/1/3}, - urldate = {2025-03-28}, - abstract = {With nine-axis sensing systems in 5G smartphones, mobile power consumption has become increasingly important, and ultra-low-power (ULP) sensor circuits can decrease power consumption to tens of microwatts. This paper presents an innovative successive approximation register analog-to-digital converter, which comprises fine (three most significant bits (MSBs) plus course conversion (11 least significant bits (LSBs)) capacitive digital-to-analog converters (CDACs), ULP, four-mode reconfigurable resolution (9, 10, 11, or 12 bits), an internally generated clock, meta-detection, the switching base midpoint voltage (Vm) (SW-B-M), bit control logic, multi-phase control logic, fine (three MSBs) plus course conversion (11 LSBs) switch control logic, phase control logic, and an input signal plus negative voltage (VI + NEG) voltage generator. Then, the mechanism of the discrete Fourier transform (DFT)-based calibration is applied. The scalable voltage technique was used, and the analog/digital voltage was Vanalog (1.5 V) and Vdigital (0.9 V) to meet the specifications of the nine-axis ULP sensing system. The CDACs can reconfigure four-mode resolutions, 9–12 bits, for use in nine-axis sensor applications. The corresponding dynamic signal-to-noise and distortion ratio performance was 50.78, 58.53, 62.42, and 66.51 dB. In the 12-bit mode, the power consumption of the ADC was approximately 2.7 μW, and the corresponding figure of merit (FoM) was approximately 30.5 fJ for each conversion step.}, - issue = {1}, - langid = {english}, - keywords = {DFT-based,fine (3 MSBs) plus course conversion (11 LSBs) CDAC,reconfigurable,SAR-ADC}, - file = {/home/danesabo/Zotero/storage/DKEJCQ8S/Lin and Wen - 2021 - An Innovative Successive Approximation Register Analog-to-Digital Converter for a Nine-Axis Sensing.pdf} -} - -@article{linUncertaintyQuantificationSoftware2021, - title = {Uncertainty Quantification and Software Risk Analysis for Digital Twins in the Nearly Autonomous Management and Control Systems: {{A}} Review}, - shorttitle = {Uncertainty Quantification and Software Risk Analysis for Digital Twins in the Nearly Autonomous Management and Control Systems}, - author = {Lin, Linyu and Bao, Han and Dinh, Nam}, - date = {2021-09}, - journaltitle = {Annals of Nuclear Energy}, - shortjournal = {Annals of Nuclear Energy}, - volume = {160}, - pages = {108362}, - issn = {03064549}, - doi = {10.1016/j.anucene.2021.108362}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0306454921002383}, - urldate = {2022-03-02}, - abstract = {A nearly autonomous management and control (NAMAC) system is designed to furnish recommendations to operators for achieving particular goals based on NAMAC’s knowledge base. As a critical component in a NAMAC system, digital twins (DTs) are used to extract information from the knowledge base to support decision-making in reactor control and management during all modes of plant operations. With the advancement of artificial intelligence and data-driven methods, machine learning algorithms are used to build DTs of various functions in the NAMAC system. To evaluate the uncertainty of DTs and its impacts on the reactor digital instrumentation and control systems, uncertainty quantification (UQ) and software risk analysis is needed. As a comprehensive overview of prior research and a starting point for new investigations, this study selects and reviews relevant UQ techniques and software hazard and software risk analysis methods that may be suitable for DTs in the NAMAC system.}, - langid = {english}, - keywords = {DGC read}, - file = {/home/danesabo/Zotero/storage/D9QQKU9R/Uncertainty quantification and doftware risk analysis for DTs in control systems.pdf} -} - @article{lionsHamiltonJacobiBellmanEquations1983, title = {On the {{Hamilton-Jacobi-Bellman}} Equations}, author = {Lions, P. L.}, @@ -7708,23 +4700,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/9XUH6A6I/Liu et al. - 2022 - Secure-by-Construction Synthesis of Cyber-Physical.pdf} } -@article{ljungExperimentsIdentificationContinuous2009, - title = {Experiments with {{Identification}} of {{Continuous Time Models}}}, - author = {Ljung, Lennart}, - date = {2009}, - journaltitle = {IFAC Proceedings Volumes}, - shortjournal = {IFAC Proceedings Volumes}, - volume = {42}, - number = {10}, - pages = {1175--1180}, - issn = {14746670}, - doi = {10.3182/20090706-3-FR-2004.00195}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S1474667016388097}, - urldate = {2024-11-08}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/43ICC6ET/Ljung - 2009 - Experiments with Identification of Continuous Time Models.pdf} -} - @article{lopez-miguelPLCverifStatusFormal2022, title = {{{PLCverif}}: {{Status}} of a {{Formal Verification Tool}} for {{Programmable Logic Controller}}}, shorttitle = {{{PLCverif}}}, @@ -7745,71 +4720,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/XAG39WDC/Lopez-Miguel et al. - 2022 - PLCverif Status of a Formal Verification Tool for.pdf;/home/danesabo/Zotero/storage/AKP5GGFY/2203.html} } -@online{lopez-miguelPLCverifStatusFormal2022a, - title = {{{PLCverif}}: {{Status}} of a {{Formal Verification Tool}} for {{Programmable Logic Controller}}}, - shorttitle = {{{PLCverif}}}, - author = {Lopez-Miguel, Ignacio D. and Tournier, Jean-Charles and Adiego, Borja Fernandez}, - date = {2022-03-30}, - eprint = {2203.17253}, - eprinttype = {arXiv}, - doi = {10.48550/arXiv.2203.17253}, - url = {http://arxiv.org/abs/2203.17253}, - urldate = {2024-11-11}, - abstract = {Programmable Logic Controllers (PLC) are widely used for industrial automation including safety systems at CERN. The incorrect behaviour of the PLC control system logic can cause significant financial losses by damage of property or the environment or even injuries in some cases, therefore ensuring their correct behaviour is essential. While testing has been for many years the traditional way of validating the PLC control system logic, CERN developed a model checking platform to go one step further and formally verify PLC logic. This platform, called PLCverif, first released internally for CERN usage in 2019, is now available to anyone since September 2020 via an open source licence. In this paper, we will first give an overview of the PLCverif platform capabilities before focusing on the improvements done since 2019 such as the larger support coverage of the Siemens PLC programming languages, the better support of the C Bounded Model Checker backend (CBMC) and the process of releasing PLCverif as an open-source software.}, - pubstate = {prepublished}, - keywords = {Computer Science - Software Engineering}, - file = {/home/danesabo/Zotero/storage/963RD8XP/Lopez-Miguel et al. - 2022 - PLCverif Status of a Formal Verification Tool for Programmable Logic Controller.pdf;/home/danesabo/Zotero/storage/H94V58P2/2203.html} -} - -@article{lozadaHARDENSFinalReport, - title = {{{HARDENS Final Report}}}, - author = {Lozada, Gascot}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/P49ZWTJS/Lozada - HARDENS Final Report.pdf} -} - -@article{lozadaLetterReportTLRRES, - title = {Letter {{Report}} - {{TLR-RES}}/{{DE}}/{{REB-2021-17}}, {{Technical Challenges}} and {{Gaps}} in {{Digital Twin Enabling Technologies}} for {{Nuclear Reactor Applications}}}, - author = {Lozada, Gascot}, - pages = {42}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/Z43GNMME/Lozada - Letter Report - TLR-RESDEREB-2021-17, Technical .pdf} -} - -@article{luciaSetpointAttackDetection2021, - title = {Setpoint {{Attack Detection}} in {{Cyber-Physical Systems}}}, - author = {Lucia, Walter and Gheitasi, Kian and Ghaderi, Mohsen}, - date = {2021-05}, - journaltitle = {IEEE Transactions on Automatic Control}, - volume = {66}, - number = {5}, - pages = {2332--2338}, - issn = {1558-2523}, - doi = {10.1109/TAC.2020.3004326}, - url = {https://ieeexplore.ieee.org/abstract/document/9123676?casa_token=OOTq8eZpEU4AAAAA:5yEr0KRgtpHHwEKZLTBmo0W4gMgsmUYS34RrRbmTgDc8IJvzQONedC2AMG_ws0mGOOtV2xTeTw}, - urldate = {2023-09-27}, - abstract = {In this article, we face the problem of detecting setpoint attacks in networked control systems. We consider a setup where the reference signal (also known as setpoint) is generated by a control center remotely located with respect to a standard feedback controller. In this scenario, an attacker with sufficient resources can exploit the communication channel to alter the setpoint signal and ultimately affect the tracking performance of the control system. With respect to this problem, we propose a novel distributed control architecture that, taking advantage of peculiar capabilities of the command governor control paradigm, enables the detection of reference attacks. We formally prove that for constrained linear systems such detector exists. Moreover, by limiting the attacker's disclosure resources with superimposed cryptographically secure pseudorandom signals, we show that the absence of advanced stealthy attacks is also ensured. Finally, a solid numerical simulation investigating setpoint attacks on the flight control system of a single-engine fighter is presented to provide tangible evidence of the features of the presented methodology.}, - eventtitle = {{{IEEE Transactions}} on {{Automatic Control}}}, - file = {/home/danesabo/Zotero/storage/LHZD6PTJ/Lucia et al. - 2021 - Setpoint Attack Detection in Cyber-Physical System.pdf} -} - -@article{luDetectionIdentificationSparse2023, - title = {Detection and {{Identification}} of {{Sparse Sensor Attacks}} in {{Cyber-Physical Systems With Side Information}}}, - author = {Lu, An-Yang and Yang, Guang-Hong}, - date = {2023-09}, - journaltitle = {IEEE Transactions on Automatic Control}, - volume = {68}, - number = {9}, - pages = {5349--5364}, - issn = {1558-2523}, - doi = {10.1109/TAC.2022.3218545}, - url = {https://ieeexplore.ieee.org/abstract/document/9933841?casa_token=GQHa-q6eXQcAAAAA:k-CtF5gsoXIEF9Lo2AQEp-j-9Xr2kaweVGewjVYZk9qyJi21C_roFNSL8HC3AqemtGve_y83LA}, - urldate = {2023-09-27}, - abstract = {This article investigates the attack detection and identification problem for cyber-physical systems under sparse sensor attacks. A novel candidate set construction algorithm, where only partial combinations of different channels are checked, is proposed to efficiently generate the candidate set containing all the possible sets of corrupted channels under stealthy attacks. Besides, through introducing a unified attack model that precisely characterizes the attack performance and stealthiness, necessary and sufficient conditions for the existence of undetectable/unidentifiable attacks are proposed. Based on the obtained conditions, a novel attack detection and identification strategy is proposed. Compared with the existing methods focusing only on the measurements, more attacks can be detected/identified through introducing side information and the reliability of detector is enhanced through making full use of the attack performance analysis result. Finally, a numerical simulation is provided to illustrate the correctness and effectiveness of the proposed conditions and methods.}, - eventtitle = {{{IEEE Transactions}} on {{Automatic Control}}}, - file = {/home/danesabo/Zotero/storage/5VNJEGPR/Lu and Yang - 2023 - Detection and Identification of Sparse Sensor Atta.pdf} -} - @online{lundbergConsistentIndividualizedFeature2019, title = {Consistent {{Individualized Feature Attribution}} for {{Tree Ensembles}}}, author = {Lundberg, Scott M. and Erion, Gabriel G. and Lee, Su-In}, @@ -7840,21 +4750,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/NGGDHXKJ/Lundberg and Lee - 2017 - A Unified Approach to Interpreting Model Predictio.pdf} } -@book{lynchDynamicalSystemsApplications2018, - title = {Dynamical {{Systems}} with {{Applications}} Using {{Python}}}, - author = {Lynch, Stephen}, - date = {2018}, - edition = {1}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-319-78145-7}, - abstract = {Dynamical Systems with Applications using Python}, - isbn = {978-3-319-78145-7}, - langid = {english}, - keywords = {Applications of Mathematics,Complex Systems,Dynamical Systems and Ergodic Theory,Dynamics,Mathematical and Computational Engineering,Mathematical Physics and Mathematics,Mathematics,Mathematics and Statistics,Mathematics. Analysis,Ordinary Differential Equations,Python (Computer program language),Statistical Physics and Dynamical Systems}, - file = {/home/danesabo/Zotero/storage/RXHLK35X/978-3-319-78145-7.pdf} -} - @article{maccaroneADVANCEDREACTORCYBER, title = {{{ADVANCED REACTOR CYBER ANALYSIS AND DEVELOPMENT ENVIRONMENT}} ({{ARCADE}}) {{FOR UNIVERSITY RESEARCH}}}, author = {Maccarone, L T and Hahn, A S and Valme, R and Rowland, M T and Kapuria, A and Zhang, Y and Cole, D G}, @@ -7870,46 +4765,6 @@ for defect classification of TFT–LCD panels.pdf} isbn = {0-262-63295-0} } -@article{madniModelbasedSystemsEngineering2018, - title = {Model-Based Systems Engineering: {{Motivation}}, Current Status, and Research Opportunities}, - shorttitle = {Model-Based Systems Engineering}, - author = {Madni, Azad M. and Sievers, Michael}, - date = {2018-05}, - journaltitle = {SYSTEMS ENGINEERING}, - shortjournal = {Syst. Eng.}, - volume = {21}, - number = {3}, - pages = {172--190}, - publisher = {Wiley}, - location = {Hoboken}, - issn = {1098-1241, 1520-6858}, - doi = {10.1002/sys.21438}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {As systems continue to grow in scale and complexity, the Systems Engineering community has turned to Model-Based Systems Engineering (MBSE) tomanage complexity, maintain consistency, and assure traceability during system development. It is different from "engineering with models," which has been a common practice in the engineering profession for decades. MBSE is a holistic, systems engineering approach centered on the evolving system model, which serves as the "sole source of truth" about the system. It comprises system specification, design, validation, and configuration management. Even though MBSE is beginning to see a fair amount of use in multiple industries, specific advances are needed on multiple fronts to realize its full benefits. This paper discusses the motivation for MBSE, and its current state of maturity. It presents systems modeling methodologies and the role of ontologies and metamodels in MBSE. It presents model-based verification and validation (V\&V) as an example of MBSE use. An illustrative example of the use of MBSE for design synthesis is presented to demonstrate an important MBSE capability. The paper concludes with a discussion of challenges to widescale adoption and offers promising research directions to fully realize the potential benefits of MBSE.}, - langid = {english}, - pagetotal = {19}, - annotation = {Web of Science ID: WOS:000435285700004} -} - -@article{maExploringEdgeComputing2020, - title = {Exploring {{Edge Computing}} for {{Multitier Industrial Control}}}, - author = {Ma, Yehan and Lu, Chenyang and Sinopoli, Bruno and Zeng, Shen}, - date = {2020-11}, - journaltitle = {IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems}, - shortjournal = {IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.}, - volume = {39}, - number = {11}, - pages = {3506--3518}, - issn = {0278-0070, 1937-4151}, - doi = {10.1109/TCAD.2020.3012648}, - url = {https://ieeexplore.ieee.org/document/9211472/}, - urldate = {2022-09-30}, - abstract = {Industrial automation traditionally relies on local controllers implemented on microcontrollers or programmable logic controllers. With the emergence of edge computing, however, industrial automation evolves into a distributed two-tier computing architecture comprising local controllers and edge servers that communicate over wireless networks. Compared to local controllers, edge servers provide larger computing capacity at the cost of data loss over wireless networks. This article presents switching multitier control (SMC) to exploit edge computing for industrial control. SMC dynamically optimizes control performance by switching between local and edge controllers in response to changing network conditions. SMC employs a data-driven approach to derive switching policies based on classification models trained based on simulations while guaranteeing system stability based on an extended Simplex approach tailored for two-tier platforms. To evaluate the performance of industrial control over edge computing platforms, we have developed WCPS-EC, a real-time hybrid simulator that integrates simulated plants, real computing platforms, and real or simulated wireless networks. In a case study of an industrial robotic control system, SMC significantly outperformed both a local controller and an edge controller in face of varying data loss in a wireless network.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/AVDI2CW7/Ma et al. - 2020 - Exploring Edge Computing for Multitier Industrial .pdf} -} - @article{magerPreparingInstructionalObjectives1962, title = {Preparing Instructional Objectives.}, author = {Mager, Robert F.}, @@ -7947,7 +4802,7 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/K8QCKAMR/Malecha et al. - 2016 - Towards foundational verification of cyber-physica.pdf;/home/danesabo/Zotero/storage/JSRG9GY2/7580000.html} } -@inproceedings{marinoDesignWorldFIPIndustrial1999, +@inproceedings{marinoDesignWorldFIPsIndustrial1999, title = {Design of {{WorldFIP}}'s Industrial Communication Systems Based on Formal Methods}, booktitle = {{{ISIE}} '99. {{Proceedings}} of the {{IEEE International Symposium}} on {{Industrial Electronics}} ({{Cat}}. {{No}}.{{99TH8465}})}, author = {Marino, P. and Poza, F. and Dominguez, M.A. and Nogueira, J.B.}, @@ -8010,15 +4865,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/X7F3C93K/Martin et al. - 2022 - Formal Methods at Scale.pdf} } -@article{masoodAssessmentCyberSecurity, - title = {Assessment of {{Cyber Security Challenges}} in {{Nuclear Power Plants}}}, - author = {Masood, Rahat}, - pages = {43}, - abstract = {Nuclear power plants play an important role in electricity production for many countries. They supply power to industries, centers, government facilities, and residential areas. Yet, upon review, several cases reveal that even a small-scale attack on a nuclear power plant could lead to catastrophic consequences for a country’s citizens, economy, infrastructure, and security. In recent years, there has been increased attention to the area of nuclear cybersecurity due to attacks or incidents designed to disrupt NPP operations. In spite of this rise of nuclear-related cyber attacks, the security for NPPs has not been holistically addressed. Literature review reveals the lack of a comprehensive information security framework to secure nuclear power plants from internal and external threats.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/GDSXZ79Y/Masood - Assessment of Cyber Security Challenges in Nuclear.pdf} -} - @article{massotWhyFormalizeMathematics, title = {Why Formalize Mathematics?}, author = {Massot, Patrick}, @@ -8033,96 +4879,6 @@ for defect classification of TFT–LCD panels.pdf} urldate = {2024-01-28} } -@video{matlabInfinityMuSynthesis2020, - entrysubtype = {video}, - title = {H {{Infinity}} and {{Mu Synthesis}} | {{Robust Control}}, {{Part}} 5}, - editor = {{MATLAB}}, - editortype = {director}, - date = {2020-05-19}, - url = {https://www.youtube.com/watch?v=kRt7H0k8A4k}, - urldate = {2024-10-30}, - abstract = {This video walks through a controller design for an active suspension system. Actually, we design two controllers. For the first, we use H infinity synthesis to design a controller for a nominal plant model that will guarantee performance but not necessarily be robust to variation in the system. Then we build an uncertain model like we did in the last video and design a robust controller using mu synthesis. Watch the first videos in this series: Robust Control, Part 1: What Is Robust Control? - ~~~•~What~Is~Robust~Control?~|~Robust~Cont...~~ Robust Control, Part 2: Understanding Disk Margin - ~~~•~Understanding~Disk~Margin~|~Robust~Co...~~ Robust Control, Part 3: Disk Margins for MIMO Systems - ~~~•~Disk~Margins~for~MIMO~Systems~|~Robus...~~ Robust Control, Part 4: Working with Parameter Uncertainty - ~~~•~Working~with~Parameter~Uncertainty~|~...~~ Check out these other references: Robust Control of an Active Suspension: https://bit.ly/3bt8VCE -------------------------------------------------------------------------------------------------------- Get a free product trial: https://goo.gl/ZHFb5u Learn more about MATLAB: https://goo.gl/8QV7ZZ Learn more about Simulink: https://goo.gl/nqnbLe See what's new in MATLAB and Simulink: https://goo.gl/pgGtod © 2020 The MathWorks, Inc. MATLAB and Simulink are registered trademarks of The MathWorks, Inc. See www.mathworks.com/trademarks for a list of additional trademarks. Other product or brand names may be trademarks or registered trademarks of their respective holders.} -} - -@article{matthewsCoupledMultiphysicsSimulations2021, - title = {Coupled {{Multiphysics Simulations}} of {{Heat Pipe Microreactors Using DireWolf}}}, - author = {Matthews, Christopher and Laboure, Vincent and DeHart, Mark and Hansel, Joshua and Andrs, David and Wang, Yaqi and Ortensi, Javier and Martineau, Richard C.}, - date = {2021-07-03}, - journaltitle = {Nuclear Technology}, - volume = {207}, - number = {7}, - pages = {1142--1162}, - publisher = {Taylor \& Francis}, - issn = {0029-5450}, - doi = {10.1080/00295450.2021.1906474}, - url = {https://doi.org/10.1080/00295450.2021.1906474}, - urldate = {2025-01-21}, - abstract = {DireWolf is a multiphysics software driver application designed to simulate heat pipe–cooled nuclear microreactors. Developed under the U.S. Department of Energy, Office of Nuclear Energy Nuclear Energy Advanced Modeling and Simulation (NEAMS) program, the DireWolf software application’s objective is to provide the nuclear community with a design and safety analysis simulation capability. Based upon the NEAMS program Multiphysics Object-Oriented Simulation Environment (MOOSE) computational framework, DireWolf tightly couples nuclear microreactor physics, reactor physics, radiation transport, nuclear fuel performance, heat pipe thermal hydraulics, power generation, and structural mechanics to resolve the interdependent nonlinearities. DireWolf is capable of simulating both steady and transient normal reactor operation and several postulated failure scenarios. We will present the fundamental physics of heat pipe–cooled nuclear microreactors and the MOOSE-based software employed in DireWolf. Both steady and transient results for coupled reactor physics, radiation transport, and nuclear fuel performance are demonstrated.}, - keywords = {Microreactors,multiphysics MOOSE}, - file = {/home/danesabo/Zotero/storage/4DSCYJKR/Matthews et al. - 2021 - Coupled Multiphysics Simulations of Heat Pipe Microreactors Using DireWolf.pdf} -} - -@article{mattosLatentAutoregressiveGaussian2016, - title = {Latent {{Autoregressive Gaussian Processes Models}} for {{Robust System Identification}}}, - author = {Mattos, César Lincoln C. and Damianou, Andreas and Barreto, Guilherme A. and Lawrence, Neil D.}, - date = {2016}, - journaltitle = {IFAC-PapersOnLine}, - shortjournal = {IFAC-PapersOnLine}, - volume = {49}, - number = {7}, - pages = {1121--1126}, - issn = {24058963}, - doi = {10.1016/j.ifacol.2016.07.353}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S2405896316305602}, - urldate = {2022-04-21}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/3VH79UFV/Mattos et al. - 2016 - Latent Autoregressive Gaussian Processes Models fo.pdf} -} - -@article{matusuRegionsRobustRelative2023, - title = {Regions of Robust Relative Stability for {{PI}} Controllers and {{LTI}} Plants with Unstructured Multiplicative Uncertainty: {{A}} Second-Order-Based Example}, - shorttitle = {Regions of Robust Relative Stability for {{PI}} Controllers and {{LTI}} Plants with Unstructured Multiplicative Uncertainty}, - author = {Matušů, Radek and Senol, Bilal and Pekař, Libor}, - date = {2023-08-01}, - journaltitle = {Heliyon}, - shortjournal = {Heliyon}, - volume = {9}, - number = {8}, - eprint = {37560646}, - eprinttype = {pubmed}, - publisher = {Elsevier}, - issn = {2405-8440}, - doi = {10.1016/j.heliyon.2023.e18924}, - url = {https://www.cell.com/heliyon/abstract/S2405-8440(23)06132-7}, - urldate = {2024-10-15}, - langid = {english}, - keywords = {H-Infinity norm,PI controllers,Robust control,Robust performance,Robust relative stability,Unstructured multiplicative uncertainty}, - file = {/home/danesabo/Zotero/storage/6JTZB7BD/Matušů et al. - 2023 - Regions of robust relative stability for PI controllers and LTI plants with unstructured multiplicat.pdf} -} - -@article{mazeikaMBSEsecModelBasedSystems2020, - title = {{{MBSEsec}}: {{Model-Based Systems Engineering Method}} for {{Creating Secure Systems}}}, - shorttitle = {{{MBSEsec}}}, - author = {Mazeika, Donatas and Butleris, Rimantas}, - date = {2020-04}, - journaltitle = {APPLIED SCIENCES-BASEL}, - shortjournal = {Appl. Sci.-Basel}, - volume = {10}, - number = {7}, - pages = {2574}, - publisher = {MDPI}, - location = {Basel}, - issn = {2076-3417}, - doi = {10.3390/app10072574}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {This paper presents how Model-Based System Engineering (MBSE) could be leveraged in order to mitigate security risks at an early stage of system development. Primarily, MBSE was used to manage complex engineering projects in terms of system requirements, design, analysis, verification, and validation activities, leaving security aspects aside. However, previous research showed that security requirements and risks could be tackled in the MBSE model, and powerful MBSE tools such as simulation, change impact analysis, automated document generation, validation, and verification could be successfully reused in the multidisciplinary field. This article analyzes various security-related techniques and then clarifies how these techniques can be represented in the Systems Modeling Language (SysML) model and then further exploited with MBSE tools. The paper introduces the MBSEsec method, which gives guidelines for the security analysis process, the SysML/UML-based security profile, and recommendations on what security technique is needed at each security process phase. The MBSEsec method was verified by creating an application case study that reflects real-world problems and running an experiment where systems and security engineers evaluated the feasibility of our approach.}, - langid = {english}, - pagetotal = {18}, - annotation = {Web of Science ID: WOS:000533356200373}, - file = {/home/danesabo/Zotero/storage/MQPTV3QX/Mazeika and Butleris - 2020 - MBSEsec Model-Based Systems Engineering Method fo.pdf} -} - @inproceedings{mclaughlinControllerawareFalseData2014, title = {Controller-Aware False Data Injection against Programmable Logic Controllers}, booktitle = {2014 {{IEEE International Conference}} on {{Smart Grid Communications}} ({{SmartGridComm}})}, @@ -8138,52 +4894,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/XRHNBS62/McLaughlin and Zonouz - 2014 - Controller-aware false data injection against prog.pdf;/home/danesabo/Zotero/storage/Q2LEVUCB/7007754.html} } -@online{ME2046_Introduction_Reading_Chapter_1pdf2254ME, - title = {{{ME2046}}\_{{Introduction}}\_{{Reading}}\_{{Chapter}}\_1.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19363968?module_item_id=5477526}, - urldate = {2025-01-09}, - file = {/home/danesabo/Zotero/storage/HCGVIXG6/ME2046_Introduction_Reading_Chapter_1.pdf 2254 ME 2046 SEC1000 DIGITAL CONTROL SYSTEMS.pdf;/home/danesabo/Zotero/storage/BKIG2CBT/19363968.html} -} - -@online{ME2046_Sampled_Data_Analysis_Reading_Chapter_2pdf2254ME, - title = {{{ME2046}}\_{{Sampled}}\_{{Data}}\_{{Analysis}}\_{{Reading}}\_{{Chapter}}\_2.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19363969?module_item_id=5477527}, - urldate = {2025-01-09}, - file = {/home/danesabo/Zotero/storage/YNCF6DPS/ME2046_Sampled_Data_Analysis_Reading_Chapter_2.pdf 2254 ME 2046 SEC1000 DIGITAL CONTROL SYSTEMS.pdf} -} - -@online{ME2046_The_z_transform_Chapter_3pdf2254ME, - title = {{{ME2046}}\_{{The}}\_z\_transform\_{{Chapter}}\_3.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19363970?module_item_id=5477528}, - urldate = {2025-01-09} -} - -@online{ME2046_The_z_transform_Chapter_3pdf2254MEa, - title = {{{ME2046}}\_{{The}}\_z\_transform\_{{Chapter}}\_3.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19363970?module_item_id=5477528}, - urldate = {2025-01-16}, - file = {/home/danesabo/Zotero/storage/64RKS2MZ/ME2046_The_z_transform_Chapter_3.pdf 2254 ME 2046 SEC1000 DIGITAL CONTROL SYSTEMS.pdf;/home/danesabo/Zotero/storage/3ZCR7KAV/19363970.html} -} - -@online{ME2046_The_z_transform_Chapter_3pdf2254MEb, - title = {{{ME2046}}\_{{The}}\_z\_transform\_{{Chapter}}\_3.Pdf: 2254 {{ME}} 2046 {{SEC1000 DIGITAL CONTROL SYSTEMS}}}, - url = {https://canvas.pitt.edu/courses/301794/files/19363970?module_item_id=5477528}, - urldate = {2025-01-09} -} - -@thesis{medeirosFaultIntrusionTolerant2011, - type = {mathesis}, - title = {A Fault - and Intrusion - Tolerant Architecture for {{EDP Distribuição SCADA}} System}, - author = {Medeiros, Nuno André Carnido}, - date = {2011}, - institution = {University of Lisbon}, - url = {https://repositorio.ul.pt/handle/10451/8812}, - urldate = {2022-03-31}, - langid = {english}, - annotation = {Accepted: 2013-07-16T11:03:46Z}, - file = {/home/danesabo/Zotero/storage/Q96Y5J5L/Medeiros - 2011 - A fault - and intrusion - tolerant architecture fo.pdf;/home/danesabo/Zotero/storage/CF2UFJ88/8812.html} -} - @article{meinsmaElementaryProofRouthHurwitz1995, title = {Elementary Proof of the {{Routh-Hurwitz}} Test}, author = {Meinsma, Gjerrit}, @@ -8266,28 +4976,6 @@ for defect classification of TFT–LCD panels.pdf} annotation = {Web of Science ID: WOS:000953658900001} } -@article{meskeDesigningImplementingDigital2021, - title = {Designing and {{Implementing Digital Twins}} in the {{Energy Grid Sector}}}, - author = {Meske, Christian and Osmundsen, Karen S. and Junglas, Iris}, - date = {2021-09}, - journaltitle = {Mis Quarterly Executive}, - shortjournal = {MIS Q. Exec.}, - volume = {20}, - number = {3}, - pages = {183--198}, - publisher = {Indiana Univ, Oper \& Decision Technol Dept}, - location = {Bloomington}, - issn = {1540-1960}, - doi = {10.17705/2msqe.00048}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1?markedListId=List%202}, - urldate = {2022-03-08}, - abstract = {Digital twins, which replicate physical assets, are perceived as enablers of digital transformation. But implementations of digital twins are still rare, and there is little advice on how to successfully develop them. We describe how a Norwegian power grid company and its technology partners designed and implemented a digital twin of its grid network, and show that a digital twin's unique characteristics are a crucial source of organizational learning that require innovative co-creation efforts and effective data governance. We also provide recommendations for designing and implementing digital twins.(1, 2)}, - langid = {english}, - keywords = {DGC read}, - annotation = {WOS:000694715100003}, - file = {/home/danesabo/Zotero/storage/6442XE53/Meske et al. - 2021 - Designing and Implementing Digital Twins in the En.pdf} -} - @online{MethodQuantifyingProgram, title = {A {{Method}} of {{Quantifying Program}} and {{Course Performances}} against {{ABET Criteria}} - {{Knovel}}}, url = {https://app-knovel-com.pitt.idm.oclc.org/web/view/khtml/show.v/rcid:kpANTECPS4/cid:kt003RZTC2/viewerType:khtml//root_slug:antec-2005-plastics-annual/url_slug:method-quantifying-program?b-q=designing%20and%20teaching%20courses%20to%20satisfy%20the%20abet%20engineering%20criteria&include_synonyms=no&s_page_no=0&sort_on=default&view=collapsed&zoom=1&page=1&q=designing%20and%20teaching%20courses%20to%20satisfy%20the%20abet%20engineering%20criteria}, @@ -8308,24 +4996,6 @@ for defect classification of TFT–LCD panels.pdf} file = {/home/danesabo/Zotero/storage/WPMWJK8Q/Micali et al. - 2020 - Compact Certificates of Collective Knowledge.pdf} } -@article{micchelliLearningVectorValuedFunctions2005, - title = {On {{Learning Vector-Valued Functions}}}, - author = {Micchelli, Charles A. and Pontil, Massimiliano}, - date = {2005-01-01}, - journaltitle = {Neural Computation}, - shortjournal = {Neural Computation}, - volume = {17}, - number = {1}, - pages = {177--204}, - issn = {0899-7667, 1530-888X}, - doi = {10.1162/0899766052530802}, - url = {https://direct.mit.edu/neco/article/17/1/177-204/6909}, - urldate = {2022-04-20}, - abstract = {In this letter, we provide a study of learning in a Hilbert space of vector-valued functions. We motivate the need for extending learning theory of scalar-valued functions by practical considerations and establish some basic results for learning vector-valued functions that should prove useful in applications. Specifically, we allow an output space Y to be a Hilbert space, and we consider a reproducing kernel Hilbert space of functions whose values lie in Y. In this setting, we derive the form of the minimal norm interpolant to a finite set of data and apply it to study some regularization functionals that are important in learning theory. We consider specific examples of such functionals corresponding to multiple-output regularization networks and support vector machines, for both regression and classification. Finally, we provide classes of operator-valued kernels of the dot product and translation-invariant type.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/56WYVS4J/Micchelli and Pontil - 2005 - On Learning Vector-Valued Functions.pdf} -} - @article{michaelFormalMethodsCyberphysical2021, title = {Formal {{Methods}} in {{Cyberphysical Systems}}}, author = {Michael, James Bret and Drusinsky, Doron and Wijesekera, Duminda}, @@ -8408,30 +5078,6 @@ for defect classification of TFT–LCD panels.pdf} Insights from the Social Sciences.pdf} } -@article{miPredictionMaintenanceIntegrated2021, - title = {Prediction Maintenance Integrated Decision-Making Approach Supported by Digital Twin-Driven Cooperative Awareness and Interconnection Framework}, - author = {Mi, Shanghua and Feng, Yixiong and Zheng, Hao and Wang, Yong and Gao, Yicong and Tan, Jianrong}, - date = {2021-01}, - journaltitle = {Journal of Manufacturing Systems}, - shortjournal = {Journal of Manufacturing Systems}, - volume = {58}, - pages = {329--345}, - issn = {02786125}, - doi = {10.1016/j.jmsy.2020.08.001}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0278612520301345}, - urldate = {2022-03-02}, - abstract = {Predictive maintenance is one of the important technical means to guarantee and improve the normal industrial production. The existing bottlenecks for popularization and application are analyzed. In order to solve these problems, a cooperative awareness and interconnection framework across multiple organizations for total factors that affect prediction maintenance decision-making is discussed. Initially, the structure and operation mecha­ nism of this framework are proposed. It is designed to support the sharing of data, knowledge and resources. As a key supporting technology, the digital twin is also integrated into it to improve the accuracy of fault diagnosis and prediction and support making a maintenance plan with higher accuracy and reliability. Then, under this framework, an integrated mathematical programming model is established with considering the parameter uncertainty and an NSGA-II hybrid algorithm is utilized to solve it. Moreover, an adjustment strategy for a maintenance plan is discussed in response to the dynamic characteristics of the actual maintenance environment. Finally, a case, prediction maintenance decision-making for bearings in grinding rolls of the large vertical mill, is studied. Analysis results verify the advantage of the integrated solving mechanism based on the proposed framework. The framework and integrated decision-making approach can guide the implementation of predic­ tive maintenance with higher accuracy and reliability for industrial enterprises.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/BPP4UBBQ/Predicition maintenance intgrated DM supported by DT.pdf} -} - -@online{MissionAccomplishedIntroduction, - title = {Mission {{Accomplished}}: {{An Introduction}} to {{Formal Methods}} in {{Mobile Robot Motion Planning}} and {{Control}} | {{Unmanned Systems}}}, - url = {https://www.worldscientific.com/doi/abs/10.1142/S2301385014300029}, - urldate = {2022-06-20}, - file = {/home/danesabo/Zotero/storage/X6N9DR6A/S2301385014300029.html} -} - @video{mitcbmmDiffusionScoreBasedGenerative2023, entrysubtype = {video}, title = {Diffusion and {{Score-Based Generative Models}}}, @@ -8526,13 +5172,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/JBSEDF23/Mitra and Chandy - 2008 - A Formalized Theory for Verifying Stability and Co.pdf} } -@online{MITREATTCK, - title = {{{MITRE ATT}}\&{{CK}}®}, - url = {https://attack.mitre.org/}, - urldate = {2024-12-10}, - file = {/home/danesabo/Zotero/storage/2MFSA9E2/attack.mitre.org.html} -} - @online{MizarHomePage, title = {Mizar {{Home Page}}}, url = {http://mizar.org/}, @@ -8540,210 +5179,12 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/W9TGRJZ9/mizar.org.html} } -@standard{MODBUSMessagingTCP06, - title = {{{MODBUS Messaging}} on {{TCP}}/{{IP Implementation Guide V1}}.0b}, - date = {0006-10-24}, - url = {https://www.modbus.org/docs/Modbus_Messaging_Implementation_Guide_V1_0b.pdf}, - urldate = {2025-01-29}, - version = {1.0B} -} - -@online{ModbusSpecificationsImplementation, - title = {Modbus {{Specifications}} and {{Implementation Guides}}}, - url = {https://www.modbus.org/specs.php}, - urldate = {2025-01-29}, - file = {/home/danesabo/Zotero/storage/ABTCX2K8/specs.html} -} - -@online{ModelBasedSystemsEngineering, - title = {Model-{{Based Systems Engineering}}}, - url = {https://scaledagileframework.com/model-based-systems-engineering/}, - urldate = {2023-10-06}, - abstract = {All models are wrong, but some are useful. —George E. P. Box ~ Model-Based Systems Engineering MBSE is the application of modeling systems as a cost-effective way to explore and document system characteristics. By testing and validating system characteristics early, models facilitate timely learning of properties and behaviors, enabling fast feedback on requirements and design decisions. Models provide an efficient way to explore, update, and communicate system aspects to stakeholders while significantly reducing or eliminating dependence on traditional documents. MBSERead more}, - langid = {american}, - organization = {Scaled Agile Framework}, - file = {/home/danesabo/Zotero/storage/MLK9H74Z/model-based-systems-engineering.html;/home/danesabo/Zotero/storage/XZ8D7XM8/model-based-systems-engineering.html} -} - -@online{ModelBasedSystemsEngineeringa, - title = {Model-{{Based Systems Engineering}} ({{MBSE}})}, - url = {https://www.mathworks.com/solutions/model-based-systems-engineering.html}, - urldate = {2023-10-06}, - abstract = {Manage system complexity, improve communication, and produce optimized systems with Model-Based System Engineering.}, - langid = {english} -} - @online{ModelFreePlantTuning, title = {Model-{{Free Plant Tuning}} | {{IEEE Journals}} \& {{Magazine}} | {{IEEE Xplore}}}, url = {https://ieeexplore.ieee.org/abstract/document/7586127}, urldate = {2024-07-10} } -@online{Module_10_Notespdf2251NUCE, - title = {Module\_10\_{{Notes}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486317?module_item_id=5008246}, - urldate = {2024-11-05}, - file = {/home/danesabo/Zotero/storage/CZ8T42B9/Module_10_Notes.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/IWIBHHH2/17486317.html} -} - -@online{Module101Heat, - title = {Module 10.1 - {{Heat Generation}} in {{Reactor Structure}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486315?module_item_id=5008243}, - urldate = {2024-11-05}, - file = {/home/danesabo/Zotero/storage/BVZ8R6Y6/Module 10.1 - Heat Generation in Reactor Structure.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR.pdf;/home/danesabo/Zotero/storage/UV4FSZ2U/17486315.html} -} - -@online{Module102Convective, - title = {Module 10.2 - {{Convective Heat Transfer}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486277?module_item_id=5008244}, - urldate = {2024-11-05}, - file = {/home/danesabo/Zotero/storage/3TCIS49R/Module 10.2 - Convective Heat Transfer.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/FM8E6E33/17486277.html} -} - -@online{Module10Reviewpdf, - title = {Module 10 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486254?module_item_id=5008245}, - urldate = {2024-11-05}, - file = {/home/danesabo/Zotero/storage/8EZ9FFD3/Module 10 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/BK36WRH6/17486254.html} -} - -@online{Module111Pressure, - title = {Module 11.1 - {{Pressure Drop}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486318?module_item_id=5008255}, - urldate = {2024-11-12}, - file = {/home/danesabo/Zotero/storage/XLV9LK8M/Module 11.1 - Pressure Drop.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/K7YI66P2/17486318.html} -} - -@online{Module112Closed, - title = {Module 11.2 - {{Closed Channel Analysis}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486320?module_item_id=5008256}, - urldate = {2024-11-12}, - file = {/home/danesabo/Zotero/storage/777A5FPL/Module 11.2 - Closed Channel Analysis.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/TKW3SUEL/17486320.html} -} - -@online{Module113TwoPhase, - title = {Module 11.3 - {{Two-Phase Flow}} and {{Boiling}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486319?module_item_id=5008257}, - urldate = {2024-11-12}, - file = {/home/danesabo/Zotero/storage/EKZ5TJY3/Module 11.3 - Two-Phase Flow and Boiling.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/V24U7V5E/17486319.html} -} - -@online{Module114Boiling, - title = {Module 11.4 - {{Boiling Crisis}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486261?module_item_id=5008258}, - urldate = {2024-11-12}, - file = {/home/danesabo/Zotero/storage/8GFSZ3NN/Module 11.4 - Boiling Crisis.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/KNVAQ22T/17486261.html} -} - -@online{Module11Notespdf, - title = {Module 11 {{Notes}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486281?module_item_id=5008259}, - urldate = {2024-11-19}, - file = {/home/danesabo/Zotero/storage/Q8NADH2Q/Module 11 Notes.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/DH2HXJLX/17486281.html} -} - -@online{Module11Reviewpdf, - title = {Module 11 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486301?module_item_id=5008260}, - urldate = {2024-11-19}, - file = {/home/danesabo/Zotero/storage/ZEVV9CTP/Module 11 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/KN87QJPQ/17486301.html} -} - -@online{Module121Thermodynamic, - title = {Module 12.1 - {{Thermodynamic Fundamentals}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486296?module_item_id=5008271}, - urldate = {2024-11-19}, - file = {/home/danesabo/Zotero/storage/JXA8LHJI/Module 12.1 - Thermodynamic Fundamentals.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/AUCH6XTE/17486296.html} -} - -@online{Module122Rankine, - title = {Module 12.2 - {{Rankine Cycle}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486181?module_item_id=5008270}, - urldate = {2024-11-19}, - file = {/home/danesabo/Zotero/storage/ZWPDZH7G/Module 12.2 - Rankine Cycle.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/BPCBMFLE/17486181.html} -} - -@online{Module123Methods, - title = {Module 12.3 - {{Methods}} to {{Increase Efficiency}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486299?module_item_id=5008272}, - urldate = {2024-11-19}, - file = {/home/danesabo/Zotero/storage/JTTPBD28/Module 12.3 - Methods to Increase Efficiency.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/C5MUSQU9/17486299.html} -} - -@online{Module81Fission, - title = {Module 8.1 - {{Fission Heat Generation-1}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486316?module_item_id=5008211}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/DVCE48RB/Module 8.1 - Fission Heat Generation-1.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/PUILTK75/17486316.html} -} - -@online{Module82Decay, - title = {Module 8.2 - {{Decay Heat}}, {{Plant Parameters}}, {{Design-1}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486248?module_item_id=5008212}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/WCPGR2IY/Module 8.2 - Decay Heat, Plant Parameters, Design-1.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR.pdf} -} - -@online{Module83Heat, - title = {Module 8.3 - {{Heat Conduction-1}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486217?module_item_id=5008213}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/EAWWPR9P/Module 8.3 - Heat Conduction-1.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/RQ5ICY3R/17486217.html} -} - -@online{Module8Class, - title = {Module 8 {{Class Notes-1}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486215?module_item_id=5008215}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/LQN7X96B/Module 8 Class Notes-1.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/EU6QMXAZ/17486215.html} -} - -@online{Module8Review1pdf, - title = {Module 8 {{Review-1}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486300?module_item_id=5008214}, - urldate = {2024-10-29}, - file = {/home/danesabo/Zotero/storage/JMCTU5LC/Module 8 Review-1.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/TRAWYPDA/17486300.html} -} - -@online{Module91NonIdeal, - title = {Module 9.1 - {{Non-Ideal Conduction}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486245?module_item_id=5008227}, - urldate = {2024-11-05}, - file = {/home/danesabo/Zotero/storage/H6TSG6E4/Module 9.1 - Non-Ideal Conduction.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/J5LBE3WR/17486245.html} -} - -@online{Module9Class, - title = {Module 9 {{Class Notes}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486302?module_item_id=5008229}, - urldate = {2024-11-05}, - file = {/home/danesabo/Zotero/storage/QMAZHA6B/Module 9 Class Notes.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/6VTJ86YT/17486302.html} -} - -@online{Module9Reviewpdf, - title = {Module 9 {{Review}}.Pdf: 2251 {{NUCE}} 2100 {{SEC1250 FUNDAMENTALS NUCLEAR ENGR}}}, - url = {https://canvas.pitt.edu/courses/280885/files/17486314?module_item_id=5008228}, - urldate = {2024-11-05}, - file = {/home/danesabo/Zotero/storage/LMDMTSWZ/Module 9 Review.pdf 2251 NUCE 2100 SEC1250 FUNDAMENTALS NUCLEAR ENGR.pdf;/home/danesabo/Zotero/storage/XCBWNRXB/17486314.html} -} - -@inproceedings{mohanS3ASecureSystem2013, - title = {{{S3A}}: Secure System Simplex Architecture for Enhanced Security and Robustness of Cyber-Physical Systems}, - shorttitle = {{{S3A}}}, - booktitle = {Proceedings of the 2nd {{ACM}} International Conference on {{High}} Confidence Networked Systems}, - author = {Mohan, Sibin and Bak, Stanley and Betti, Emiliano and Yun, Heechul and Sha, Lui and Caccamo, Marco}, - date = {2013-04-09}, - series = {{{HiCoNS}} '13}, - pages = {65--74}, - publisher = {Association for Computing Machinery}, - location = {New York, NY, USA}, - doi = {10.1145/2461446.2461456}, - url = {https://dl.acm.org/doi/10.1145/2461446.2461456}, - urldate = {2023-09-27}, - abstract = {The recently discovered 'W32.Stuxnet' worm has drastically changed the perception that systems managing critical infrastructure are invulnerable to software security attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic real-time) execution behavior to detect an intrusion within 0.6 μs while still guaranteeing the safety of the plant. We also show that even if an attacker is successful (or gains access to the operating system's administrative privileges), the overall state of the physical system still remains safe.}, - isbn = {978-1-4503-1961-4}, - file = {/home/danesabo/Zotero/storage/LM7GC5CP/Mohan et al. - 2013 - S3A secure system simplex architecture for enhanc.pdf} -} - @article{molnarInterpretableMachineLearning, title = {Interpretable {{Machine Learning}}}, author = {Molnar, Christoph}, @@ -8751,24 +5192,7 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/TB28329T/Molnar - Interpretable Machine Learning.pdf} } -@article{montalvoFirstEvidencePivotal2016, - title = {First Evidence of the Pivotal Motion ("tilting Mode") of the Core {{Barrel}} in the {{RINGHALS-4 PWR}}}, - author = {Montalvo, C. and Pazsit, Imre and Nylén, H. and Dykin, Victor}, - date = {2016}, - pages = {2571}, - issn = {1510825738}, - abstract = {The Division of Subatomic Physics and Plasma Physics (formerly Division of Nuclear Engineering) in Chalmers, Göteborg, and the Ringhals Nuclear Plant have investigated the core barrel vibrations in the Ringhals PWRs over the last 20 years. Based on the different symmetry properties of the vibration modes, a mode separation technique was developed to enhance the contributions from the different modes. Recent observations of wear at both the lower and upper core-barrel-support structures in the Ringhals PWRs indicated that vibration modes of the core barrel other than pendular (beam mode) and shell mode are likely to occur. A beam mode type movement alone is not able to explain such a wear, and therefore, it is fair to assume that the vibration mode in question is a small amplitude periodic tilting movement of the core barrel around a horizontal, diagonal pivot at the half height of the core. In this work, ex-core data taken in the Ringhals-4 PWR were analyzed in order to find evidence of such a tilting movement. First, cross spectra between various ex-core detectors were calculated and analyzed to locate the frequency range of the new vibrational mode. Then, a model based on symmetry considerations was derived in order to extract the sought mode from the spectra. The measurements were evaluated by the new mode enhancement technique. The results show that it is possible to enhance such a mode and find it in the spectra by properly combining the signals in the time domain.} -} - -@inproceedings{montalvomartinSurveillanceDiagnosticsBeam2012, - title = {Surveillance and Diagnostics of the Beam Mode Vibrations of the Ringhals Pwrs}, - author = {Montalvo Martín, Cristina and Pázsit, Imre and Nylén, Henrik}, - date = {2012}, - publisher = {E.T.S.I. Minas (UPM)}, - abstract = {Surveillance of core barrel vibrations has been performed in the Swedish Ringhals PWRs for several years. This surveillance is focused mainly on the pendular motion of the core barrel, which is known as the beam mode. The monitoring of the beam mode has suggested that its amplitude increases along the cycle and decreases after refuelling. In the last 5 years several measurements have been taken in order to understand this behaviour. Besides, a non-linear fitting procedure has been implemented in order to better distinguish the different components of vibration. By using this fitting procedure, two modes of vibration have been identified in the frequency range of the beam mode. Several results coming from the trend analysis performed during these years indicate that one of the modes is due to the core barrel motion itself and the other is due to the individual flow induced vibrations of the fuel elements. In this work, the latest results of this monitoring are presented.} -} - -@online{Montreat360App2022, +@online{Montreat360degApp2022, title = {Montreat 360° | {{App}} for {{Students}} at {{Montreat College}}}, date = {2022-09-29T12:14:19-04:00}, url = {https://www.montreat.edu/student-life/montreat-360/}, @@ -8778,25 +5202,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/9FJP5RP9/montreat-360.html} } -@article{moratoOptimalInspectionMaintenance2022, - title = {Optimal {{Inspection}} and {{Maintenance Planning}} for {{Deteriorating Structural Components}} through {{Dynamic Bayesian Networks}} and {{Markov Decision Processes}}}, - author = {Morato, P. G. and Papakonstantinou, K. G. and Andriotis, C. P. and Nielsen, J. S. and Rigo, P.}, - date = {2022-01}, - journaltitle = {Structural Safety}, - shortjournal = {Structural Safety}, - volume = {94}, - eprint = {2009.04547}, - eprinttype = {arXiv}, - pages = {102140}, - issn = {01674730}, - doi = {10.1016/j.strusafe.2021.102140}, - url = {http://arxiv.org/abs/2009.04547}, - urldate = {2022-02-11}, - abstract = {Civil and maritime engineering systems, among others, from bridges to offshore platforms and wind turbines, must be efficiently managed as they are exposed to deterioration mechanisms throughout their operational life, such as fatigue or corrosion. Identifying optimal inspection and maintenance policies demands the solution of a complex sequential decision-making problem under uncertainty, with the main objective of efficiently controlling the risk associated with structural failures. Addressing this complexity, risk-based inspection planning methodologies, supported often by dynamic Bayesian networks, evaluate a set of pre-defined heuristic decision rules to reasonably simplify the decision problem. However, the resulting policies may be compromised by the limited space considered in the definition of the decision rules. Avoiding this limitation, Partially Observable Markov Decision Processes (POMDPs) provide a principled mathematical methodology for stochastic optimal control under uncertain action outcomes and observations, in which the optimal actions are prescribed as a function of the entire, dynamically updated, state probability distribution. In this paper, we combine dynamic Bayesian networks with POMDPs in a joint framework for optimal inspection and maintenance planning, and we provide the relevant formulation for developing both infinite and finite horizon POMDPs in a structural reliability context. The proposed methodology is implemented and tested for the case of a structural component subject to fatigue deterioration, demonstrating the capability of state-of-the-art point-based POMDP solvers for solving the underlying planning optimization problem. Within the numerical experiments, POMDP and heuristic-based policies are thoroughly compared, and results showcase that POMDPs achieve substantially lower costs as compared to their counterparts, even for traditional problem settings.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/DY5RDTUF/Morato et al. - 2022 - Optimal Inspection and Maintenance Planning for De.pdf} -} - @article{morrisTOPOLOGYTEARS, title = {{{TOPOLOGY WITHOUT TEARS}}}, author = {Morris, Sidney A}, @@ -8804,7 +5209,7 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/XW2TWDNT/Morris - TOPOLOGY WITHOUT TEARS.pdf} } -@incollection{mouraLeanTheoremProver2021, +@incollection{mouraLean4Theorem2021, title = {The {{Lean}} 4 {{Theorem Prover}} and {{Programming Language}}}, booktitle = {Automated {{Deduction}} – {{CADE}} 28}, author = {Moura, Leonardo De and Ullrich, Sebastian}, @@ -8823,44 +5228,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/3T2YF7EE/Moura and Ullrich - 2021 - The Lean 4 Theorem Prover and Programming Language.pdf} } -@article{moyaDigitalTwinsThat2020, - title = {Digital Twins That Learn and Correct Themselves}, - author = {Moya, Beatriz and Badías, Alberto and Alfaro, Icíar and Chinesta, Francisco and Cueto, Elías}, - date = {2020-09-24}, - journaltitle = {International Journal for Numerical Methods in Engineering}, - shortjournal = {Int J Numer Methods Eng}, - pages = {nme.6535}, - issn = {0029-5981, 1097-0207}, - doi = {10.1002/nme.6535}, - url = {https://onlinelibrary.wiley.com/doi/10.1002/nme.6535}, - urldate = {2022-03-02}, - abstract = {Digital twins can be defined as digital representations of physical entities that employ real-time data to enable understanding of the operating conditions of these entities. Here we present a particular type of digital twin that involves a combination of computer vision, scientific machine learning, and augmented reality. This novel digital twin is able, therefore, to see, to interpret what it sees—and, if necessary, to correct the model it is equipped with—and presents the resulting information in the form of augmented reality. The computer vision capabilities allow the twin to receive data continuously. As any other digital twin, it is equipped with one or more models so as to assimilate data. However, if persistent deviations from the predicted values are found, the proposed methodology is able to correct on the fly the existing models, so as to accommodate them to the measured reality. Finally, the suggested methodology is completed with augmented reality capabilities so as to render a completely new type of digital twin. These concepts are tested against a proof-of-concept model consisting on a nonlinear, hyperelastic beam subjected to moving loads whose exact position is to be determined.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/DRTJ6ZXC/Digital twins that learn to correct themselves.pdf} -} - -@report{muhlheimet.alCriteriaDeterminingSafety2023, - type = {Technical Letter Report}, - title = {Criteria for {{Determining}} the {{Safety}} of {{Wireless Technologies}} at {{Nuclear Power Plants}}}, - author = {Muhlheim et. al}, - date = {2023-03}, - number = {TLR-RES-DE-2023-006}, - institution = {U.S. NRC}, - file = {/home/danesabo/Zotero/storage/CM754CEP/Muhlheim et. al - 2023 - Criteria for Determining the Safety of Wireless Technologies at Nuclear Power Plants.pdf} -} - -@inreference{MultipleIndependentLevels2022, - title = {Multiple {{Independent Levels}} of {{Security}}}, - booktitle = {Wikipedia}, - date = {2022-11-10T17:31:06Z}, - url = {https://en.wikipedia.org/w/index.php?title=Multiple_Independent_Levels_of_Security&oldid=1121130466}, - urldate = {2023-10-03}, - abstract = {Multiple Independent Levels of Security/Safety (MILS) is a high-assurance security architecture based on the concepts of separation and controlled information flow. It is implemented by separation mechanisms that support both untrusted and trustworthy components; ensuring that the total security solution is non-bypassable, evaluatable, always invoked, and tamperproof.}, - langid = {english}, - annotation = {Page Version ID: 1121130466}, - file = {/home/danesabo/Zotero/storage/ZYURWFPB/Multiple_Independent_Levels_of_Security.html} -} - @article{murakamiRecursiveRealizationFinite1977, title = {Recursive Realization of Finite Impulse Filters Using Finite Field Arithmetic}, author = {Murakami, H. and Reed, I.}, @@ -8913,26 +5280,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/XDEBM7CF/Murdoch et al. - 2019 - Definitions, methods, and applications in interpre.pdf} } -@online{MysteriousNewRansomware, - title = {Mysterious {{New Ransomware Targets Industrial Control Systems}} | {{WIRED}}}, - url = {https://www.wired.com/story/ekans-ransomware-industrial-control-systems/}, - urldate = {2022-04-02}, - file = {/home/danesabo/Zotero/storage/CCBQWWTS/ekans-ransomware-industrial-control-systems.html} -} - -@report{narayananDeterringAttacksPower2020, - title = {Deterring {{Attacks Against}} the {{Power Grid}}: {{Two Approaches}} for the {{U}}.{{S}}. {{Department}} of {{Defense}}}, - shorttitle = {Deterring {{Attacks Against}} the {{Power Grid}}}, - author = {Narayanan, Anu and Welburn, Jonathan W. and Miller, Benjamin M. and Li, Sheng Tao and Clark-Ginsberg, Aaron}, - date = {2020-01-06}, - institution = {RAND Corporation}, - url = {https://www.rand.org/pubs/research_reports/RR3187.html}, - urldate = {2022-03-22}, - abstract = {The U.S. Department of Defense (DoD) increasingly relies on electric power to accomplish critical missions. This report explores two approaches for deterring attacks against the U.S. power grid in a world of increasing cyber aggression: deterrence by denial and deterrence by cost imposition. It is a first step in developing frameworks and context to support DoD decisionmaking in this area.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/5EHCNLSF/Narayanan et al. - 2020 - Deterring Attacks Against the Power Grid Two Appr.pdf} -} - @inproceedings{nardoneFormalSecurityAssessment2016, title = {Formal Security Assessment of {{Modbus}} Protocol}, booktitle = {2016 11th {{International Conference}} for {{Internet Technology}} and {{Secured Transactions}} ({{ICITST}})}, @@ -8951,15 +5298,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/QRG7CDE9/Nardone et al. - 2016 - Formal security assessment of Modbus protocol.pdf} } -@article{natbib, - title = {Natbib}, - author = {Daly, Patrick W}, - pages = {26}, - abstract = {The natbib package is a reimplementation of the LATEX \textbackslash cite command, to work with both author–year and numerical citations. It is compatible with the standard bibliographic style files, such as plain.bst, as well as with those for harvard, apalike, chicago, astron, authordate, and of course natbib.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/3PY4547M/Daly - Natural Sciences Citations and References.pdf} -} - @online{NationalCentersAcademic, title = {National {{Centers}} of {{Academic Excellence}}}, url = {https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/}, @@ -8998,14 +5336,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/NXSJH9UD/National Materials and Manufacturing Board et al. - 2016 - A Vision for the Future of Center-Based Multidisci.pdf} } -@online{nccic2017, - title = {{{NCCIC Year}} in {{Review}} 2017}, - date = {2017}, - url = {https://www.cisa.gov/uscert/sites/default/files/Annual_Reports/NCCIC_Year_in_Review_2017_Final.pdf}, - urldate = {2022-03-25}, - file = {/home/danesabo/Zotero/storage/KNAKW7F6/NCCIC_Year_in_Review_2017_Final.pdf} -} - @report{NCEES2022Annual2022, title = {{{NCEES}} 2022 {{Annual Report}}}, date = {2022}, @@ -9063,36 +5393,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/GSD9XMAQ/Nestler and Fowler - Competency in Cybersecurity Education.pdf} } -@article{netlSystemsViewModern2007, - title = {A Systems View of the Modern Grid}, - author = {family=NETL, given=US, given-i=US}, - date = {2007}, - journaltitle = {White Paper, Jan}, - file = {/home/danesabo/Zotero/storage/PZIF5KHC/NETL - 2007 - A systems view of the modern grid.pdf} -} - -@article{neureiterDomainSpecificModelBased2022, - title = {A {{Domain-Specific}}, {{Model Based Systems Engineering Approach}} for {{Cyber-Physical Systems}}}, - author = {Neureiter, Christian and Binder, Christoph}, - date = {2022-04}, - journaltitle = {SYSTEMS}, - shortjournal = {Systems-Basel}, - volume = {10}, - number = {2}, - pages = {42}, - publisher = {MDPI}, - location = {Basel}, - issn = {2079-8954}, - doi = {10.3390/systems10020042}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2}, - urldate = {2023-10-03}, - abstract = {Model Based Systems Engineering as a scientific discipline tries to address the increasing complexity of today's cyber-physical systems by utilizing different kinds of models. In practical application, however, this approach is often constrained to SysML-based object modeling. Even though this appears to be a suitable approach for dealing with complexity, various restrictions limit stakeholder acceptance. Considering scientific discussions in the context of modeling shows two different schools of thought. On the one hand, arguments for more formalized and rigorous concepts can be found, where on the other hand, the need for more stakeholder-oriented and easier-to-understand concepts is postulated. As both are reasonable, the question of integration arises. To address this aspect, we developed the concept of Domain Specific Systems Engineering. Our research in this field lasted for nearly a decade, and different aspects have been investigated. This paper contributes a summary of the overall approach that integrates the various aspects investigated so far. Thus, the underlying concepts are explained, and the corresponding modeling stack and tool-chain are described in more detail. Further, the practical experiences from various case studies are summarized, and identified shortcomings are discussed.}, - langid = {english}, - pagetotal = {27}, - annotation = {Web of Science ID: WOS:000786858800001}, - file = {/home/danesabo/Zotero/storage/LLE4QGNK/Neureiter and Binder - 2022 - A Domain-Specific, Model Based Systems Engineering.pdf} -} - @article{newellTranslationIEC6113132018, title = {Translation of {{IEC}} 61131-3 {{Function Block Diagrams}} to {{PVS}} for {{Formal Verification}} with {{Real-Time Nuclear Application}}}, author = {Newell, Josh and Pang, Linna and Tremaine, David and Wassyng, Alan and Lawford, Mark}, @@ -9140,24 +5440,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/XQEMQJB8/Nghiem et al. - 2010 - Monte-carlo techniques for falsification of tempor.pdf} } -@article{nguyenDeepReinforcementLearning2021, - title = {Deep {{Reinforcement Learning}} for {{Cyber Security}}}, - author = {Nguyen, Thanh Thi and Reddi, Vijay Janapa}, - date = {2021}, - journaltitle = {IEEE Transactions on Neural Networks and Learning Systems}, - shortjournal = {IEEE Trans. Neural Netw. Learning Syst.}, - eprint = {1906.05799}, - eprinttype = {arXiv}, - pages = {1--17}, - issn = {2162-237X, 2162-2388}, - doi = {10.1109/TNNLS.2021.3121870}, - url = {http://arxiv.org/abs/1906.05799}, - urldate = {2022-03-02}, - abstract = {The scale of Internet-connected systems has increased considerably, and these systems are being exposed to cyber attacks more than ever. The complexity and dynamics of cyber attacks require protecting mechanisms to be responsive, adaptive, and scalable. Machine learning, or more specifically deep reinforcement learning (DRL), methods have been proposed widely to address these issues. By incorporating deep learning into traditional RL, DRL is highly capable of solving complex, dynamic, and especially high-dimensional cyber defense problems. This paper presents a survey of DRL approaches developed for cyber security. We touch on different vital aspects, including DRL-based security methods for cyber-physical systems, autonomous intrusion detection techniques, and multiagent DRL-based game theory simulations for defense strategies against cyber attacks. Extensive discussions and future research directions on DRL-based cyber security are also given. We expect that this comprehensive review provides the foundations for and facilitates future studies on exploring the potential of emerging DRL to cope with increasingly complex cyber security problems.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/HCDIHBAG/DRL for cyber security.pdf} -} - @article{nguyenDigitalTwinApproach2022, title = {A Digital Twin Approach to System-Level Fault Detection and Diagnosis for Improved Equipment Health Monitoring}, author = {Nguyen, Tat Nghia and Ponciroli, Roberto and Bruck, Paul and Esselman, Thomas C. and Rigatti, Joseph A. and Vilim, Richard B.}, @@ -9201,27 +5483,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/D9GHLNPC/Nguyen - Model-Based Diagnostic Frameworks for Fault Detect.pdf} } -@article{nguyenModelbasedSecurityEngineering2017, - title = {Model-Based Security Engineering for Cyber-Physical Systems: {{A}} Systematic Mapping Study}, - shorttitle = {Model-Based Security Engineering for Cyber-Physical Systems}, - author = {Nguyen, Phu H. and Ali, Shaukat and Yue, Tao}, - date = {2017-03}, - journaltitle = {INFORMATION AND SOFTWARE TECHNOLOGY}, - shortjournal = {Inf. Softw. Technol.}, - volume = {83}, - pages = {116--135}, - publisher = {Elsevier}, - location = {Amsterdam}, - issn = {0950-5849, 1873-6025}, - doi = {10.1016/j.infsof.2016.11.004}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2}, - urldate = {2023-10-03}, - abstract = {Context: Cyber-physical systems (CPSs) have emerged to be the next generation of engineered systems driving the so-called fourth industrial revolution. CPSs are becoming more complex, open and more prone to security threats, which urges security to be engineered systematically into CPSs. Model-Based Security Engineering (MBSE) could be a key means to tackle this challenge via security by design, abstraction, and automation. Objective: We aim at providing an initial assessment of the state of the art in MBSE for CPSs (MBSE4CPS). Specifically, this work focuses on finding out I) the publication statistics of MBSE4CPS studies; 2) the characteristics of MBSE4CPS studies; and 3) the open issues of MBSE4CPS research. Method: We conducted a systematic mapping study (SMS) following a rigorous protocol that was developed based on the state-of-the-art SMS and systematic review guidelines. From thousands of relevant publications, we systematically identified 48 primary MBSE4CPS studies for data extraction and synthesis to answer predefined research questions. Results: SMS results show that for three recent years (2014-2016) the number of primary MBSE4CPS studies has increased significantly. Within the primary studies, the popularity of using Domain-Specific Languages (DSLs) is comparable with the use of the standardised UML modelling notation. Most primary studies do not explicitly address specific security concerns (e.g., confidentiality, integrity) but rather focus on security analyses in general on threats, attacks or vulnerabilities. Few primary studies propose to engineer security solutions for CPSs. Many focus on the early stages of development lifecycle such as security requirement engineering or analysis. Conclusion: The SMS does not only provide the state of the art in MBSE4CPS, but also points out several open issues that would deserve more investigation, e.g., the lack of engineering security solutions for CPSs, limited tool support, too few industrial case studies, and the challenge of bridging DSLs in engineering secure CPSs. (C) 2016 Elsevier B.V. All rights reserved.}, - langid = {english}, - pagetotal = {20}, - annotation = {Web of Science ID: WOS:000393006700007} -} - @inproceedings{nguyenPrivacyfirstManufacturingData2023, title = {Towards {{Privacy-first Manufacturing Data Exchange Platform}}}, booktitle = {Proceedings of the 12th {{International Symposium}} on {{Information}} and {{Communication Technology}}}, @@ -9239,65 +5500,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/599XHCEU/Nguyen et al. - 2023 - Towards Privacy-first Manufacturing Data Exchange .pdf} } -@inproceedings{nguyenSurveyPaperDigital2021, - title = {Survey {{Paper}} of {{Digital Twins}} and Their {{Integration}} into {{Electric Power Systems}}}, - booktitle = {2021 {{IEEE Power Energy Society General Meeting}} ({{PESGM}})}, - author = {Nguyen, Sabrina and Abdelhakim, Mai and Kerestes, Robert}, - date = {2021-07}, - pages = {01--05}, - issn = {1944-9933}, - doi = {10.1109/PESGM46819.2021.9638011}, - abstract = {Digital twins are introduced as a solution for various power distribution system applications and security. Power distribution systems engineers lack the capability of knowing the real time status of the system and potential vulnerabilities that can harm it. The digital twin's ability to perform real time calculations and analyses make them a unique tool that can strengthen our understanding of current functions within the power grid, mitigate threats, and perform analyses to improve decision making. The goal of this paper is to introduce digital twins and demonstrate how their application in power systems can help improve efficiency, reliability, and functionality.}, - eventtitle = {2021 {{IEEE Power Energy Society General Meeting}} ({{PESGM}})}, - file = {/home/danesabo/Zotero/storage/9JC4DQCW/Nguyen et al. - 2021 - Survey Paper of Digital Twins and their Integratio.pdf;/home/danesabo/Zotero/storage/D8V56ARH/9638011.html} -} - -@online{nicholGLIDEPhotorealisticImage2022, - title = {{{GLIDE}}: {{Towards Photorealistic Image Generation}} and {{Editing}} with {{Text-Guided Diffusion Models}}}, - shorttitle = {{{GLIDE}}}, - author = {Nichol, Alex and Dhariwal, Prafulla and Ramesh, Aditya and Shyam, Pranav and Mishkin, Pamela and McGrew, Bob and Sutskever, Ilya and Chen, Mark}, - date = {2022-03-08}, - eprint = {2112.10741}, - eprinttype = {arXiv}, - eprintclass = {cs}, - doi = {10.48550/arXiv.2112.10741}, - url = {http://arxiv.org/abs/2112.10741}, - urldate = {2023-10-05}, - abstract = {Diffusion models have recently been shown to generate high-quality synthetic images, especially when paired with a guidance technique to trade off diversity for fidelity. We explore diffusion models for the problem of text-conditional image synthesis and compare two different guidance strategies: CLIP guidance and classifier-free guidance. We find that the latter is preferred by human evaluators for both photorealism and caption similarity, and often produces photorealistic samples. Samples from a 3.5 billion parameter text-conditional diffusion model using classifier-free guidance are favored by human evaluators to those from DALL-E, even when the latter uses expensive CLIP reranking. Additionally, we find that our models can be fine-tuned to perform image inpainting, enabling powerful text-driven image editing. We train a smaller model on a filtered dataset and release the code and weights at https://github.com/openai/glide-text2im.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/3J4B8WWE/Nichol et al. - 2022 - GLIDE Towards Photorealistic Image Generation and.pdf;/home/danesabo/Zotero/storage/9D62GJKI/2112.html} -} - -@online{nicholImprovedDenoisingDiffusion2021, - title = {Improved {{Denoising Diffusion Probabilistic Models}}}, - author = {Nichol, Alex and Dhariwal, Prafulla}, - date = {2021-02-18}, - eprint = {2102.09672}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - doi = {10.48550/arXiv.2102.09672}, - url = {http://arxiv.org/abs/2102.09672}, - urldate = {2023-10-05}, - abstract = {Denoising diffusion probabilistic models (DDPM) are a class of generative models which have recently been shown to produce excellent samples. We show that with a few simple modifications, DDPMs can also achieve competitive log-likelihoods while maintaining high sample quality. Additionally, we find that learning variances of the reverse diffusion process allows sampling with an order of magnitude fewer forward passes with a negligible difference in sample quality, which is important for the practical deployment of these models. We additionally use precision and recall to compare how well DDPMs and GANs cover the target distribution. Finally, we show that the sample quality and likelihood of these models scale smoothly with model capacity and training compute, making them easily scalable. We release our code at https://github.com/openai/improved-diffusion}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/UGGXMX32/Nichol and Dhariwal - 2021 - Improved Denoising Diffusion Probabilistic Models.pdf;/home/danesabo/Zotero/storage/BGVIKW43/2102.html} -} - -@online{nicholImprovedDenoisingDiffusion2021a, - title = {Improved {{Denoising Diffusion Probabilistic Models}}}, - author = {Nichol, Alex and Dhariwal, Prafulla}, - date = {2021-02-18}, - eprint = {2102.09672}, - eprinttype = {arXiv}, - doi = {10.48550/arXiv.2102.09672}, - url = {http://arxiv.org/abs/2102.09672}, - urldate = {2024-11-06}, - abstract = {Denoising diffusion probabilistic models (DDPM) are a class of generative models which have recently been shown to produce excellent samples. We show that with a few simple modifications, DDPMs can also achieve competitive log-likelihoods while maintaining high sample quality. Additionally, we find that learning variances of the reverse diffusion process allows sampling with an order of magnitude fewer forward passes with a negligible difference in sample quality, which is important for the practical deployment of these models. We additionally use precision and recall to compare how well DDPMs and GANs cover the target distribution. Finally, we show that the sample quality and likelihood of these models scale smoothly with model capacity and training compute, making them easily scalable. We release our code at https://github.com/openai/improved-diffusion}, - pubstate = {prepublished}, - keywords = {Computer Science - Artificial Intelligence,Computer Science - Machine Learning,Statistics - Machine Learning}, - file = {/home/danesabo/Zotero/storage/PNYP438A/Nichol and Dhariwal - 2021 - Improved Denoising Diffusion Probabilistic Models.pdf;/home/danesabo/Zotero/storage/V44S65J5/2102.html} -} - @article{nicolCommonWeaknessEnumerations2023, title = {Toward {{Common Weakness Enumerations}} in {{Industrial Control Systems}}}, author = {Nicol, David M. and Shannon, Gregory and Akbar, Monika and Bishop, Matt and Chaney, Michael and Luallen, Matthew}, @@ -9385,18 +5587,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/HDESADN4/Nitsche et al. - 2014 - Towards satisfaction checking of power contracts i.pdf} } -@inproceedings{nogueiraIntrusionTolerantEclipseSCADA2017, - title = {Intrusion-{{Tolerant Eclipse SCADA}}}, - author = {Nogueira, André and Bessani, Alysson and Neves, Nuno}, - date = {2017}, - pages = {2}, - location = {Vienna, Austria}, - abstract = {The paper describes an open-source SCADA system that was enhanced with intrusion-tolerant capabilities, focusing on the aspects related to the challenges that were addressed and the architecture of the solution. Some preliminary performance results are also included.}, - eventtitle = {Symposium on {{Innovative Smart Grid Cybersecurity Solutions}}}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/PVGPS3M4/Nogueira et al. - Intrusion-Tolerant Eclipse SCADA.pdf} -} - @online{normey-ricoTeachingControlBasic2023, title = {Teaching Control with {{Basic Maths}}: {{Introduction}} to {{Process Control}} Course as a Novel Educational Approach for Undergraduate Engineering Programs}, shorttitle = {Teaching Control with {{Basic Maths}}}, @@ -9413,22 +5603,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/LT33TIEF/Normey-Rico and Morato - 2023 - Teaching control with Basic Maths Introduction to.pdf} } -@misc{NOTES, - title = {{{NOTES}}}, - file = {/home/danesabo/Zotero/storage/CE399FII/Doc2.pdf;/home/danesabo/Zotero/storage/H4WDX5YE/email.pdf;/home/danesabo/Zotero/storage/TD5FNZ3U/notes.pdf;/home/danesabo/Zotero/storage/V68WKVC6/Doc.pdf} -} - -@online{nsa2020, - title = {{{NSA Cybersecurity}} 2020 {{Year}} in {{Review}}}, - url = {https://media.defense.gov/2021/Jan/08/2002561651/-1/-1/0/NSA%20CYBERSECURITY%202020%20YEAR%20IN%20REVIEW.PDF/NSA%20CYBERSECURITY%202020%20YEAR%20IN%20REVIEW.PDF}, - urldate = {2022-03-25}, - file = {/home/danesabo/Zotero/storage/PJVIYQFD/NSA CYBERSECURITY 2020 YEAR IN REVIEW.pdf} -} - -@misc{NSF, - date = {2016-03-04} -} - @online{NUARIAddressingNational, title = {{{NUARI}}: {{Addressing National Cyber Security Issues}}}, shorttitle = {{{NUARI}}}, @@ -9438,24 +5612,6 @@ Insights from the Social Sciences.pdf} langid = {english} } -@article{nuseibehAriane5Who1997, - title = {Ariane 5: {{Who Dunnit}}?}, - shorttitle = {Ariane 5}, - author = {Nuseibeh, B.}, - date = {1997-05}, - journaltitle = {IEEE Software}, - shortjournal = {IEEE Softw.}, - volume = {14}, - number = {3}, - pages = {15--16}, - issn = {0740-7459}, - doi = {10.1109/MS.1997.589224}, - url = {http://ieeexplore.ieee.org/document/589224/}, - urldate = {2024-11-11}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/F54U6WIW/Nuseibeh - 1997 - Ariane 5 Who Dunnit.pdf} -} - @online{nuskenSolvingHighdimensionalHamiltonJacobiBellman2023, title = {Solving High-Dimensional {{Hamilton-Jacobi-Bellman PDEs}} Using Neural Networks: Perspectives from the Theory of Controlled Diffusions and Measures on Path Space}, shorttitle = {Solving High-Dimensional {{Hamilton-Jacobi-Bellman PDEs}} Using Neural Networks}, @@ -9545,14 +5701,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/YWXM7VYD/Nuzzo et al. - 2019 - Stochastic Assume-Guarantee Contracts for Cyber-Ph.pdf} } -@article{NYT-colonial, - title = {Colonial {{Pipeline}} Chief Says an Oversight Let Hackers into Its System}, - author = {Krauss, Clifford}, - year = {date accessed 02/13/2022}, - journaltitle = {The New York Times}, - url = {https://www.nytimes.com/2021/06/08/business/colonial-pipeline-hack.html} -} - @article{obeidFormalVerificationSecurity2019, title = {Formal {{Verification}} of {{Security Pattern Composition}}: {{Application}} to {{SCADA}}}, shorttitle = {Formal {{Verification}} of {{Security Pattern Composition}}}, @@ -9589,59 +5737,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/HZLXFU2F/Oberkampf et al. - 2004 - Verification, validation, and predictive capabilit.pdf;/home/danesabo/Zotero/storage/T59DSDXT/Verification-validation-and-predictive-capability.html} } -@book{ogataFormalMethodsSoftware2016, - title = {Formal {{Methods}} and {{Software Engineering}}: 18th {{International Conference}} on {{Formal Engineering Methods}}, {{ICFEM}} 2016, {{Tokyo}}, {{Japan}}, {{November}} 14-18, 2016, {{Proceedings}}}, - shorttitle = {Formal {{Methods}} and {{Software Engineering}}}, - editor = {Ogata, Kazuhiro and Lawford, Mark and Liu, Shaoying}, - date = {2016}, - series = {Lecture {{Notes}} in {{Computer Science}}}, - volume = {10009}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-319-47846-3}, - url = {http://link.springer.com/10.1007/978-3-319-47846-3}, - urldate = {2022-09-30}, - isbn = {978-3-319-47845-6 978-3-319-47846-3}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/DUETMFJL/Ogata et al. - 2016 - Formal Methods and Software Engineering 18th Inte.pdf} -} - -@article{ohaganBayesianAnalysisComputer2006, - title = {Bayesian Analysis of Computer Code Outputs: {{A}} Tutorial}, - shorttitle = {Bayesian Analysis of Computer Code Outputs}, - author = {O’Hagan, A.}, - date = {2006-10}, - journaltitle = {Reliability Engineering \& System Safety}, - shortjournal = {Reliability Engineering \& System Safety}, - volume = {91}, - number = {10--11}, - pages = {1290--1300}, - issn = {09518320}, - doi = {10.1016/j.ress.2005.11.025}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0951832005002383}, - urldate = {2022-04-21}, - abstract = {The Bayesian approach to quantifying, analysing and reducing uncertainty in the application of complex process models is attracting increasing attention amongst users of such models. The range and power of the Bayesian methods is growing and there is already a sizeable literature on these methods. However, most of it is in specialist statistical journals. The purpose of this tutorial is to introduce the more general reader to the Bayesian approach.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/A7IHS3AJ/O’Hagan - 2006 - Bayesian analysis of computer code outputs A tuto.pdf} -} - -@article{olivares-rojasCybersecuritySmartGrid2021, - title = {Towards {{Cybersecurity}} of the {{Smart Grid}} Using {{Digital Twins}}}, - author = {Olivares-Rojas, Juan C. and Reyes-Archundia, Enrique and Gutierrez-Gnecchi, Jose A. and Molina-Moreno, Ismael and Cerda-Jacobo, Jaime and Mendez-Patino, Arturo}, - date = {2021}, - journaltitle = {IEEE Internet Computing}, - shortjournal = {IEEE Internet Comput.}, - pages = {1--1}, - issn = {1089-7801, 1941-0131}, - doi = {10.1109/MIC.2021.3063674}, - url = {https://ieeexplore.ieee.org/document/9368968/}, - urldate = {2022-03-02}, - abstract = {The proliferation of cyber-physical systems is bringing with it the growing need to link these systems with virtual environments. Particularly in the smart grid, the high costs of some devices and especially the imminent need to not be able to manipulate these devices in production environments make necessary mechanisms that allow the manipulation of these physical objects in virtual environments; this has been called a digital twin. On the other hand, cyberattacks are growing in all cyber-physical systems, and in the smart grid, cybersecurity is essential due to the smart grid is a critical infrastructure. This work shows a small implementation of a digital twin system for smart metering systems in a smart home environment for testing cybersecurity issues. The results show that the use of digital twins is feasible in various contexts of the smart grid in particularly in cybersecurity testing.}, - langid = {english}, - keywords = {DGC read,key}, - file = {/home/danesabo/Zotero/storage/CKZJXNNS/Towards_Cybersecurity_of_the_Smart_Grid_using_Digital_Twins.pdf} -} - @inproceedings{oortwijnFormalVerificationIndustrial2019, title = {Formal Verification of an Industrial Safety-Critical Traffic Tunnel Control System}, booktitle = {Integrated {{Formal Methods}}: 15th {{International Conference}}, {{IFM}} 2019, {{Bergen}}, {{Norway}}, {{December}} 2–6, 2019, {{Proceedings}} 15}, @@ -9697,37 +5792,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/J3ZGI8I5/Oppenheim - 1970 - Realization of digital filters using block-floatin.pdf;/home/danesabo/Zotero/storage/W4RD4ZZA/1162085.html} } -@incollection{oquendoDealingUncertaintySoftware2019, - title = {Dealing with {{Uncertainty}} in {{Software Architecture}} on the {{Internet-of-Things}} with {{Digital Twins}}}, - booktitle = {Computational {{Science}} and {{Its Applications}} – {{ICCSA}} 2019}, - author = {Oquendo, Flavio}, - editor = {Misra, Sanjay and Gervasi, Osvaldo and Murgante, Beniamino and Stankova, Elena and Korkhov, Vladimir and Torre, Carmelo and Rocha, Ana Maria A.C. and Taniar, David and Apduhan, Bernady O. and Tarantino, Eufemia}, - date = {2019}, - volume = {11619}, - pages = {770--786}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-030-24289-3_57}, - url = {http://link.springer.com/10.1007/978-3-030-24289-3_57}, - urldate = {2022-03-02}, - abstract = {When architecting Software-intensive Systems-of-Systems (SoS) on the Internet-of-Things (IoT), architects face two sorts of uncertainties. First, they have only limited knowledge about the operational environment where the SoS will actually be deployed. Second, the constituent systems which will compose the SoS might not be known a priori (at design-time) or their availability (at runtime) is affected by dynamic factors, due to the openness of the IoT. The consequent research question is thereby how to deal with uncertainty in the design of an SoS architecture on the IoT. To tackle this challenging issue, this paper addresses the notion of uncertainty due to partial information in SoS and proposes an enhanced SoS Architecture Description language (SosADL) for expressing SoS architectures on the IoT under uncertainty. The core SosADL is extended with concurrent constraints and the concept of digital twins coupling the physical and virtual worlds. This novel approach is supported by an integrated toolset, the SosADL Studio. Validation results demonstrate its effectiveness in an SoS architecture for platooning of self-driving vehicles.}, - isbn = {978-3-030-24288-6 978-3-030-24289-3}, - langid = {english}, - keywords = {DGC read,uncertainty quantification}, - file = {/home/danesabo/Zotero/storage/PJRYAPFG/Oquendo19.pdf} -} - -@thesis{osborneBayesianGaussianProcesses2010, - type = {Ph.D. disseration}, - title = {Bayesian {{Gaussian Processes}} for {{Sequential Prediction}}, {{Optimisation}} and {{Quadrature}}}, - author = {Osborne, Michael}, - date = {2010}, - institution = {University of Oxford}, - abstract = {We develop a family of Bayesian algorithms built around Gaussian processes for various problems posed by sensor networks. We firstly introduce an iterative Gaussian process for multi-sensor inference problems, and show how our algorithm is able to cope with data that may be noisy, missing, delayed and/or correlated. Our algorithm can also effectively manage data that features changepoints, such as sensor faults. Extensions to our algorithm allow us to tackle some of the decision problems faced in sensor networks, including observation scheduling. Along these lines, we also propose a general method of global optimisation, Gaussian process global optimisation (GPGO), and demonstrate how it may be used for sensor placement.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/AWHQPUPC/Osborne - Bayesian Gaussian Processes for Sequential Predict.pdf} -} - @article{osherLevelSetMethods2001, title = {Level {{Set Methods}}: {{An Overview}} and {{Some Recent Results}}}, shorttitle = {Level {{Set Methods}}}, @@ -9746,31 +5810,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/MII47KKR/Osher and Fedkiw - 2001 - Level Set Methods An Overview and Some Recent Res.pdf;/home/danesabo/Zotero/storage/LAYPWLCS/S0021999100966361.html} } -@misc{OT-def, - date = {2021} -} - -@article{oudinaModelingTrustCyberPhysical2023, - title = {Toward {{Modeling Trust Cyber-Physical Systems}}: {{A Model-based System Engineering Method}}}, - shorttitle = {Toward {{Modeling Trust Cyber-Physical Systems}}}, - author = {Oudina, Zina and Derdour, Makhlouf}, - date = {2023-07}, - journaltitle = {INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS}, - shortjournal = {Int. J. Adv. Comput. Sci. Appl.}, - volume = {14}, - number = {7}, - pages = {441--452}, - publisher = {Science \& Information Sai Organization Ltd}, - location = {West Yorkshire}, - issn = {2158-107X, 2156-5570}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2}, - urldate = {2023-10-03}, - abstract = {Developing trust in cyber-physical systems (CPSs) is a challenging task. Trust in CPS is needed for carrying out their intended duties and is reasonably safe from misuse and intrusion; it also enforces the applicable security policy. As an example, medical smart devices, many researches have found that trust is a key factor in explaining the relationship between individual beliefs about technological attributes and their acceptance behavior; and have associated medical device failures with severe patient injuries and deaths. The cyber-physical system is considered a trust system if the principles of security and safety, confidentiality, integrity, availability, and other attributes are assured. However, a lack of sufficient analysis of such systems, as well as appropriate explanation of relevant trust assumptions, may result in systems that fail to completely realize their functionality. The existing research does not provide suitable guidance for a systematic procedure or modeling language to support such trust-based analysis. The most pressing difficulties are achieving trust by design in CPS and systematically incorporating trust engineering into system development from the start of the system life cycle. Still, there is a need for a strategy or standard model to aid in the creation of a safe, secure, and trustworthy CPS. Model-based system engineering (MBSE) approaches for trust cyber-physical systems are a means to address system trustworthiness design challenges. This work proposes a practical and efficient MBSE method for constructing trust CPS, which provides guidance for the process of trustworthiness analysis. The SysML-based profile is supplied, together with recommendations on which approach is required at each process phase. The MBSE method is proven by expanding the autonomous car SysML and UML diagrams, and we show how trust considerations are integrated into the system development life cycle.}, - langid = {english}, - pagetotal = {12}, - annotation = {Web of Science ID: WOS:001047185600001} -} - @video{outlierDiffusionModelsPaper2022, entrysubtype = {video}, title = {Diffusion {{Models}} | {{Paper Explanation}} | {{Math Explained}}}, @@ -9793,13 +5832,6 @@ Insights from the Social Sciences.pdf} abstract = {Diffusion Models are generative models just like GANs. In recent times many state-of-the-art works have been released that build on top of diffusion models such as \#dalle , \#imagen or \#stablediffusion . In this video I'm coding a PyTorch implementation of diffusion models in a very easy and straightforward way. At first I'm showing how to implement an unconditional version and subsequently train it. After that I'm explaining 2 popular improvements for diffusion models: classifier free guidance and exponential moving average. I'm also going to implement both updates and train a conditional model on CIFAR-10 and afterwards compare the different results. Code: https://github.com/dome272/Diffusion-... \#diffusion \#dalle2 \#dalle \#imagen \#stablediffusion 00:00 Introduction 02:05 Recap 03:16 Diffusion Tools 07:22 UNet 13:07 Training Loop 15:44 Unconditional Results 16:05 Classifier Free Guidance 19:16 Exponential Moving Average 21:05 Conditional Results 21:51 Github Code \& Outro Further Reading: 1. Paper: https://arxiv.org/pdf/1503.03585.pdf 2. Paper: https://arxiv.org/pdf/2006.11239.pdf 3. Paper: https://arxiv.org/pdf/2102.09672.pdf 4. Paper: https://arxiv.org/pdf/2105.05233.pdf 5. CFG: https://arxiv.org/pdf/2207.12598.pdf 6. Timestep Embedding: https://machinelearningmastery.com/a-... Follow me on instagram lol: https://www.instagram.com/dome271} } -@misc{PA-profile, - title = {Pennsylvania State Energy Profile}, - year = {accessed 02/13/2022}, - url = {https://www.eia.gov/state/?sid=PA}, - organization = {U.S. Energy Information Administration} -} - @article{pagettiMultitaskImplementationMultiperiodic2011, title = {Multi-Task {{Implementation}} of {{Multi-periodic Synchronous Programs}}}, author = {Pagetti, Claire and Forget, Julien and Boniol, Frédéric and Cordovilla, Mikel and Lesens, David}, @@ -9837,32 +5869,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/WUYLXT7I/Palensky et al. - 2024 - Cosimulating Integrated Energy Systems With Hetero.pdf;/home/danesabo/Zotero/storage/LNNR59EV/10398554.html} } -@misc{PAPUC, - author = {{Michael Holko, Director, Office of Cybersecurity Compliance and Oversight, Pennsylvania Public Unitily Commission}}, - date = {2022-02-25}, - url = {https://www.puc.pa.gov/media/1825/russian-cyber-threats-critical-infrastructure.pdf} -} - -@article{parantModelbasedEngineeringDesigning2023, - title = {Model-Based Engineering for Designing Cyber-Physical Systems from Product Specifications}, - author = {Parant, Alexandre and Gellot, Francois and Zander, Damien and Carre-Menetrier, Veronique and Philippot, Alexandre}, - date = {2023-02}, - journaltitle = {COMPUTERS IN INDUSTRY}, - shortjournal = {Comput. Ind.}, - volume = {145}, - pages = {103808}, - publisher = {Elsevier}, - location = {Amsterdam}, - issn = {0166-3615, 1872-6194}, - doi = {10.1016/j.compind.2022.103808}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2}, - urldate = {2023-10-03}, - abstract = {Cyber-physical systems (CPS) are composed of independent and cooperative elements. Rapid adaptation to disturbances is an essential characteristic of CPS. One of the challenges in designing CPS is considering these specificities. Model-Based Engineering is a method for reducing complexity in system design. This paper presents a methodology for designing CPS and its control system using System Modeling Language (SysML) diagrams and IEC 61499 standard. The product's specifications are the starting point; the methodology focuses on what is produced before determining how to make it. The real-time control system is designed from high-level knowl-edge and tested software components on the plug and produce principle. Task-based structural analysis ensures the elements' synchronization to determine the system's general behavior.}, - langid = {english}, - pagetotal = {19}, - annotation = {Web of Science ID: WOS:000901415100001} -} - @article{parkReliableIntelligentDiagnostic2022, title = {A Reliable Intelligent Diagnostic Assistant for Nuclear Power Plants Using Explainable Artificial Intelligence of {{GRU-AE}}, {{LightGBM}} and {{SHAP}}}, author = {Park, Ji Hun and Jo, Hye Seon and Lee, Sang Hyun and Oh, Sang Won and Na, Man Gyun}, @@ -9898,24 +5904,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/ZEHZS8K8/Parks - 1962 - A new proof of the Routh-Hurwitz stability criteri.pdf} } -@article{pasqualettiAttackDetectionIdentification2013, - title = {Attack {{Detection}} and {{Identification}} in {{Cyber-Physical Systems}}}, - author = {Pasqualetti, Fabio and Dörfler, Florian and Bullo, Francesco}, - date = {2013-11}, - journaltitle = {IEEE Transactions on Automatic Control}, - volume = {58}, - number = {11}, - pages = {2715--2729}, - issn = {1558-2523}, - doi = {10.1109/TAC.2013.2266831}, - url = {https://ieeexplore.ieee.org/abstract/document/6545301?casa_token=Ft_6X6mCU54AAAAA:r49oFvPbZFAmmqczYO6s2vPybo2lkcGzxgGdX15jUF2abn1cuZ4_6PVXndBQyFhZ4LH04J-nfw}, - urldate = {2023-09-27}, - abstract = {Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial control processes, and critical infrastructures. These systems need to operate reliably in the face of unforeseen failures and external malicious attacks. In this paper: (i) we propose a mathematical framework for cyber-physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations from system-theoretic and graph-theoretic perspectives; and (ii) we design centralized and distributed attack detection and identification monitors. Finally, we validate our findings through compelling examples.}, - eventtitle = {{{IEEE Transactions}} on {{Automatic Control}}}, - keywords = {detection}, - file = {/home/danesabo/Zotero/storage/YMJ23ELA/Pasqualetti et al. - 2013 - Attack Detection and Identification in Cyber-Physi.pdf} -} - @article{pattersonDiagrammaticViewDifferential2022, title = {A Diagrammatic View of Differential Equations in Physics}, author = {Patterson, Evan and Baas, Andrew and Hosgood, Timothy and Fairbanks, James}, @@ -9950,142 +5938,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/IHX3VDBU/Patterson et al. - 2016 - A framework for an integrated nuclear digital envi.pdf} } -@inproceedings{pazsitBeamModeCorebarrel2006, - title = {Beam Mode Core-Barrel Vibrations in the {{PWRs Ringhals}} 2-4}, - author = {Pazsit, M. and Sunde, C. and Pazsit, I.}, - date = {2006}, - publisher = {American Nuclear Society - ANS; La Grange Park (United States)}, - location = {United States}, - abstract = {Analysis of core-barrel vibrations in the Swedish Ringhals PWRs has been performed by Chalmers since the early 1990's. In the first phase of this work, between 1991 and 1998, the evaluation method has been developed such that it made a consistent comparison between different measurements possible. A trend analysis showed that the beam mode amplitudes have steadily increased between 1991 and 1998 in all three plants. This paper is to report on the second phase of the work, performed during 2005, on measurements made both before and after the summer outage 2005 in all three plants. During the summer outage, the hold-down spring in Ringhals-3 was replaced. The analysis shows that the vibration amplitudes increased in an accelerated rate between 1998 and 2005 in all three plants. In Ringhals 3, however, after the change of the hold-down spring, the beam mode amplitude has reverted to close its original level of 1991. It became also clear that the extraction of the information from the vibration peaks needs to be refined and made less subjective. A new method of algorithmic peak separation was elaborated, which supplies more information than the previous analysis; it gives also the peak width in addition to peak amplitude and peak frequency, while also supplying more accurate estimates for the latter two. (authors)} -} - -@article{pazsitDevelopmentsCoreBarrelMotion2017, - title = {Developments in {{Core-Barrel Motion Monitoring}} and {{Applications}} to the {{Ringhals PWR Units}}}, - author = {Pázsit, Imre and Montalvo, Cristina and Nylén, Henrik and Andersson, Tell and Hernández-Solís, Augusto and Cartemo, Petty Bernitt}, - date = {2017}, - journaltitle = {Nuclear Science and Engineering}, - volume = {182}, - number = {2}, - pages = {213--227}, - issn = {0029-5639 1943-748X}, - doi = {10.13182/nse15-14}, - url = {https://www.tandfonline.com/doi/abs/10.13182/NSE15-14}, - abstract = {Core-barrel motion (CBM) surveillance and diagnostics, based on the amplitude of the peaks of the normalized auto power spectral densities (APSDs) of the ex-core neutron detectors, have been performed and continuously developed in Sweden and were applied for monitoring of the three PWR units, Ringhals 2 to 4. From 2005, multiple measurements were taken during each fuel cycle, and these revealed a periodic behavior of the 8-Hz peak of the beam-mode motion: the amplitude increases within the cycle and returns to a lower value at the beginning of the next cycle. The work reported in this paper aims to clarify the physical reason for this behavior. A combination of a mode separation method in the time domain and a nonlinear curve-fitting procedure of the frequency spectra revealed that two types of vibration phenomena contribute to the beam-mode peak. The lower frequency peak around 7 Hz in the ex-core detector APSDs corresponds to the CBM, whose amplitude does not change during the cycle. The higher frequency peak around 8 Hz arises from the individual vibrations of the fuel assemblies, and its amplitude increases monotonically during the cycle. This paper gives an account of the work that has been made to verify the above hypothesis.} -} - -@article{pazsitDevelopmentsCorebarrelVibration1998, - title = {Some Developments in Core-Barrel Vibration Diagnostics}, - author = {Pázsit, I. and Karlsson, J. and Garis, N. S.}, - date = {1998}, - journaltitle = {Annals of Nuclear Energy}, - volume = {25}, - number = {13}, - pages = {1079--1093}, - issn = {03064549}, - doi = {10.1016/s0306-4549(98)00012-7}, - abstract = {Diagnostics of core-barrel motion, and notably that of beam mode vibrations, has been usually performed by two distinct concepts. One strategy is to perform a qualitative analysis in the time domain, using descriptors such as vibration trajectory, probability distributions etc. This approach is rather realistic in the sense that it allows for general anisotropic pendular vibrations. The other strategy is to use frequency analysis with the goal of quantifying certain vibration properties. However, this second approach could so far handle only isotropic and unidirectional vibrations. In this paper we propose a unification of these two approaches by introducing a model by which general anisotropic vibrations can be quantified in the frequency domain. However, when separating the noise components prior to the frequency analysis, we suggest the use of symmetry properties of the noise in the time domain, based on reactor physics assumptions, as opposed to the earlier methods that use statistical independence of the components. Due to the unified approach, a combination of time and frequency domain analysis methods can be used for presentation and maximum information extraction.} -} - -@article{pazsitDiagnosticsSurveillanceMethods2004, - title = {Diagnostics and {{Surveillance Methods}} in {{Nuclear Systems}} for {{Real-Time Applications}}}, - author = {Pázsit, I.}, - date = {2004}, - journaltitle = {Real-Time Systems}, - volume = {27}, - number = {1}, - pages = {97--113}, - issn = {0922-6443}, - doi = {10.1023/B:TIME.0000019129.88316.c7}, - url = {https://link.springer.com/content/pdf/10.1023/B:TIME.0000019129.88316.c7.pdf}, - abstract = {This paper reviews some process signal analysis and representation methods that can be used during reactor operation such that they are suitable for real-time applicatons. All listed methods have been tested on data from operating plant. The objective is to detect and interpret changes in the plant or core status at an early stage, such that appropriate measures can be taken immediately. The methods that are discussed and demonstrated in the paper can be divided into two categories. The first is the use of fast and intelligent computing methods such as neural networks and fast wavelet transform, in combination with a diagnostic unfolding procedure which would be computationally rather demanding with traditional methods. The second type is based on direct representation of the system state through visualization of large complex data, showing the space–time behavior of the system. This latter is not associated with any unfolding procedure, it uses only a moderate signal preprocessing for filtering out redundant information, but otherwise showing the process status directly. Such methods have been made possible with the development of powerful computer visualization techniques. The potentials represented by this second alternative do not seem to have been explored fully yet in reactor diagnostics. Methods corresponding to both categories will be demonstrated and discussed in the paper.} -} - -@article{pazsitNeutronNoiseDiagnostics2017, - title = {On the {{Neutron Noise Diagnostics}} of {{Pressurized Water Reactor Control Rod Vibrations}} —{{IV}}: {{Application}} of {{Neural Networks}}}, - author = {Pázsit, I. and Garis, N. S. and Glöckler, O.}, - date = {2017}, - journaltitle = {Nuclear Science and Engineering}, - volume = {124}, - number = {1}, - pages = {167--177}, - issn = {0029-5639 1943-748X}, - doi = {10.13182/nse96-a24232}, - url = {https://www.tandfonline.com/doi/abs/10.13182/NSE96-A24232}, - abstract = {A neutron noise-based technique for the localization of excessively vibrating control rods is elaborated upon in the previous three papers of this series. The method is based on the inversion of a formula that expresses the auto- and cross spectra of three neutron detector signals through the parameters of the vibrating rod, i.e., equilibrium position and displacement components. Successful tests of the algorithm with both simulated and real data were reported in the previous papers. The algorithm had nevertheless certain drawbacks, namely, that its use requires expert knowledge, the redundancy of extra detectors cannot be utilized, and with realistic transfer functions the calculations are rather lengthy. The use of neural networks offers an alternative way of performing the inversion procedure. This possibility was investigated by constructing a network that was trained to determine the rod position from the detector spectra. It was found that all shortcomings of the traditional localization method can be eliminated. The neural network-based identification was also tested with success.} -} - -@article{pazsitNeutronNoiseDiagnostics2017a, - title = {On the {{Neutron Noise Diagnostics}} of {{Pressurized Water Reactor Control Rod Vibrations II}}. {{Stochastic Vibrations}}}, - author = {Pázsit, I. and Glöckler, O.}, - date = {2017}, - journaltitle = {Nuclear Science and Engineering}, - volume = {88}, - number = {1}, - pages = {77--87}, - issn = {0029-5639 1943-748X}, - doi = {10.13182/nse84-4}, - url = {https://www.tandfonline.com/doi/abs/10.13182/NSE84-4}, - abstract = {In an earlier publication, using the theory of neutron fluctuations induced by a vibrating control rod, a complete formal solution of rod vibration diagnostics based on neutron noise measurements was given in terms of Fourier-transformed neutron detector time signals. The suggested procedure was checked in numerical simulation tests where only periodic vibrations could be considered. The procedure and its numerical testing are elaborated for stochastic two-dimensional vibrations. A simple stochastic theory of two-dimensional flow-induced vibrations is given; then the diagnostic method is formulated in the stochastic case, that is, in terms of neutron detector auto- and cross-power spectra. A previously suggested approximate rod localization technique is also formulated in the stochastic case. Applicability of the methods is then investigated in numerical simulation tests, using the proposed model of stochastic two-dimensional vibrations when generating neutron detector spectra that simulate measured data.} -} - -@article{pazsitNeutronNoiseDiagnostics2017b, - title = {On the {{Neutron Noise Diagnostics}} of {{Pressurized Water Reactor Control Rod Vibrations}}. {{III}}. {{Application}} at a {{Power Plant}}}, - author = {Pázsit, I. and Glöckler, O.}, - date = {2017}, - journaltitle = {Nuclear Science and Engineering}, - volume = {99}, - number = {4}, - pages = {313--328}, - issn = {0029-5639 1943-748X}, - doi = {10.13182/nse88-a23561}, - url = {https://www.tandfonline.com/doi/abs/10.13182/NSE88-A23561}, - abstract = {In the first two papers of this series, a complete algorithm was elaborated and tested for the diagnostics of vibrating control rods in pressurized water reactors (PWRs). Although the method was thoroughly tested in numerical experiments where even the effects of background noise were accounted for, the influence of the several approximations regarding the underlying neutron physical and mechanical model of the applicability of the method in real applications could not be properly estimated. In August 1985, in-core self-powered neutron detector spectra taken at Paks-2, a PWR in Hungary, indicated the presence of an excessively vibrating control rod. With these measured noise data as input, the previously reported localization algorithm was applied in its original form. The algorithm singled out one control rod out of the possible seven, and independent investigations performed before and during the subsequent refueling showed the correctness of the localization results. It is therefore concluded that, at least in this particular application, the approximations used in the model were allowable in a case of practical interest. The algorithm was developed further to facilitate the automatization and reliability of the localization procedure. These developments and the experiences in the application of the algorithm are reported in this paper.} -} - -@article{pazsitNeutronNoiseDiagnostics2017c, - title = {On the {{Neutron Noise Diagnostics}} of {{Pressurized Water Reactor Control Rod Vibrations}}. {{I}}. {{Periodic Vibrations}}}, - author = {Pázsit, I. and Glöckler, O.}, - date = {2017}, - journaltitle = {Nuclear Science and Engineering}, - volume = {85}, - number = {2}, - pages = {167--177}, - issn = {0029-5639 1943-748X}, - doi = {10.13182/nse83-a27424}, - url = {https://www.tandfonline.com/doi/abs/10.13182/NSE83-A27424}, - abstract = {Based on the theory of neutron noise arising from the vibration of a localized absorber, the possibility of rod vibration diagnostics is investigated. It is found that noise source characteristics, namely rod position and vibration trajectory and spectra, can be unfolded from measured neutron noise signals. For the localization process, the first and more difficult part of the diagnostics, a procedure is suggested whose novelty is that it is applicable in case of arbitrary vibration trajectories. Applicability of the method is investigated in numerical experiments where effects of background noise are also accounted for.} -} - -@incollection{pazsitNoiseTechniquesNuclear2010, - title = {Noise {{Techniques}} in {{Nuclear Systems}}}, - booktitle = {Handbook of {{Nuclear Engineering}}}, - author = {Pázsit, Imre and Demazière, Christophe}, - date = {2010}, - pages = {1629--1737}, - publisher = {Springer US}, - location = {Boston, MA}, - doi = {10.1007/978-0-387-98149-9_14}, - url = {https://link.springer.com/referenceworkentry/10.1007/978-0-387-98149-9_14}, - abstract = {This chapter deals with neutron fluctuations in nuclear systems. Such neutron fluctuations, or neutron noise, fall into two categories: neutron noise in zero power systems and neutron noise in power reactors. The concepts, the theory, and the methodology of these fluctuations as well as their various applications for extracting information in a nonintrusive way about the system in question are described. A number of specific applications are described, where detection and analysis of zero power and power reactor noise make it possible to extract diagnostic information about the system by determining some parameters of the system during normal operation, or by detecting, identifying, and quantifying developing anomalies at an early stage and determining their severity. This chapter ends with an outline of future developments and actual issues in the~field.}, - isbn = {978-0-387-98130-7 978-0-387-98149-9} -} - -@article{pazsitREFINEDMETHODSURVEILLANCE2014, - title = {{{REFINED METHOD FOR SURVEILLANCE AND DIAGNOSTICS OF THE CORE BARREL VIBRATIONS OF THE RINGHALS PWRs}}}, - author = {Pazsit, Imre and Nylén, Henrik and Montalvo Martín, Cristina}, - date = {2014}, - abstract = {Surveillance and diagnostics of core barrel vibrations has been performed in the Swedish Ringhals PWRs for several years, with main focus on the pendular motion (beam mode). The monitoring of the beam mode showed that the amplitude of the corresponding peak in the ex-core neutron spectra increases along the cycle, and decreases after refueling. Previous investigations on the reason of this behaviour, i.e. whether it is due to the increase of the core barrel vibration amplitude or to the increase of the neutron physics coupling between vibrations and neutron noise, were not decisive. The objective of the work reported here is to clarify this question. From frequency analysis, two modes of vibration have been identi-fied in the frequency range of the beam mode. Several results coming from the trend analysis performed during recent years indicate that one of the modes is due to the core barrel motion itself and remains constant during cycle, and the other is due to the indi-vidual flow induced vibrations of the fuel elements, showing an increasing trend during the cycle. In this work, the method to separate the contributions from the two modes has been refined, and the results of this approach to the latest measurements are presented. The results confirm the origin of the two vibration modes and show constant amplitude of the core barrel motion throughout the cycle.} -} - -@article{pdfpages, - title = {Pdfpages {{Package}}}, - author = {Matthias, Andreas}, - pages = {12}, - abstract = {This package simplifies the insertion of external multi-page PDF or PS documents. It supports pdfTeX, VTeX, and XeTeX.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/UWIQHLX6/Matthias - The pdfpages Package.pdf} -} - @unpublished{peetModernControlSystems, title = {Modern {{Control Systems}}: {{Small Gain Theorem}}}, author = {Peet, Matthew}, @@ -10144,24 +5996,6 @@ Insights from the Social Sciences.pdf} isbn = {978-0-87942-565-4} } -@article{perez-cruzGaussianProcessesNonlinear2013, - title = {Gaussian {{Processes}} for {{Nonlinear Signal Processing}}: {{An Overview}} of {{Recent Advances}}}, - shorttitle = {Gaussian {{Processes}} for {{Nonlinear Signal Processing}}}, - author = {Perez-Cruz, Fernando and Van Vaerenbergh, Steven and Murillo-Fuentes, Juan Jose and Lazaro-Gredilla, Miguel and Santamaria, Ignacio}, - date = {2013-07}, - journaltitle = {IEEE Signal Processing Magazine}, - shortjournal = {IEEE Signal Process. Mag.}, - volume = {30}, - number = {4}, - pages = {40--50}, - issn = {1053-5888}, - doi = {10.1109/MSP.2013.2250352}, - url = {http://ieeexplore.ieee.org/document/6530761/}, - urldate = {2022-04-21}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/IXLJ8SLK/Perez-Cruz et al. - 2013 - Gaussian Processes for Nonlinear Signal Processing.pdf} -} - @report{petersenWorkforceFrameworkCybersecurity2020, title = {Workforce {{Framework}} for {{Cybersecurity}} ({{NICE Framework}})}, author = {Petersen, Rodney and Santos, Danielle and Wetzel, Karen and Smith, Matthew and Witte, Gregory}, @@ -10176,23 +6010,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/PB94MBA3/Petersen et al. - 2020 - Workforce Framework for Cybersecurity (NICE Framew.pdf} } -@article{petersonOverviewMethodologiesCybersecurity2019, - title = {An Overview of Methodologies for Cybersecurity Vulnerability Assessments Conducted in Nuclear Power Plants}, - author = {Peterson, John and Haney, Michael and Borrelli, R.A.}, - date = {2019-05}, - journaltitle = {Nuclear Engineering and Design}, - shortjournal = {Nuclear Engineering and Design}, - volume = {346}, - pages = {75--84}, - issn = {00295493}, - doi = {10.1016/j.nucengdes.2019.02.025}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0029549319300330}, - urldate = {2022-09-30}, - abstract = {Cyber-attacks against critical energy infrastructure have gone from possible to eventual to actual. With electrical generation sources in the United States changing under a wide range of pressures, the current fleet of nuclear power plants in the United States provides a reliable and sustainable source of electrical generation capacity. However, in order to extend the lifetime of the fleet, modernization upgrades to digital instrumentation and control systems are required. While this produces many opportunities for increased efficiency, it introduces a new level of complexity for securing and reliably operating reactors in the presence cyberthreats. The United States Nuclear Regulatory Commission recently began urging stronger cybersecurity efforts at nuclear power plants. As upgrades at nuclear power plants begin, the implementation of digital instrumentation and control systems to monitor and run the power plant introduces new vulnerabilities that must be addressed. This necessitates a more modern discussion of risk. Within this context, we critically review past cyber-vulnerability incidents at nuclear installations and other critical facilities. We then analyze challenges to vulnerabilities within the context of modernization of the current nuclear fleet and propose future research directions needed to resolve these issues.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/JBUTPZWK/Peterson et al. - 2019 - An overview of methodologies for cybersecurity vul.pdf} -} - @inproceedings{petterssonStabilityRobustnessHybrid1996, title = {Stability and Robustness for Hybrid Systems}, booktitle = {Proceedings of 35th {{IEEE Conference}} on {{Decision}} and {{Control}}}, @@ -10226,24 +6043,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/HYC7B5I4/Pichler and Schlotter - 2020 - Entropy based risk measures.pdf} } -@article{picinbonoSecondorderComplexRandom1996, - title = {Second-Order Complex Random Vectors and Normal Distributions}, - author = {Picinbono, B.}, - date = {1996-10}, - journaltitle = {IEEE Transactions on Signal Processing}, - shortjournal = {IEEE Trans. Signal Process.}, - volume = {44}, - number = {10}, - pages = {2637--2640}, - issn = {1053587X}, - doi = {10.1109/78.539051}, - url = {http://ieeexplore.ieee.org/document/539051/}, - urldate = {2022-04-21}, - abstract = {We formulate as a deconvolution problem the causalhoncausal non-Gaussian multichannel autoregressive (AR) parameter estimation problem. The super exponential aljporithm presented in a recent paper by Shalvi and Weinstein is generalized to the vector case. We present an adaptive implementation that is very attractive since it is higher order statistics (HOS) based b u t does not present the high comlputational complexity of methods proposed up to now.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/KPPBR7F9/Picinbono - 1996 - Second-order complex random vectors and normal dis.pdf} -} - @online{PicturingQuantumProcesses, title = {Picturing {{Quantum Processes}} | {{Quantum}} Physics, Quantum Information and Quantum Computation}, url = {https://www.cambridge.org/us/academic/subjects/physics/quantum-physics-quantum-information-and-quantum-computation/picturing-quantum-processes-first-course-quantum-theory-and-diagrammatic-reasoning, https://www.cambridge.org/us/academic/subjects/physics/quantum-physics-quantum-information-and-quantum-computation}, @@ -10252,24 +6051,6 @@ Insights from the Social Sciences.pdf} organization = {Cambridge University Press} } -@article{pillitteriGuidelinesSmartGrid2014, - title = {Guidelines for {{Smart Grid Cybersecurity}}}, - author = {Pillitteri, Victoria Y. and Brewer, Tanya L.}, - date = {2014-09-25T00:09-04:00}, - url = {https://www.nist.gov/publications/guidelines-smart-grid-cybersecurity}, - urldate = {2022-03-22}, - abstract = {This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurit}, - langid = {english}, - annotation = {Last Modified: 2018-11-10T10:11-05:00}, - file = {/home/danesabo/Zotero/storage/5UK8BFE3/Pillitteri and Brewer - 2014 - Guidelines for Smart Grid Cybersecurity.pdf;/home/danesabo/Zotero/storage/HHT75338/guidelines-smart-grid-cybersecurity.html} -} - -@misc{PJM-map, - author = {{PJM Corp.}}, - year = {Date accessed 11/2021}, - url = {https://www.pjm.com/library/~/media/about-pjm/pjm-zones.ashx} -} - @article{platzerDifferentialDynamicLogic2008, title = {Differential {{Dynamic Logic}} for {{Hybrid Systems}}}, author = {Platzer, André}, @@ -10319,25 +6100,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/VTPT3HIX/Platzer - 2018 - Logical Foundations of Cyber-Physical Systems.pdf} } -@article{pliatsiosSurveySCADASystems2020, - title = {A {{Survey}} on {{SCADA Systems}}: {{Secure Protocols}}, {{Incidents}}, {{Threats}} and {{Tactics}}}, - shorttitle = {A {{Survey}} on {{SCADA Systems}}}, - author = {Pliatsios, Dimitrios and Sarigiannidis, Panagiotis and Lagkas, Thomas and Sarigiannidis, Antonios G.}, - date = {2020-23}, - journaltitle = {IEEE Communications Surveys \& Tutorials}, - shortjournal = {IEEE Commun. Surv. Tutorials}, - volume = {22}, - number = {3}, - pages = {1942--1976}, - issn = {1553-877X, 2373-745X}, - doi = {10.1109/COMST.2020.2987688}, - url = {https://ieeexplore.ieee.org/document/9066892/}, - urldate = {2022-09-30}, - abstract = {Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication, transportation, pipelines, chemicals and manufacturing plants. Legacy SCADA systems operated on isolated networks, that made them less exposed to Internet threats. However, the increasing connection of SCADA systems to the Internet, as well as corporate networks, introduces severe security issues. Security considerations for SCADA systems are gaining higher attention, as the number of security incidents against these critical infrastructures is increasing. In this survey, we provide an overview of the general SCADA architecture, along with a detailed description of the SCADA communication protocols. Additionally, we discuss certain high-impact security incidents, objectives, and threats. Furthermore, we carry out an extensive review of the security proposals and tactics that aim to secure SCADA systems. We also discuss the state of SCADA system security. Finally, we present the current research trends and future advancements of SCADA security.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/36SIUAGM/Pliatsios et al. - 2020 - A Survey on SCADA Systems Secure Protocols, Incid.pdf} -} - @inproceedings{podelskiModelCheckingHybrid2006, title = {Model {{Checking}} of {{Hybrid Systems}}: {{From Reachability Towards Stability}}}, shorttitle = {Model {{Checking}} of {{Hybrid Systems}}}, @@ -10380,26 +6142,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/Y67DUZUK/Pollack - 1997 - How to Believe a Machine-Checked Proof.pdf} } -@article{poloniQuadraticVectorEquations2013, - title = {Quadratic {{Vector Equations}}}, - author = {Poloni, Federico}, - date = {2013-02}, - journaltitle = {Linear Algebra and its Applications}, - shortjournal = {Linear Algebra and its Applications}, - volume = {438}, - number = {4}, - eprint = {1004.1500}, - eprinttype = {arXiv}, - pages = {1627--1644}, - issn = {00243795}, - doi = {10.1016/j.laa.2011.05.036}, - url = {http://arxiv.org/abs/1004.1500}, - urldate = {2022-04-21}, - abstract = {We study in a unified fashion several quadratic vector and matrix equations with nonnegativity hypotheses, by seeing them as special cases of the general problem M x = a + b(x, x), where a and the unknown x are componentwise nonnegative vectors, M is a nonsingular M-matrix, and b is a bilinear map from pairs of nonnegative vectors to nonnegative vectors. Specific cases of this equation have been studied extensively in the past by several authors, and include unilateral matrix equations from queuing problems [Bini, Latouche, Meini, 2005], nonsymmetric algebraic Riccati equations [Guo, Laub, 2000], and quadratic matrix equations encountered in neutron transport theory [Lu, 2005]. We present a unified approach which treats the common aspects of their theoretical properties and basic iterative solution algorithms. This has interesting consequences: in some cases, we are able to derive in full generality theorems and proofs appeared in literature only for special cases of the problem; this broader view highlights the role of hypotheses such as the strict positivity of the minimal solution. In an example, we adapt an algorithm derived for one equation of the class to another, with computational advantage with respect to the existing methods. We discuss possible research lines, including the relationship among Newton-type methods and the cyclic reduction algorithm for unilateral quadratic equations.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/8JCG4MUG/Poloni - 2013 - Quadratic Vector Equations.pdf} -} - @online{poluGenerativeLanguageModeling2020, title = {Generative {{Language Modeling}} for {{Automated Theorem Proving}}}, author = {Polu, Stanislas and Sutskever, Ilya}, @@ -10415,26 +6157,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/DYZKP6NH/Polu and Sutskever - 2020 - Generative Language Modeling for Automated Theorem.pdf;/home/danesabo/Zotero/storage/IQP2QELV/2009.html} } -@article{poreskyCyberSecurityNuclear, - title = {Cyber {{Security}} in {{Nuclear Power Plants}}}, - author = {Poresky, Christopher and Andreades, Charalampos and Kendrick, James and Peterson, Per}, - pages = {15}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/TKLVVLHB/Poresky et al. - Cyber Security in Nuclear Power Plants.pdf} -} - -@inproceedings{porReactorNoiseAnalysis1998, - title = {Reactor Noise Analysis Applications and Systems in {{WWER-440}} and {{WWER-1000}} Type {{PWRs}}}, - author = {Por, G.}, - date = {1998}, - pages = {609}, - publisher = {IAEA}, - location = {International Atomic Energy Agency (IAEA)}, - url = {http://inis.iaea.org/search/search.aspx?orig_q=RN:30002930}, - abstract = {This paper presents an introduction on different types of well selected noise diagnostic methods with their occurrence in WWER reactors with an analysis of their impact on operational safety and aging which affects the installations safety as well The main objective is to attract the attention of NPP management staff dealing with safety, safety culture, maintenance, operation and quality assurance proving that such methods can give benefit not only to economy but impact safety of nuclear installations}, - eventtitle = {On-Line Testing of Nuclear Plant Temperature and Pressure Instrumentation and Other Critical Plant Equipment {{IAEA}} Regional Workshop {{Working}} Material} -} - @inproceedings{poschmannExperienceFormalMethods1997, title = {Experience with Formal Methods Implementing the {{PROFIBUS FMS}} and {{DP}} Protocol for Industrial Applications}, booktitle = {Proceedings 1997 {{IEEE International Workshop}} on {{Factory Communication Systems}}. {{WFCS}}'97}, @@ -10563,41 +6285,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/HJ6FT5U9/Qin et al. - 2017 - Formal modeling and verification of flexible load .pdf} } -@online{QualifyingExam, - title = {Qualifying {{Exam}}}, - url = {https://www.overleaf.com/project/66db16e7e208c0cf7aee5549}, - urldate = {2024-11-12}, - abstract = {An online LaTeX editor that’s easy to use. No installation, real-time collaboration, version control, hundreds of LaTeX templates, and more.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/EX9JBPKZ/Qualifying Exam.pdf;/home/danesabo/Zotero/storage/9DYSHIPL/66db16e7e208c0cf7aee5549.html} -} - -@online{QualifyingExama, - title = {Qualifying {{Exam}}}, - url = {https://www.overleaf.com/project/66db16e7e208c0cf7aee5549}, - urldate = {2024-11-12}, - abstract = {An online LaTeX editor that’s easy to use. No installation, real-time collaboration, version control, hundreds of LaTeX templates, and more.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/TAJZZXSK/Qualifying Exam.pdf;/home/danesabo/Zotero/storage/WC366ERE/66db16e7e208c0cf7aee5549.html} -} - -@article{raikwarSoKUsedCryptography2019, - title = {{{SoK}} of {{Used Cryptography}} in {{Blockchain}}}, - author = {Raikwar, Mayank and Gligoroski, Danilo and Kralevska, Katina}, - date = {2019}, - journaltitle = {IEEE Access}, - shortjournal = {IEEE Access}, - volume = {7}, - pages = {148550--148575}, - issn = {2169-3536}, - doi = {10.1109/ACCESS.2019.2946983}, - url = {https://ieeexplore.ieee.org/document/8865045/}, - urldate = {2023-10-04}, - abstract = {The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance, health care, legal relations, IoT, information security, and consensus building systems, only few studies scrutinize the cryptographic concepts used in blockchain. To the best of our knowledge, there is no Systematization of Knowledge (SoK) that gives a complete picture of the existing cryptographic concepts which have been deployed or have the potential to be deployed in blockchain. In this paper, we thoroughly review and systematize all cryptographic concepts which are already used in blockchain. Additionally, we give a list of cryptographic concepts which have not yet been applied but have big potentials to improve the current blockchain solutions. We also include possible instantiations of these cryptographic concepts in the blockchain domain. Last but not least, we explicitly postulate 21 challenging problems that cryptographers interested in blockchain can work on.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/L5IWUWUN/Raikwar et al. - 2019 - SoK of Used Cryptography in Blockchain.pdf} -} - @online{rajhansVerificationHybridDynamic, title = {Verification of {{Hybrid Dynamic Systems Using Linear Hybrid Automata}}}, author = {Rajhans, Akshay}, @@ -10612,54 +6299,6 @@ Insights from the Social Sciences.pdf} author = {Rajhans, Akshay} } -@online{rameshHierarchicalTextConditionalImage2022, - title = {Hierarchical {{Text-Conditional Image Generation}} with {{CLIP Latents}}}, - author = {Ramesh, Aditya and Dhariwal, Prafulla and Nichol, Alex and Chu, Casey and Chen, Mark}, - date = {2022-04-12}, - eprint = {2204.06125}, - eprinttype = {arXiv}, - eprintclass = {cs}, - doi = {10.48550/arXiv.2204.06125}, - url = {http://arxiv.org/abs/2204.06125}, - urldate = {2023-10-05}, - abstract = {Contrastive models like CLIP have been shown to learn robust representations of images that capture both semantics and style. To leverage these representations for image generation, we propose a two-stage model: a prior that generates a CLIP image embedding given a text caption, and a decoder that generates an image conditioned on the image embedding. We show that explicitly generating image representations improves image diversity with minimal loss in photorealism and caption similarity. Our decoders conditioned on image representations can also produce variations of an image that preserve both its semantics and style, while varying the non-essential details absent from the image representation. Moreover, the joint embedding space of CLIP enables language-guided image manipulations in a zero-shot fashion. We use diffusion models for the decoder and experiment with both autoregressive and diffusion models for the prior, finding that the latter are computationally more efficient and produce higher-quality samples.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/Q36KWUMC/Ramesh et al. - 2022 - Hierarchical Text-Conditional Image Generation wit.pdf;/home/danesabo/Zotero/storage/MYPJ54Y8/2204.html} -} - -@article{ramirezDynamicSystemIdentification2021, - title = {Dynamic {{System Identification}} of {{Underwater Vehicles Using Multi-Output Gaussian Processes}}}, - author = {Ramirez, Wilmer Ariza and Kocijan, Jus and Leong, Zhi Quan and Nguyen, Hung Duc and Jayasinghe, Shantha Gamini}, - date = {2021-10}, - journaltitle = {International Journal of Automation and Computing}, - shortjournal = {Int. J. Autom. Comput.}, - volume = {18}, - number = {5}, - pages = {681--693}, - publisher = {Springernature}, - location = {London}, - issn = {1476-8186}, - doi = {10.1007/s11633-021-1308-x}, - url = {https://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=DynamicDOIArticle&SrcApp=UA&KeyAID=10.1007%2Fs11633-021-1308-x&DestApp=DOI&SrcAppSID=USW2EC0B9Be3QMZ9xhmtqgGcprgqa&SrcJTitle=INTERNATIONAL+JOURNAL+OF+AUTOMATION+AND+COMPUTING&DestDOIRegistrantName=Springer-Verlag}, - urldate = {2022-04-18}, - abstract = {Non-parametric system identification with Gaussian processes for underwater vehicles is explored in this research with the purpose of modelling autonomous underwater vehicle (AUV) dynamics with a low amount of data. Multi-output Gaussian processes and their aptitude for modelling the dynamic system of an underactuated AUV without losing the relationships between tied outputs are used. The simulation of a first-principle model of a Remus 100 AUV is employed to capture data for the training and validation of the multi-output Gaussian processes. The metric and required procedure to carry out multi-output Gaussian processes for AUV with 6 degrees of freedom (DoF) is also shown in this paper. Multi-output Gaussian processes compared with the popular technique of recurrent neural network show that multi-output Gaussian processes manage to surpass RNN for non-parametric dynamic system identification in underwater vehicles with highly coupled DoF with the added benefit of providing the measurement of confidence.}, - langid = {english}, - annotation = {WOS:000673001900001}, - file = {/home/danesabo/Zotero/storage/BE43T3S6/Ramirez et al. - 2021 - Dynamic System Identification of Underwater Vehicl.pdf} -} - -@online{RansomwareAttackLeads, - title = {Ransomware Attack Leads to Shutdown of Major {{U}}.{{S}}. Pipeline System - {{The Washington Post}}}, - url = {https://www.washingtonpost.com/business/2021/05/08/cyber-attack-colonial-pipeline/}, - urldate = {2022-04-02} -} - -@online{RansomwareAttackShuts, - title = {Ransomware {{Attack Shuts Down Colonial Pipeline}} : {{NPR}}}, - url = {https://www.npr.org/2021/05/08/995040240/cybersecurity-attack-shuts-down-a-top-u-s-gasoline-pipeline}, - urldate = {2022-04-02} -} - @article{rasheedDigitalTwinValues2020, title = {Digital {{Twin}}: {{Values}}, {{Challenges}} and {{Enablers From}} a {{Modeling Perspective}}}, shorttitle = {Digital {{Twin}}}, @@ -10678,49 +6317,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/58BWKHYM/Rasheed et al. - 2020 - Digital Twin Values, Challenges and Enablers From.pdf} } -@article{rashidUndergraduateCourseModelbased2020, - title = {An Undergraduate Course on Model-Based System Engineering for Embedded Systems}, - author = {Rashid, Muhammad}, - date = {2020-05}, - journaltitle = {COMPUTER APPLICATIONS IN ENGINEERING EDUCATION}, - shortjournal = {Comput. Appl. Eng. Educ.}, - volume = {28}, - number = {3}, - pages = {645--657}, - publisher = {Wiley}, - location = {Hoboken}, - issn = {1061-3773, 1099-0542}, - doi = {10.1002/cae.22233}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {Model-based system engineering (MBSE) is becoming an industrial standard to design embedded systems. Therefore, its integration in electrical and computer engineering education is critical. This article presents an undergraduate course on MBSE for embedded systems through the formulation of course learning outcomes, identification of the course contents, and the construction of a holistic view for the contents. The holistic view of the course binds the contents by providing the modeling methodology, the transformation engine, and the simulation environment of an end-to-end framework. Furthermore, students obtain integrated design experience, through problem-based learning, using three case studies. Assessment through quantitative evaluation and students' feedback show the viability of the presented course.}, - langid = {english}, - pagetotal = {13}, - annotation = {Web of Science ID: WOS:000522056200001} -} - -@unpublished{rasmussenAdvancesGaussianProcesses2006, - title = {Advances in {{Gaussian Processes}} - {{Tutorial}} at {{NIPS}} 2006 in {{Vancouver}}}, - author = {Rasmussen, Carl Edward}, - date = {2006}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/ZIM675NZ/Rasmussen - 1960 - Advances in Gaussian Processes - Tutorial at NIPS .pdf} -} - -@book{rasmussenGaussianProcessesMachine2006, - title = {Gaussian Processes for Machine Learning}, - author = {Rasmussen, Carl Edward and Williams, Christopher K. I.}, - date = {2006}, - series = {Adaptive Computation and Machine Learning}, - publisher = {MIT Press}, - location = {Cambridge, Mass}, - isbn = {978-0-262-18253-9}, - langid = {english}, - pagetotal = {248}, - annotation = {OCLC: ocm61285753}, - file = {/home/danesabo/Zotero/storage/5H8XNPIU/Rasmussen and Williams - 2006 - Gaussian processes for machine learning.pdf} -} - @inproceedings{rauschFormalVerificationPLC1998, title = {Formal Verification of {{PLC}} Programs}, booktitle = {Proceedings of the 1998 {{American Control Conference}}. {{ACC}} ({{IEEE Cat}}. {{No}}.{{98CH36207}})}, @@ -10739,27 +6335,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/7QCJ2RIG/Rausch and Krogh - 1998 - Formal verification of PLC programs.pdf} } -@article{rauzyFoundationsModelbasedSystems2019, - title = {Foundations for Model-Based Systems Engineering and Model-Based Safety Assessment}, - author = {Rauzy, Antoine B. and Haskins, Cecilia}, - date = {2019-03}, - journaltitle = {SYSTEMS ENGINEERING}, - shortjournal = {Syst. Eng.}, - volume = {22}, - number = {2}, - pages = {146--155}, - publisher = {Wiley}, - location = {Hoboken}, - issn = {1098-1241, 1520-6858}, - doi = {10.1002/sys.21469}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {This article is a contribution to the INCOSE initiative for model-based engineering transformation. Its material has been presented at the ALSEE tour event in Oslo in September 2016. The ideas developed here come from the practical and theoretical experience of the authors in both industrial and academic frameworks. We organize the discussion around 6 theses that aim at establishing robust conceptual foundations for the model-based engineering transformation. We focus on model-based systems engineering, model-based safety assessment, and the relationship between these 2 disciplines. We report on active research initiatives that implement these 6 theses via the S2ML+X paradigm. We conclude with suggestions about future research and teaching activities.}, - langid = {english}, - pagetotal = {10}, - annotation = {Web of Science ID: WOS:000461577200005} -} - @article{rehtanzDigitalTwinBuzzword2024, title = {Digital {{Twin}}: {{From Buzzword To Solutions}} [{{Guest Editorial}}]}, shorttitle = {Digital {{Twin}}}, @@ -10793,22 +6368,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/P8JBYTZZ/RevModPhys.83.html} } -@online{rezendeVariationalInferenceNormalizing2016, - title = {Variational {{Inference}} with {{Normalizing Flows}}}, - author = {Rezende, Danilo Jimenez and Mohamed, Shakir}, - date = {2016-06-14}, - eprint = {1505.05770}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - doi = {10.48550/arXiv.1505.05770}, - url = {http://arxiv.org/abs/1505.05770}, - urldate = {2023-10-05}, - abstract = {The choice of approximate posterior distribution is one of the core problems in variational inference. Most applications of variational inference employ simple families of posterior approximations in order to allow for efficient inference, focusing on mean-field or other simple structured approximations. This restriction has a significant impact on the quality of inferences made using variational methods. We introduce a new approach for specifying flexible, arbitrarily complex and scalable approximate posterior distributions. Our approximations are distributions constructed through a normalizing flow, whereby a simple initial density is transformed into a more complex one by applying a sequence of invertible transformations until a desired level of complexity is attained. We use this view of normalizing flows to develop categories of finite and infinitesimal flows and provide a unified view of approaches for constructing rich posterior approximations. We demonstrate that the theoretical advantages of having posteriors that better match the true posterior, combined with the scalability of amortized variational approaches, provides a clear improvement in performance and applicability of variational inference.}, - pubstate = {prepublished}, - keywords = {diffusion models}, - file = {/home/danesabo/Zotero/storage/AFW2WCSS/Rezende and Mohamed - 2016 - Variational Inference with Normalizing Flows.pdf;/home/danesabo/Zotero/storage/GEBQP5TR/1505.html} -} - @online{ribeiroWhyShouldTrust2016, title = {"{{Why Should I Trust You}}?": {{Explaining}} the {{Predictions}} of {{Any Classifier}}}, shorttitle = {"{{Why Should I Trust You}}?}, @@ -10825,14 +6384,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/HQA3996Q/Ribeiro et al. - 2016 - Why Should I Trust You Explaining the Predicti.pdf} } -@article{rifaiContractiveAutoEncodersExplicit, - title = {Contractive {{Auto-Encoders}}: {{Explicit Invariance During Feature Extraction}}}, - author = {Rifai, Salah and Vincent, Pascal and Muller, Xavier and Glorot, Xavier and Bengio, Yoshua}, - abstract = {We present in this paper a novel approach for training deterministic auto-encoders. We show that by adding a well chosen penalty term to the classical reconstruction cost function, we can achieve results that equal or surpass those attained by other regularized autoencoders as well as denoising auto-encoders on a range of datasets. This penalty term corresponds to the Frobenius norm of the Jacobian matrix of the encoder activations with respect to the input. We show that this penalty term results in a localized space contraction which in turn yields robust features on the activation layer. Furthermore, we show how this penalty term is related to both regularized auto-encoders and denoising auto-encoders and how it can be seen as a link between deterministic and non-deterministic auto-encoders. We find empirically that this penalty helps to carve a representation that better captures the local directions of variation dictated by the data, corresponding to a lower-dimensional non-linear manifold, while being more invariant to the vast majority of directions orthogonal to the manifold. Finally, we show that by using the learned features to initialize a MLP, we achieve state of the art classification error on a range of datasets, surpassing other methods of pretraining.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/5ZPNEPQQ/Rifai et al. - Contractive Auto-Encoders Explicit Invariance Dur.pdf} -} - @article{ritterDigitalTwinDetect2022, title = {Digital {{Twin}} to {{Detect Nuclear Proliferation}}: {{A Case Study}}}, shorttitle = {Digital {{Twin}} to {{Detect Nuclear Proliferation}}}, @@ -10851,34 +6402,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/37TG3D3G/Ritter et al. - 2022 - Digital Twin to Detect Nuclear Proliferation A Ca.pdf} } -@article{robbinsMendeleyZoteroWhich2012, - title = {Mendeley or {{Zotero}}: {{Which Should}} the {{Mobile Researcher Use}}?}, - shorttitle = {Mendeley or {{Zotero}}}, - author = {Robbins, Laura Pope}, - date = {2012-10-01}, - journaltitle = {The Charleston Advisor}, - shortjournal = {charleston adv}, - volume = {14}, - number = {2}, - pages = {5--11}, - issn = {15254011, 15254003}, - doi = {10.5260/chara.14.2.5}, - url = {http://openurl.ingenta.com/content/xref?genre=article&issn=1525-4011&volume=14&issue=2&spage=5}, - urldate = {2022-02-11}, - abstract = {Today’s bibliographic managers provide cloud storage so that papers can be attached to citations and syncing services, in order for papers and citations to be available in multiple mediums. Mendeley and Zotero are two services that offer online storage of papers and citations, desktop applications, and tablet integration. Mendeley has an iPad application and an open API so that developers can create apps for Android tablets. Zotero is an open-source project that encourages developers to create both iPad and Android apps. Both suites can be integrated with word processing software for accurate in-text and bibliographic entries, provide full-text indexing of PDF documents, and can attach notes to citations. Choosing between them depends upon what features a mobile researcher would need and use.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/KXJNXWQZ/Robbins - 2012 - Mendeley or Zotero Which Should the Mobile Resear.pdf} -} - -@online{RobustControlMicrovibrations, - title = {Robust Control of Microvibrations with Experimental Verification}, - doi = {10.1243/095440605X16929}, - url = {https://journals.sagepub.com/doi/epdf/10.1243/095440605X16929}, - urldate = {2024-08-30}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/R87QX9MX/Robust control of microvibrations with experimental verification.pdf;/home/danesabo/Zotero/storage/UM5DZ2U7/095440605X16929.html} -} - @incollection{rocchettoCPDYExtendingDolevYao2016, title = {{{CPDY}}: {{Extending}} the {{Dolev-Yao Attacker}} with {{Physical-Layer Interactions}}}, shorttitle = {{{CPDY}}}, @@ -10925,39 +6448,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/WPF5L78G/Rojas - A Tutorial Introduction to the Lambda Calculus.pdf} } -@article{rokkachhetriSideChannelsCyberPhysical2017, - title = {Side {{Channels}} of {{Cyber-Physical Systems}}: {{Case Study}} in {{Additive Manufacturing}}}, - shorttitle = {Side {{Channels}} of {{Cyber-Physical Systems}}}, - author = {Rokka Chhetri, Sujit and Al Faruque, Mohammad Abdullah}, - date = {2017-08}, - journaltitle = {IEEE Design \& Test}, - volume = {34}, - number = {4}, - pages = {18--25}, - issn = {2168-2364}, - doi = {10.1109/MDAT.2017.2682225}, - url = {https://ieeexplore.ieee.org/abstract/document/7878599?casa_token=KQXDZEp-sRgAAAAA:I48bww9EmRuRNHG8q3L4XF3DW5OVSkWLjoSS59nTGAH1OXvSw_8Wg1r7nD7ziKTRGEyIo5it4A}, - urldate = {2023-09-27}, - abstract = {As 3-D printers are becoming increasingly relevant in various domains, including critical infrastructure, cyber-security questions naturally arise. This article investigates how to leverage analog emissions (vibration, acoustic, magnetic, and power) of 3-D printers in order to identify the printed object and compromise confidentiality.}, - eventtitle = {{{IEEE Design}} \& {{Test}}}, - file = {/home/danesabo/Zotero/storage/SMP9MIFC/Rokka Chhetri and Al Faruque - 2017 - Side Channels of Cyber-Physical Systems Case Stud.pdf} -} - -@online{rombachHighResolutionImageSynthesis2022, - title = {High-{{Resolution Image Synthesis}} with {{Latent Diffusion Models}}}, - author = {Rombach, Robin and Blattmann, Andreas and Lorenz, Dominik and Esser, Patrick and Ommer, Björn}, - date = {2022-04-13}, - eprint = {2112.10752}, - eprinttype = {arXiv}, - eprintclass = {cs}, - doi = {10.48550/arXiv.2112.10752}, - url = {http://arxiv.org/abs/2112.10752}, - urldate = {2023-10-05}, - abstract = {By decomposing the image formation process into a sequential application of denoising autoencoders, diffusion models (DMs) achieve state-of-the-art synthesis results on image data and beyond. Additionally, their formulation allows for a guiding mechanism to control the image generation process without retraining. However, since these models typically operate directly in pixel space, optimization of powerful DMs often consumes hundreds of GPU days and inference is expensive due to sequential evaluations. To enable DM training on limited computational resources while retaining their quality and flexibility, we apply them in the latent space of powerful pretrained autoencoders. In contrast to previous work, training diffusion models on such a representation allows for the first time to reach a near-optimal point between complexity reduction and detail preservation, greatly boosting visual fidelity. By introducing cross-attention layers into the model architecture, we turn diffusion models into powerful and flexible generators for general conditioning inputs such as text or bounding boxes and high-resolution synthesis becomes possible in a convolutional manner. Our latent diffusion models (LDMs) achieve a new state of the art for image inpainting and highly competitive performance on various tasks, including unconditional image generation, semantic scene synthesis, and super-resolution, while significantly reducing computational requirements compared to pixel-based DMs. Code is available at https://github.com/CompVis/latent-diffusion .}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/52SBVWJ7/Rombach et al. - 2022 - High-Resolution Image Synthesis with Latent Diffus.pdf;/home/danesabo/Zotero/storage/ID2GIIZ3/2112.html} -} - @thesis{rouhlingFormalisationToolsClassical2019, type = {phdthesis}, title = {Formalisation Tools for Classical Analysis : A Case Study in Control Theory}, @@ -10972,23 +6462,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/T9AMRA7H/Rouhling - 2019 - Formalisation tools for classical analysis a cas.pdf} } -@inproceedings{rouhlingFormalProofCoq2018, - title = {A Formal Proof in {{Coq}} of a Control Function for the Inverted Pendulum}, - booktitle = {Proceedings of the 7th {{ACM SIGPLAN International Conference}} on {{Certified Programs}} and {{Proofs}}}, - author = {Rouhling, Damien}, - date = {2018-01-08}, - series = {{{CPP}} 2018}, - pages = {28--41}, - publisher = {Association for Computing Machinery}, - location = {New York, NY, USA}, - doi = {10.1145/3167101}, - url = {https://doi.org/10.1145/3167101}, - urldate = {2022-06-20}, - abstract = {Control theory provides techniques to design controllers, or control functions, for dynamical systems with inputs, so as to grant a particular behaviour of such a system. The inverted pendulum is a classic system in control theory: it is used as a benchmark for nonlinear control techniques and is a model for several other systems with various applications. We formalized in the Coq proof assistant the proof of soundness of a control function for the inverted pendulum. This is a first step towards the formal verification of more complex systems for which safety may be critical.}, - isbn = {978-1-4503-5586-5}, - file = {/home/danesabo/Zotero/storage/ICH37TXP/Rouhling - 2018 - A formal proof in Coq of a control function for th.pdf} -} - @article{rouhlingFormalProofsControl, title = {Formal {{Proofs}} for {{Control Theory}} and {{Robotics}}: {{A Case Study}}}, author = {Rouhling, Damien}, @@ -10996,24 +6469,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/YFPFJRX7/Rouhling - Formal Proofs for Control Theory and Robotics A C.pdf} } -@article{roustantDiceKrigingDiceOptimTwo2012, - title = {{{DiceKriging}}, {{DiceOptim}}: {{Two R Packages}} for the {{Analysis}} of {{Computer Experiments}} by {{Kriging-Based Metamodeling}} and {{Optimization}}}, - shorttitle = {{{{\textbf{DiceKriging}}}} , {{{\textbf{DiceOptim}}}}}, - author = {Roustant, Olivier and Ginsbourger, David and Deville, Yves}, - date = {2012}, - journaltitle = {Journal of Statistical Software}, - shortjournal = {J. Stat. Soft.}, - volume = {51}, - number = {1}, - issn = {1548-7660}, - doi = {10.18637/jss.v051.i01}, - url = {http://www.jstatsoft.org/v51/i01/}, - urldate = {2022-04-21}, - abstract = {We present two recently released R packages, DiceKriging and DiceOptim, for the approximation and the optimization of expensive-to-evaluate deterministic functions. Following a self-contained mini tutorial on Kriging-based approximation and optimization, the functionalities of both packages are detailed and demonstrated in two distinct sections. In particular, the versatility of DiceKriging with respect to trend and noise specifications, covariance parameter estimation, as well as conditional and unconditional simulations are illustrated on the basis of several reproducible numerical experiments. We then put to the fore the implementation of sequential and parallel optimization strategies relying on the expected improvement criterion on the occasion of DiceOptim’s presentation. An appendix is dedicated to complementary mathematical and computational details.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/7KBM24LR/Roustant et al. - 2012 - DiceKriging , DiceOptim Two R.pdf} -} - @article{routhDynamicsSystemRigid1955, title = {Dynamics of a System of Rigid Bodies. {{Part II}}: {{Of}} Atreatise on the Whole Subject}, author = {Routh, Edward John}, @@ -11158,30 +6613,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/ZGVNLRMQ/ActaNumerica2010.pdf} } -@online{RussiansWhoPose, - title = {Russians {{Who Pose Election Threat Have Hacked Nuclear Plants}} and {{Power Grid}} - {{The New York Times}}}, - url = {https://www.nytimes.com/2020/10/23/us/politics/energetic-bear-russian-hackers.html?action=click&module=Well&pgtype=Homepage§ion=Politics}, - urldate = {2022-04-02} -} - -@inproceedings{rysavyFormalAuthorizationFramework2012, - title = {A {{Formal Authorization Framework}} for {{Networked SCADA Systems}}}, - booktitle = {2012 {{IEEE}} 19th {{International Conference}} and {{Workshops}} on {{Engineering}} of {{Computer-Based Systems}}}, - author = {Rysavy, Ondrej and Rab, Jaroslav and Halfar, Patrik and Sveda, Mirsolav}, - date = {2012-04}, - pages = {298--302}, - publisher = {IEEE}, - location = {Novi Sad, Serbia}, - doi = {10.1109/ECBS.2012.4}, - url = {http://ieeexplore.ieee.org/document/6195199/}, - urldate = {2023-10-10}, - abstract = {In this paper, we propose an application of a formal authorization framework for defining and enforcing security policies in SCADA systems. Current generation of SCADA systems are built as open networked systems often connected to public networks. Thus the security becomes an important issue, which needs to be properly addressed in these systems. The knowledge gained from securing networked computer based systems may help to develop security measures for SCADA systems too. Among such methods, a policy based security methods are the most applied. The contribution of this paper consists of an overview of security issues related to SCADA systems and a proposal to use a logic-based authorization framework in this environment for achieving scalable and efficient authentication.}, - eventtitle = {2012 19th {{IEEE International Conference}} and {{Workshops}} on {{Engineering}} of {{Computer Based Systems}} ({{ECBS}})}, - isbn = {978-1-4673-0912-7 978-0-7695-4664-3}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/7BT93UQZ/Rysavy et al. - 2012 - A Formal Authorization Framework for Networked SCA.pdf} -} - @article{rysavyImprovingSecuritySCADA2013, title = {Improving Security in {{SCADA}} Systems through Firewall Policy Analysis}, author = {Rysavy, Ondrej and Rab, Jaroslav and Sveda, Miroslav}, @@ -11191,40 +6622,6 @@ Insights from the Social Sciences.pdf} file = {/home/danesabo/Zotero/storage/AX7YFQBL/Rysavy et al. - 2013 - Improving security in SCADA systems through firewa.pdf} } -@article{saadImplementationIoTBasedDigital2020, - title = {On the {{Implementation}} of {{IoT-Based Digital Twin}} for {{Networked Microgrids Resiliency Against Cyber Attacks}}}, - author = {Saad, Ahmed and Faddel, Samy and Youssef, Tarek and Mohammed, Osama A.}, - date = {2020-11}, - journaltitle = {Ieee Transactions on Smart Grid}, - shortjournal = {IEEE Trans. Smart Grid}, - volume = {11}, - number = {6}, - pages = {5138--5150}, - publisher = {Ieee-Inst Electrical Electronics Engineers Inc}, - location = {Piscataway}, - issn = {1949-3053}, - doi = {10.1109/TSG.2020.3000958}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1?markedListId=List%202}, - urldate = {2022-03-08}, - abstract = {The increased rate of cyber-attacks on the power system necessitates the need for innovative solutions to ensure its resiliency. This work builds on the advancement in the IoT to provide a practical framework that is able to respond to multiple attacks on a network of interconnected microgrids. This paper provides an IoT-based digital twin (DT) of the cyber-physical system that interacts with the control system to ensure its proper operation. The IoT cloud provision of the energy cyber-physical and the DT are mathematically formulated. Unlike other cybersecurity frameworks in the literature, the proposed one can mitigate an individual as well as coordinated attacks. The framework is tested on a distributed control system and the security measures are implemented using cloud computing. The physical controllers are implemented using single-board computers. The practical results show that the proposed DT is able to mitigate the coordinated false data injection and the denial of service cyber-attacks.}, - langid = {english}, - keywords = {DGC read}, - annotation = {WOS:000583560800048}, - file = {/home/danesabo/Zotero/storage/UCFBIKZW/Saad et al. - 2020 - On the Implementation of IoT-Based Digital Twin fo.pdf} -} - -@inproceedings{sadraddiniFormalMethodsAdaptive2017, - title = {Formal Methods for Adaptive Control of Dynamical Systems}, - booktitle = {2017 {{IEEE}} 56th {{Annual Conference}} on {{Decision}} and {{Control}} ({{CDC}})}, - author = {Sadraddini, Sadra and Belta, Calin}, - date = {2017-12}, - pages = {1782--1787}, - doi = {10.1109/CDC.2017.8263906}, - abstract = {We develop a method to control discrete-time systems with constant but initially unknown parameters from linear temporal logic (LTL) specifications. We introduce the notions of (non-deterministic) parametric and adaptive transition systems and show how to use tools from formal methods to compute adaptive control strategies for finite systems. For infinite systems, we first compute abstractions in the form of parametric finite quotient transition systems and then apply the techniques for finite systems. Unlike traditional adaptive control techniques, our method is correct-by-design, does not require a reference model, and can handle a much wider range of systems and specifications. Illustrative examples are included.}, - eventtitle = {2017 {{IEEE}} 56th {{Annual Conference}} on {{Decision}} and {{Control}} ({{CDC}})}, - file = {/home/danesabo/Zotero/storage/LSETZD6D/Sadraddini and Belta - 2017 - Formal methods for adaptive control of dynamical s.pdf} -} - @article{saeedloeiLogicbasedModelingVerification2011, title = {A Logic-Based Modeling and Verification of {{CPS}}}, author = {Saeedloei, Neda and Gupta, Gopal}, @@ -11275,17 +6672,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/IYR5VX2U/Safford and Brown - 2019 - Communicating science to policymakers six strateg.pdf;/home/danesabo/Zotero/storage/FWIZAHW9/d41586-019-02372-3.html} } -@online{sahaComprehensiveGuideConvolutional2022, - title = {A {{Comprehensive Guide}} to {{Convolutional Neural Networks}} — the {{ELI5}} Way}, - author = {Saha, Sumit}, - date = {2022-11-16T07:11:53}, - url = {https://towardsdatascience.com/a-comprehensive-guide-to-convolutional-neural-networks-the-eli5-way-3bd2b1164a53}, - urldate = {2024-11-06}, - abstract = {Artificial Intelligence has been witnessing a monumental growth in bridging the gap between the capabilities of humans and machines…}, - langid = {english}, - organization = {Medium} -} - @article{sahaNeuralIdentificationControl2021, title = {Neural {{Identification}} for {{Control}}}, author = {Saha, Priyabrata and Egerstedt, Magnus and Mukhopadhyay, Saibal}, @@ -11307,21 +6693,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/DYHN77BB/Saha et al. - 2021 - Neural Identification for Control.pdf;/home/danesabo/Zotero/storage/ERWUWG8S/2009.html} } -@online{sahariaPhotorealisticTexttoImageDiffusion2022, - title = {Photorealistic {{Text-to-Image Diffusion Models}} with {{Deep Language Understanding}}}, - author = {Saharia, Chitwan and Chan, William and Saxena, Saurabh and Li, Lala and Whang, Jay and Denton, Emily and Ghasemipour, Seyed Kamyar Seyed and Ayan, Burcu Karagol and Mahdavi, S. Sara and Lopes, Rapha Gontijo and Salimans, Tim and Ho, Jonathan and Fleet, David J. and Norouzi, Mohammad}, - date = {2022-05-23}, - eprint = {2205.11487}, - eprinttype = {arXiv}, - eprintclass = {cs}, - doi = {10.48550/arXiv.2205.11487}, - url = {http://arxiv.org/abs/2205.11487}, - urldate = {2023-10-05}, - abstract = {We present Imagen, a text-to-image diffusion model with an unprecedented degree of photorealism and a deep level of language understanding. Imagen builds on the power of large transformer language models in understanding text and hinges on the strength of diffusion models in high-fidelity image generation. Our key discovery is that generic large language models (e.g. T5), pretrained on text-only corpora, are surprisingly effective at encoding text for image synthesis: increasing the size of the language model in Imagen boosts both sample fidelity and image-text alignment much more than increasing the size of the image diffusion model. Imagen achieves a new state-of-the-art FID score of 7.27 on the COCO dataset, without ever training on COCO, and human raters find Imagen samples to be on par with the COCO data itself in image-text alignment. To assess text-to-image models in greater depth, we introduce DrawBench, a comprehensive and challenging benchmark for text-to-image models. With DrawBench, we compare Imagen with recent methods including VQ-GAN+CLIP, Latent Diffusion Models, and DALL-E 2, and find that human raters prefer Imagen over other models in side-by-side comparisons, both in terms of sample quality and image-text alignment. See https://imagen.research.google/ for an overview of the results.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/Z47V6ZPD/Saharia et al. - 2022 - Photorealistic Text-to-Image Diffusion Models with.pdf;/home/danesabo/Zotero/storage/PY7P8NQV/2205.html} -} - @article{sangiovanni-vincentelliTamingDrFrankenstein2012, title = {Taming {{Dr}}. {{Frankenstein}}: {{Contract-Based Design}} for {{Cyber-Physical Systems}}*}, shorttitle = {Taming {{Dr}}. {{Frankenstein}}}, @@ -11360,41 +6731,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/CLZJWNEW/Sangiovanni-Vincentelli et al. - 2012 - Taming Dr. Frankenstein Contract-Based Design for.pdf} } -@article{sarkkaGaussianProcessLatent2019, - title = {Gaussian {{Process Latent Force Models}} for {{Learning}} and {{Stochastic Control}} of {{Physical Systems}}}, - author = {Sarkka, Simo and Alvarez, Mauricio A. and Lawrence, Neil D.}, - date = {2019-07}, - journaltitle = {Ieee Transactions on Automatic Control}, - shortjournal = {IEEE Trans. Autom. Control}, - volume = {64}, - number = {7}, - pages = {2953--2960}, - publisher = {Ieee-Inst Electrical Electronics Engineers Inc}, - location = {Piscataway}, - issn = {0018-9286}, - doi = {10.1109/TAC.2018.2874749}, - url = {https://www.webofscience.com/wos/author/record/677259?state=%7B%22siloSearchWarning%22:false,%22collection%22:%22woscc%22%7D}, - urldate = {2022-04-18}, - abstract = {This paper is concerned with learning and stochastic control in physical systems that contain unknown input signals. These unknown signals are modeled as Gaussian processes (GP) with certain parameterized covariance structures. The resulting latent force models can be seen as hybrid models that contain a first-principle physical model part and a nonparametric GP model part. We briefly review the statistical inference and learning methods for this kind of models, introduce stochastic control methodology for these models, and provide new theoretical observability and controllability results for them.}, - langid = {english}, - annotation = {WOS:000473489700027}, - file = {/home/danesabo/Zotero/storage/FH4EWY9C/Sarkka et al. - 2019 - Gaussian Process Latent Force Models for Learning .pdf} -} - -@book{scholkopfLearningKernelsSupport2002, - title = {Learning with {{Kernels}}: {{Support Vector Machines}}, {{Regularization}}, {{Optimization}}, and {{Beyond}}}, - shorttitle = {Learning with {{Kernels}}}, - author = {Schölkopf, Bernhard and Schölkopf, Director of the Max Planck Institute for Intelligent in Tübingen Germany Professor for Machine Lea Bernhard and Smola, Alexander J. and Bach, Francis and Schölkopf, rnhard and Scholkopf, Managing Director of the Max Planck Institute for Biological Cybernetics in Tubingen Germany Profe Bernhard}, - date = {2002}, - eprint = {y8ORL3DWt4sC}, - eprinttype = {googlebooks}, - publisher = {MIT Press}, - abstract = {A comprehensive introduction to Support Vector Machines and related kernel methods. In the 1990s, a new type of learning algorithm was developed, based on results from statistical learning theory: the Support Vector Machine (SVM). This gave rise to a new class of theoretically elegant learning machines that use a central concept of SVMs---kernels--for a number of learning tasks. Kernel machines provide a modular framework that can be adapted to different tasks and domains by the choice of the kernel function and the base algorithm. They are replacing neural networks in a variety of fields, including engineering, information retrieval, and bioinformatics. Learning with Kernels provides an introduction to SVMs and related kernel methods. Although the book begins with the basics, it also includes the latest research. It provides all of the concepts necessary to enable a reader equipped with some basic mathematical knowledge to enter the world of machine learning using theoretically well-founded yet easy-to-use kernel algorithms and to understand and apply the powerful algorithms that have been developed over the last few years.}, - isbn = {978-0-262-19475-4}, - langid = {english}, - pagetotal = {658} -} - @report{schweikerOperadicAnalysisDistributed2015, title = {Operadic {{Analysis}} of {{Distributed Systems}}}, author = {Schweiker, Kevin and Varadarajan, Srivatsan and Spivak, David and Schultz, Patrick and Wisnesky, Ryan and Perez, Marco}, @@ -11405,32 +6741,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/7BPMLJ2F/Schweiker et al. - 2015 - Operadic Analysis of Distributed Systems.pdf} } -@online{SEBoK, - title = {{{SEBoK}}}, - url = {https://sebokwiki.org/wiki/Guide_to_the_Systems_Engineering_Body_of_Knowledge_(SEBoK)}, - urldate = {2023-10-06}, - abstract = {The Guide to the Systems Engineering Body of Knowledge (SEBoK) is a living, authoritative guide of the Systems Engineering discipline.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/77VF96U4/Guide_to_the_Systems_Engineering_Body_of_Knowledge_(SEBoK).html} -} - -@article{sedjelmaciCyberSecurityBased2020, - title = {Cyber {{Security Based}} on {{Artificial Intelligence}} for {{Cyber-Physical Systems}}}, - author = {Sedjelmaci, Hichem and Guenab, Fateh and Senouci, Sidi-Mohammed and Moustafa, Hassnaa and Liu, Jiajia and Han, Shuai}, - date = {2020-05}, - journaltitle = {IEEE Network}, - volume = {34}, - number = {3}, - pages = {6--7}, - issn = {1558-156X}, - doi = {10.1109/MNET.2020.9105926}, - url = {https://ieeexplore.ieee.org/abstract/document/9105926}, - urldate = {2023-09-27}, - abstract = {The ten papers in this special issue focus on cybersecurity for cyber-physical systems (CPSs). The systems have become very complex, more sophisticated, intelligent and autonomous. They offer very complex interaction between heterogeneous cyber and physical components; additionally to this complexity, they are exposed to important disturbances due to unintentional and intentional events which make the prediction of their behaviors a very difficult task. Meanwhile, cyber security for CPS is attracting the attention of research scientists in both industry and academia since the number of cyber-attacks have increased and their behaviors have become more sophisticated, commonly known as zero-day threats. the papers in this issue aim to bring together researchers from academic and industry to share their vision of AI application in the cyber security context, and present challenges and recent works and advances related to AI-based cyber security applied to CPSs.}, - eventtitle = {{{IEEE Network}}}, - file = {/home/danesabo/Zotero/storage/83MCXNFL/Sedjelmaci et al. - 2020 - Cyber Security Based on Artificial Intelligence fo.pdf} -} - @article{selvarajuGradCAMVisualExplanations2020, title = {Grad-{{CAM}}: {{Visual Explanations}} from {{Deep Networks}} via {{Gradient-based Localization}}}, shorttitle = {Grad-{{CAM}}}, @@ -11453,24 +6763,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/ZCYUH685/Selvaraju et al. - 2020 - Grad-CAM Visual Explanations from Deep Networks v.pdf)} } -@book{senameRobustControlLinear2013, - title = {Robust {{Control}} and {{Linear Parameter Varying Approaches}}: {{Application}} to {{Vehicle Dynamics}}}, - shorttitle = {Robust {{Control}} and {{Linear Parameter Varying Approaches}}}, - editor = {Sename, Olivier and Gaspar, Peter and Bokor, József}, - date = {2013}, - series = {Lecture {{Notes}} in {{Control}} and {{Information Sciences}}}, - volume = {437}, - publisher = {Springer}, - location = {Berlin, Heidelberg}, - doi = {10.1007/978-3-642-36110-4}, - url = {https://link.springer.com/10.1007/978-3-642-36110-4}, - urldate = {2024-10-09}, - isbn = {978-3-642-36109-8 978-3-642-36110-4}, - langid = {english}, - keywords = {Control,Linear Parameter Varying Approaches,Robust Control,Vehicle Dynamics}, - file = {/home/danesabo/Zotero/storage/J46HBD3C/Sename et al. - 2013 - Robust Control and Linear Parameter Varying Approaches Application to Vehicle Dynamics.pdf} -} - @online{sguegliaFederalOfficialsInvestigating2023, title = {Federal Officials Investigating after Pro-{{Iran}} Group Allegedly Hacked Water Authority in {{Pennsylvania}}}, author = {Sgueglia, By Kristina, Sean Lyngaas}, @@ -11483,73 +6775,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/HZVFWDPW/index.html} } -@article{shahDynamicsMEMSColpittsOscillators2023, - title = {The Dynamics of {{MEMS-Colpitts}} Oscillators}, - author = {Shah, Shreyas Y. and Bajaj, Nikhil and Pyles, Conor and Weinstein, Dana and Rhoads, Jeffrey F. and Quinn, D. Dane}, - date = {2023-10}, - journaltitle = {Nonlinear Dynamics}, - shortjournal = {Nonlinear Dyn}, - volume = {111}, - number = {19}, - pages = {17639--17651}, - issn = {0924-090X, 1573-269X}, - doi = {10.1007/s11071-023-08774-3}, - url = {https://link.springer.com/10.1007/s11071-023-08774-3}, - urldate = {2024-11-22}, - langid = {english} -} - -@article{shahDynamicsMEMSColpittsOscillators2023a, - title = {The Dynamics of {{MEMS-Colpitts}} Oscillators}, - author = {Shah, Shreyas Y. and Bajaj, Nikhil and Pyles, Conor and Weinstein, Dana and Rhoads, Jeffrey F. and Quinn, D. Dane}, - date = {2023-10}, - journaltitle = {Nonlinear Dynamics}, - shortjournal = {Nonlinear Dyn}, - volume = {111}, - number = {19}, - pages = {17639--17651}, - issn = {0924-090X, 1573-269X}, - doi = {10.1007/s11071-023-08774-3}, - url = {https://link.springer.com/10.1007/s11071-023-08774-3}, - urldate = {2024-11-22}, - langid = {english} -} - -@article{shahDynamicsMEMSColpittsOscillators2023b, - title = {The Dynamics of {{MEMS-Colpitts}} Oscillators}, - author = {Shah, Shreyas Y. and Bajaj, Nikhil and Pyles, Conor and Weinstein, Dana and Rhoads, Jeffrey F. and Quinn, D. Dane}, - date = {2023-10}, - journaltitle = {Nonlinear Dynamics}, - shortjournal = {Nonlinear Dyn}, - volume = {111}, - number = {19}, - pages = {17639--17651}, - issn = {0924-090X, 1573-269X}, - doi = {10.1007/s11071-023-08774-3}, - url = {https://link.springer.com/10.1007/s11071-023-08774-3}, - urldate = {2024-11-22}, - langid = {english} -} - -@article{shahDynamicsMEMSColpittsOscillators2023c, - title = {The Dynamics of {{MEMS-Colpitts}} Oscillators}, - author = {Shah, Shreyas Y. and Bajaj, Nikhil and Pyles, Conor and Weinstein, Dana and Rhoads, Jeffrey F. and Quinn, D. Dane}, - date = {2023-10-01}, - journaltitle = {Nonlinear Dynamics}, - shortjournal = {Nonlinear Dyn}, - volume = {111}, - number = {19}, - pages = {17639--17651}, - issn = {1573-269X}, - doi = {10.1007/s11071-023-08774-3}, - url = {https://doi.org/10.1007/s11071-023-08774-3}, - urldate = {2024-11-22}, - abstract = {Microelectromechanical systems (MEMS) based oscillators have been proposed for use in coupled arrays for many applications, including neuromorphic computing, clocks with reduced phase noise, and sensors. In many prior studies, the models for coupled oscillator behavior depended upon the phase dynamics of the individual oscillators, while the amplitude dynamics were assumed to be negligible. However, implementation of practical large-scale MEMS oscillator networks may involve systems with significant amplitude dynamics. This cannot be described by the commonly used phase models or by steady-state models that do not predict transient behavior. We present the design and analysis of a MEMS-Colpitts oscillator topology suitable for monolithic integration (resonators with integrated circuits). Applying multiple scales analysis to the dynamics results in significantly faster computation as compared to direct integration and enables the study of nonlinear behaviors (e.g. bifurcations) and both amplitude and phase dynamics. The strong correlation between the analytical and experimental results demonstrates the effectiveness of our modelling approach.}, - langid = {english}, - keywords = {Micromechanical systems,Multiple scales,Nonlinear dynamical systems,Oscillators}, - file = {/home/danesabo/Zotero/storage/3YRLFZW5/Shah et al. - 2023 - The dynamics of MEMS-Colpitts oscillators.pdf} -} - @online{sharfAssumeGuaranteeContracts2021, title = {Assume/{{Guarantee Contracts}} for {{Dynamical Systems}}: {{Theory}} and {{Computational Tools}}}, shorttitle = {Assume/{{Guarantee Contracts}} for {{Dynamical Systems}}}, @@ -11582,24 +6807,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/ZTQV2QVD/Shevitz and Paden - 1994 - Lyapunov stability theory of nonsmooth systems.pdf} } -@article{shiLSTMautoencoderBasedOnline2023, - title = {An {{LSTM-autoencoder}} Based Online Side Channel Monitoring Approach for Cyber-Physical Attack Detection in Additive Manufacturing}, - author = {Shi, Zhangyue and Mamun, Abdullah Al and Kan, Chen and Tian, Wenmeng and Liu, Chenang}, - date = {2023-04-01}, - journaltitle = {Journal of Intelligent Manufacturing}, - shortjournal = {J Intell Manuf}, - volume = {34}, - number = {4}, - pages = {1815--1831}, - issn = {1572-8145}, - doi = {10.1007/s10845-021-01879-9}, - url = {https://doi.org/10.1007/s10845-021-01879-9}, - urldate = {2023-09-27}, - abstract = {Additive manufacturing (AM) has gained increasing popularity in a large variety of mission-critical fields, such as aerospace, medical, and transportation. The layer-by-layer fabrication scheme of the AM significantly enhances fabrication flexibility, resulting in the expanded vulnerability space of cyber-physical AM systems. This potentially leads to altered AM parts with compromised mechanical properties and functionalities. Furthermore, those internal alterations in the AM builds are very challenging to detect using the traditional geometric dimensioning and tolerancing (GD\&T) features. Therefore, how to effectively monitor and accurately detect cyber-physical attacks becomes a critical barrier for the broader adoption of AM technology. To address this issue, this paper proposes a machine learning-driven online side channel monitoring approach for AM process authentication. A data-driven feature extraction approach based on the LSTM-autoencoder is developed to detect the unintended process/product alterations caused by cyber-physical attacks. Both supervised and unsupervised monitoring schemes are implemented based on the extracted features. To validate the effectiveness of the proposed method, real-world case studies were conducted using a fused filament fabrication (FFF) platform equipped with two accelerometers. In the case study, two different types of cyber-physical attacks are implemented to mimic the potential real-world process alterations. Experimental results demonstrate that the proposed method outperforms conventional process monitoring methods, and it can effectively detect part geometry and layer thickness alterations in a real-time manner.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/3P3NG9L8/Shi et al. - 2023 - An LSTM-autoencoder based online side channel moni.pdf} -} - @inproceedings{shresthaModelCheckingSecurity2018, title = {Model {{Checking}} of {{Security Properties}} in {{Industrial Control Systems}} ({{ICS}})}, booktitle = {Proceedings of the {{Eighth ACM Conference}} on {{Data}} and {{Application Security}} and {{Privacy}}}, @@ -11708,56 +6915,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/JF45NQMG/Simko et al. - 2014 - Towards a theory for cyber-physical systems modeli.pdf} } -@article{singhDigitalTwinOrigin2021, - title = {Digital {{Twin}}: {{Origin}} to {{Future}}}, - shorttitle = {Digital {{Twin}}}, - author = {Singh, Maulshree and Fuenmayor, Evert and Hinchy, Eoin P. and Qiao, Yuansong and Murray, Niall and Devine, Declan}, - date = {2021-06}, - journaltitle = {Applied System Innovation}, - shortjournal = {Appl. Syst. Innov.}, - volume = {4}, - number = {2}, - pages = {36}, - publisher = {Mdpi}, - location = {Basel}, - doi = {10.3390/asi4020036}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {Digital Twin (DT) refers to the virtual copy or model of any physical entity (physical twin) both of which are interconnected via exchange of data in real time. Conceptually, a DT mimics the state of its physical twin in real time and vice versa. Application of DT includes real-time monitoring, designing/planning, optimization, maintenance, remote access, etc. Its implementation is expected to grow exponentially in the coming decades. The advent of Industry 4.0 has brought complex industrial systems that are more autonomous, smart, and highly interconnected. These systems generate considerable amounts of data useful for several applications such as improving performance, predictive maintenance, training, etc. A sudden influx in the number of publications related to 'Digital Twin' has led to confusion between different terminologies related to the digitalization of industries. Another problem that has arisen due to the growing popularity of DT is a lack of consensus on the description of DT as well as so many different types of DT, which adds to the confusion. This paper intends to consolidate the different types of DT and different definitions of DT throughout the literature for easy identification of DT from the rest of the complimentary terms such as 'product avatar', 'digital thread', 'digital model', and 'digital shadow'. The paper looks at the concept of DT since its inception to its predicted future to realize the value it can bring to certain sectors. Understanding the characteristics and types of DT while weighing its pros and cons is essential for any researcher, business, or sector before investing in the technology.}, - langid = {english}, - keywords = {DGC read}, - annotation = {WOS:000667262200001}, - file = {/home/danesabo/Zotero/storage/7LJF6EJ3/Singh et al. - 2021 - Digital Twin Origin to Future.pdf} -} - -@article{sisinniIndustrialInternetThings2018, - title = {Industrial {{Internet}} of {{Things}}: {{Challenges}}, {{Opportunities}}, and {{Directions}}}, - shorttitle = {Industrial {{Internet}} of {{Things}}}, - author = {Sisinni, Emiliano and Saifullah, Abusayeed and Han, Song and Jennehag, Ulf and Gidlund, Mikael}, - date = {2018-11}, - journaltitle = {IEEE Transactions on Industrial Informatics}, - shortjournal = {IEEE Trans. Ind. Inf.}, - volume = {14}, - number = {11}, - pages = {4724--4734}, - issn = {1551-3203, 1941-0050}, - doi = {10.1109/TII.2018.2852491}, - url = {https://ieeexplore.ieee.org/document/8401919/}, - urldate = {2022-09-30}, - abstract = {Internet of Things (IoT) is an emerging domain that promises ubiquitous connection to the Internet, turning common objects into connected devices. The IoT paradigm is changing the way people interact with things around them. It paves the way for creating pervasively connected infrastructures to support innovative services and promises better flexibility and efficiency. Such advantages are attractive not only for consumer applications, but also for the industrial domain. Over the last few years, we have been witnessing the IoT paradigm making its way into the industry marketplace with purposely designed solutions. In this paper, we clarify the concepts of IoT, Industrial IoT, and Industry 4.0. We highlight the opportunities brought in by this paradigm shift as well as the challenges for its realization. In particular, we focus on the challenges associated with the need of energy efficiency, real-time performance, coexistence, interoperability, and security and privacy. We also provide a systematic overview of the state-of-the-art research efforts and potential research directions to solve Industrial IoT challenges.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/FEE7KHKK/Sisinni et al. - 2018 - Industrial Internet of Things Challenges, Opportu.pdf} -} - -@article{siunitx, - title = {Siunitx — {{A}} Comprehensive ({{SI}}) Units Package}, - author = {Wright, Joseph}, - pages = {98}, - abstract = {Physical quantities have both numbers and units, and each physical quantity should be expressed as the product of a number and a unit. Typesetting physical quantities requires care to ensure that the combined mathematical meaning of the number–unit combination is clear. In particular, the SI units system lays down a consistent set of units with rules on how these are to be used. However, different countries and publishers have differing conventions on the exact appearance of numbers (and units).}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/PFF89QY2/Wright - siunitx — A comprehensive (SI) units package.pdf} -} - @article{sivajiAdaptiveCruiseControl2013, title = {Adaptive {{Cruise}} Control Systems for Vehicle Modeling Using Stop and Go Manoeuvres}, author = {Sivaji, V V and Sailaja, Dr M}, @@ -11855,14 +7012,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/32ADXEX3/Smilkov et al. - 2017 - SmoothGrad removing noise by adding noise.pdf} } -@misc{smolaLearningKernels1998, - title = {Learning with {{Kernels}}}, - author = {Smola, Alexander Johannes}, - date = {1998}, - abstract = {The present thesis can take its place among the numerous doctoral theses and other publications that are currently revolutionizing the area of machine learning. The author's basic concern is with kernel-based methods and in particular Support Vector algorithms for regression estimation for the solution of inverse, often ill- posed problems. However, Alexander Smola's thesis stands out from many of the other publications in this field. This is due in part to the author's profound theoretical penetration of his subject-matter, but also and in particular to the wealth of detailed results he has included. Especially neat and of particular relevance are the algorithmic extensions of Support Vector Machines, which can be combined as building blocks, thus markedly improving the Support Vectors. Of substantial interest is also the very elegant unsupervised method for nonlinear feature extraction, which applies the kernel-based method to classical Principal Component Analysis (kernel PCA). And although only designed to illustrate the theoretical results, the practical applications the author gives us from the area of high-energy physics and time-series analysis are highly convincing. In many respects the thesis is groundbreaking, but it is likely to soon become a frequently cited work for numerous innovative applications from the field of statistical machine learning and for improving our theoretical understanding of Support Vector Machines.}, - file = {/home/danesabo/Zotero/storage/GUH9JCVR/Smola - 1998 - Learning with Kernels.pdf;/home/danesabo/Zotero/storage/W3FPW6HL/summary.html} -} - @online{SNARKZKJargon, title = {{{SNARK}} - {{ZK Jargon Decoder}}}, url = {https://nmohnblatt.github.io/zk-jargon-decoder/definitions/snark.html}, @@ -11905,100 +7054,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/V5GDT5SK/el_19770117.html} } -@online{sohl-dicksteinDeepUnsupervisedLearning2015, - title = {Deep {{Unsupervised Learning}} Using {{Nonequilibrium Thermodynamics}}}, - author = {Sohl-Dickstein, Jascha and Weiss, Eric A. and Maheswaranathan, Niru and Ganguli, Surya}, - date = {2015-11-18}, - eprint = {1503.03585}, - eprinttype = {arXiv}, - eprintclass = {cond-mat, q-bio, stat}, - doi = {10.48550/arXiv.1503.03585}, - url = {http://arxiv.org/abs/1503.03585}, - urldate = {2023-10-05}, - abstract = {A central problem in machine learning involves modeling complex data-sets using highly flexible families of probability distributions in which learning, sampling, inference, and evaluation are still analytically or computationally tractable. Here, we develop an approach that simultaneously achieves both flexibility and tractability. The essential idea, inspired by non-equilibrium statistical physics, is to systematically and slowly destroy structure in a data distribution through an iterative forward diffusion process. We then learn a reverse diffusion process that restores structure in data, yielding a highly flexible and tractable generative model of the data. This approach allows us to rapidly learn, sample from, and evaluate probabilities in deep generative models with thousands of layers or time steps, as well as to compute conditional and posterior probabilities under the learned model. We additionally release an open source reference implementation of the algorithm.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/2A8PNKEU/Sohl-Dickstein et al. - 2015 - Deep Unsupervised Learning using Nonequilibrium Th.pdf;/home/danesabo/Zotero/storage/7DYWKBP7/1503.html} -} - -@online{SoKUsedCryptography, - title = {{{SoK}} of {{Used Cryptography}} in {{Blockchain}} | {{IEEE Journals}} \& {{Magazine}} | {{IEEE Xplore}}}, - url = {https://ieeexplore.ieee.org/document/8865045}, - urldate = {2023-10-04}, - file = {/home/danesabo/Zotero/storage/X9DRX9MM/SoK of Used Cryptography in Blockchain IEEE Jour.pdf;/home/danesabo/Zotero/storage/FLI9NNJF/8865045.html} -} - -@inproceedings{sommerOutsideClosedWorld2010, - title = {Outside the {{Closed World}}: {{On Using Machine Learning}} for {{Network Intrusion Detection}}}, - shorttitle = {Outside the {{Closed World}}}, - booktitle = {2010 {{IEEE Symposium}} on {{Security}} and {{Privacy}}}, - author = {Sommer, Robin and Paxson, Vern}, - date = {2010}, - pages = {305--316}, - publisher = {IEEE}, - location = {Oakland, CA, USA}, - doi = {10.1109/SP.2010.25}, - url = {http://ieeexplore.ieee.org/document/5504793/}, - urldate = {2023-10-03}, - abstract = {In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of normality previously learned from benign traffic, typically identified using tools borrowed from the machine learning community. However, despite extensive academic research one finds a striking gap in terms of actual deployments of such systems: compared with other intrusion detection approaches, machine learning is rarely employed in operational “real world” settings. We examine the differences between the network intrusion detection problem and other areas where machine learning regularly finds much more success. Our main claim is that the task of finding attacks is fundamentally different from these other applications, making it significantly harder for the intrusion detection community to employ machine learning effectively. We support this claim by identifying challenges particular to network intrusion detection, and provide a set of guidelines meant to strengthen future research on anomaly detection.}, - eventtitle = {2010 {{IEEE Symposium}} on {{Security}} and {{Privacy}}}, - isbn = {978-1-4244-6894-2}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/Z3ZE8W5Q/Sommer and Paxson - 2010 - Outside the Closed World On Using Machine Learnin.pdf} -} - -@unpublished{sommerville-videosMaroochyWaterBreach05:35:03UTC, - title = {Maroochy Water Breach}, - author = {family=videos, prefix=sommerville-, useprefix=true}, - year = {05:35:03 UTC}, - url = {https://www.slideshare.net/sommerville-videos/maroochy-water-breach}, - urldate = {2022-04-02} -} - -@online{songDenoisingDiffusionImplicit2022, - title = {Denoising {{Diffusion Implicit Models}}}, - author = {Song, Jiaming and Meng, Chenlin and Ermon, Stefano}, - date = {2022-10-05}, - eprint = {2010.02502}, - eprinttype = {arXiv}, - eprintclass = {cs}, - doi = {10.48550/arXiv.2010.02502}, - url = {http://arxiv.org/abs/2010.02502}, - urldate = {2023-10-05}, - abstract = {Denoising diffusion probabilistic models (DDPMs) have achieved high quality image generation without adversarial training, yet they require simulating a Markov chain for many steps to produce a sample. To accelerate sampling, we present denoising diffusion implicit models (DDIMs), a more efficient class of iterative implicit probabilistic models with the same training procedure as DDPMs. In DDPMs, the generative process is defined as the reverse of a Markovian diffusion process. We construct a class of non-Markovian diffusion processes that lead to the same training objective, but whose reverse process can be much faster to sample from. We empirically demonstrate that DDIMs can produce high quality samples \$10 \textbackslash times\$ to \$50 \textbackslash times\$ faster in terms of wall-clock time compared to DDPMs, allow us to trade off computation for sample quality, and can perform semantically meaningful image interpolation directly in the latent space.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/7AYYEX82/Song et al. - 2022 - Denoising Diffusion Implicit Models.pdf;/home/danesabo/Zotero/storage/3YEV2MR3/2010.html} -} - -@online{songGenerativeModelingEstimating2020, - title = {Generative {{Modeling}} by {{Estimating Gradients}} of the {{Data Distribution}}}, - author = {Song, Yang and Ermon, Stefano}, - date = {2020-10-10}, - eprint = {1907.05600}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - doi = {10.48550/arXiv.1907.05600}, - url = {http://arxiv.org/abs/1907.05600}, - urldate = {2023-10-05}, - abstract = {We introduce a new generative model where samples are produced via Langevin dynamics using gradients of the data distribution estimated with score matching. Because gradients can be ill-defined and hard to estimate when the data resides on low-dimensional manifolds, we perturb the data with different levels of Gaussian noise, and jointly estimate the corresponding scores, i.e., the vector fields of gradients of the perturbed data distribution for all noise levels. For sampling, we propose an annealed Langevin dynamics where we use gradients corresponding to gradually decreasing noise levels as the sampling process gets closer to the data manifold. Our framework allows flexible model architectures, requires no sampling during training or the use of adversarial methods, and provides a learning objective that can be used for principled model comparisons. Our models produce samples comparable to GANs on MNIST, CelebA and CIFAR-10 datasets, achieving a new state-of-the-art inception score of 8.87 on CIFAR-10. Additionally, we demonstrate that our models learn effective representations via image inpainting experiments.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/92EXAJWP/Song and Ermon - 2020 - Generative Modeling by Estimating Gradients of the.pdf;/home/danesabo/Zotero/storage/EPN682ZV/1907.html} -} - -@online{songImprovedTechniquesTraining2020, - title = {Improved {{Techniques}} for {{Training Score-Based Generative Models}}}, - author = {Song, Yang and Ermon, Stefano}, - date = {2020-10-23}, - eprint = {2006.09011}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - doi = {10.48550/arXiv.2006.09011}, - url = {http://arxiv.org/abs/2006.09011}, - urldate = {2023-10-05}, - abstract = {Score-based generative models can produce high quality image samples comparable to GANs, without requiring adversarial optimization. However, existing training procedures are limited to images of low resolution (typically below 32x32), and can be unstable under some settings. We provide a new theoretical analysis of learning and sampling from score models in high dimensional spaces, explaining existing failure modes and motivating new solutions that generalize across datasets. To enhance stability, we also propose to maintain an exponential moving average of model weights. With these improvements, we can effortlessly scale score-based generative models to images with unprecedented resolutions ranging from 64x64 to 256x256. Our score-based models can generate high-fidelity samples that rival best-in-class GANs on various image datasets, including CelebA, FFHQ, and multiple LSUN categories.}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/6YZT8E6Q/Song and Ermon - 2020 - Improved Techniques for Training Score-Based Gener.pdf;/home/danesabo/Zotero/storage/585R6E4V/2006.html} -} - @inproceedings{songMySmartphoneKnows2016, title = {My {{Smartphone Knows What You Print}}: {{Exploring Smartphone-based Side-channel Attacks Against 3D Printers}}}, shorttitle = {My {{Smartphone Knows What You Print}}}, @@ -12018,18 +7073,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/LTR8HF5F/Song et al. - 2016 - My Smartphone Knows What You Print Exploring Smar.pdf} } -@inproceedings{songScoreBasedGenerativeModeling2020, - title = {Score-{{Based Generative Modeling}} through {{Stochastic Differential Equations}}}, - author = {Song, Yang and Sohl-Dickstein, Jascha and Kingma, Diederik P. and Kumar, Abhishek and Ermon, Stefano and Poole, Ben}, - date = {2020-10-02}, - url = {https://openreview.net/forum?id=PxTIG12RRHS}, - urldate = {2023-10-05}, - abstract = {Creating noise from data is easy; creating data from noise is generative modeling. We present a stochastic differential equation (SDE) that smoothly transforms a complex data distribution to a known prior distribution by slowly injecting noise, and a corresponding reverse-time SDE that transforms the prior distribution back into the data distribution by slowly removing the noise. Crucially, the reverse-time SDE depends only on the time-dependent gradient field (a.k.a., score) of the perturbed data distribution. By leveraging advances in score-based generative modeling, we can accurately estimate these scores with neural networks, and use numerical SDE solvers to generate samples. We show that this framework encapsulates previous approaches in score-based generative modeling and diffusion probabilistic modeling, allowing for new sampling procedures and new modeling capabilities. In particular, we introduce a predictor-corrector framework to correct errors in the evolution of the discretized reverse-time SDE. We also derive an equivalent neural ODE that samples from the same distribution as the SDE, but additionally enables exact likelihood computation, and improved sampling efficiency. In addition, we provide a new way to solve inverse problems with score-based models, as demonstrated with experiments on class-conditional generation, image inpainting, and colorization. Combined with multiple architectural improvements, we achieve record-breaking performance for unconditional image generation on CIFAR-10 with an Inception score of 9.89 and FID of 2.20, a competitive likelihood of 2.99 bits/dim, and demonstrate high fidelity generation of \$1024\textbackslash times 1024\$ images for the first time from a score-based generative model.}, - eventtitle = {International {{Conference}} on {{Learning Representations}}}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/FBHMISQR/Song et al. - 2020 - Score-Based Generative Modeling through Stochastic.pdf} -} - @incollection{sontagControlLyapunovFunctions1999, title = {Control-{{Lyapunov}} Functions}, booktitle = {Open {{Problems}} in {{Mathematical Systems}} and {{Control Theory}}}, @@ -12056,15 +7099,6 @@ Subject\_term: Careers, Politics, Policy}, isbn = {1-4612-0577-8} } -@online{SoraCreatingVideo, - title = {Sora: {{Creating}} Video from Text}, - shorttitle = {Sora}, - url = {https://openai.com/index/sora/}, - urldate = {2024-10-30}, - langid = {american}, - file = {/home/danesabo/Zotero/storage/YUQHRZUS/sora.html} -} - @misc{sorensenLecturesCurryHowardIsomorphism, title = {Lectures on the {{Curry-Howard Isomorphism}}}, author = {Sorensen, Morten Heine B. and Urzyczyn, Pawel}, @@ -12078,13 +7112,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/277ZC3YA/spaceex.imag.fr.html} } -@online{SpecifyingSystems, - title = {Specifying {{Systems}}}, - url = {https://lamport.azurewebsites.net/tla/book.html?back-link=learning.html#book}, - urldate = {2025-02-27}, - file = {/home/danesabo/Zotero/storage/IGDN4KVB/Specifying Systems.pdf;/home/danesabo/Zotero/storage/PKCR2BP8/book.html} -} - @online{SpeedgoatRealTimeSimulation, title = {Speedgoat - {{Real-Time Simulation}} and {{Testing}}}, url = {https://www.speedgoat.com/}, @@ -12119,28 +7146,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/T5BKJJFT/Spivak - 2013 - The operad of wiring diagrams formalizing a graph.pdf;/home/danesabo/Zotero/storage/LWDRTFCD/1305.html} } -@article{sridharCyberPhysicalSystemSecurity2012, - title = {Cyber-{{Physical System Security}} for the {{Electric Power Grid}}}, - author = {Sridhar, Siddharth and Hahn, Adam and Govindarasu, Manimaran}, - date = {2012}, - journaltitle = {Proceedings of the Ieee}, - shortjournal = {Proc. IEEE}, - volume = {100}, - number = {1}, - pages = {210--224}, - publisher = {Ieee-Inst Electrical Electronics Engineers Inc}, - location = {Piscataway}, - issn = {0018-9219}, - doi = {10.1109/JPROC.2011.2165269}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1?markedListId=CPS%20Security}, - urldate = {2022-03-08}, - abstract = {The development of a trustworthy smart grid requires a deeper understanding of potential impacts resulting from successful cyber attacks. Estimating feasible attack impact requires an evaluation of the grid's dependency on its cyber infrastructure and its ability to tolerate potential failures. A further exploration of the cyber-physical relationships within the smart grid and a specific review of possible attack vectors is necessary to determine the adequacy of cybersecurity efforts. This paper highlights the significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber attacks. A layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure. A classification is presented to highlight dependencies between the cyber-physical controls required to support the smart grid and the communication and computations that must be protected from cyber attack. The paper then presents current research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally, current challenges are identified to facilitate future research efforts.}, - langid = {english}, - keywords = {DGC read,key}, - annotation = {WOS:000298326400016}, - file = {/home/danesabo/Zotero/storage/DG8KHKZH/Sridhar12.pdf} -} - @article{srivastavaDigitalTwinsServing2024, title = {Digital {{Twins Serving Cybersecurity}}: {{More Than}} a {{Model}}: {{Cybersecurity}} as a {{Future Benefit}} of {{Digital Twins}} 2}, shorttitle = {Digital {{Twins Serving Cybersecurity}}}, @@ -12185,79 +7190,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/PHFV7QMF/s-taliro.html} } -@article{standalone, - title = {Standalone {{Package}}}, - author = {Scharrer, Martin}, - pages = {29}, - abstract = {The standalone bundle allows users to easily place picture environments or other material in own source files and compile these on their own or as part of a main document. A special standalone class is provided for use with such files, which by default crops the resulting output file to the content. The standalone package enables the user to simply load the standalone files using \textbackslash input inside a main document.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/ZXNEEHZ2/Scharrer - The standalone Package.pdf} -} - -@article{stauffHighFidelityMultiphysicsModeling, - title = {High-{{Fidelity Multiphysics Modeling}} of a {{Heat Pipe Microreactor Using BlueCrab}}}, - author = {Stauff, Nicolas E. and Miao, Yinbin and Cao, Yan and Mo, Kun and Abdelhameed, Ahmed Amin E. and Ibarra, Lander and Matthews, Christopher and Shemon, Emily R.}, - journaltitle = {Nuclear Science and Engineering}, - volume = {0}, - number = {0}, - pages = {1--17}, - publisher = {Taylor \& Francis}, - issn = {0029-5639}, - doi = {10.1080/00295639.2024.2375175}, - url = {https://doi.org/10.1080/00295639.2024.2375175}, - urldate = {2025-01-21}, - abstract = {Researchers who are actively developing nuclear microreactors are planning to employ innovative designs and features using traditional commercial modeling tools that may be inadequate for their design and licensing activities. The codes developed under the U.S. Department of Energy Office of Nuclear Energy Advanced Modeling and Simulation (NEAMS) program provide flexibility in terms of geometry modeling and multiphysics coupling and are particularly well suited for modeling novel microreactor concepts. To test the maturity of these codes, this paper introduces a conceptual heat pipe microreactor (HP-MR) designed to gather various technologies of interest to microreactor developers such as control drums, heat pipes, and hydride moderators. The objective of this effort is to demonstrate NEAMS tools capability to perform high-fidelity multiphysics simulations, using coupled neutronics (via the Griffin code), heat conduction (via the BISON code), heat pipe modeling (via the Sockeye code), and hydrogen redistribution in hydride metal moderator (via the SWIFT code). Codes are coupled in-memory through the Multiphysics Object-Oriented Simulation Environment (MOOSE) framework, which permits flexible multiphysics data transfer schemes. The analysis confirmed two key aspects of the HP-MR concept: (1) its ability to follow the power load requested from the heat pipe and (2) its ability to avoid heat pipe cascading failure unless designed with high power close to operating failure limits of its heat pipes. The developed computational model was distributed publicly on the Virtual Test Bed for training purposes to accelerate adoption by industry and to provide a high-fidelity multiphysics solution for benchmarking against other tools. Additional multiphysics analyses including other transients and coupled physics were identified as necessary future work, together with a focus on validating multiphysics behavior against experiments.}, - keywords = {heat pipe,Microreactor,multiphysics} -} - -@video{stevebruntonControlBootcampCautionary2017, - entrysubtype = {video}, - title = {Control {{Bootcamp}}: {{Cautionary Tale About Inverting}} the {{Plant Dynamics}}}, - shorttitle = {Control {{Bootcamp}}}, - editor = {{Steve Brunton}}, - editortype = {director}, - date = {2017-03-08}, - url = {https://www.youtube.com/watch?v=G9apWx4iaks}, - urldate = {2024-10-09}, - abstract = {Here we show an example of why it can be a very bad idea to invert some plant dynamics, for example with unstable eigenvalues, for loop shaping. Code available at: faculty.washington.edu/sbrunton/control\_bootcamp\_code.zip These lectures follow Chapters 1 \& 3 from: Machine learning control, by Duriez, Brunton, \& Noack https://www.amazon.com/Machine-Learni... Chapters available at: http://faculty.washington.edu/sbrunto... This video was produced at the University of Washington} -} - -@video{stevebruntonControlBootcampIntroduction2017, - entrysubtype = {video}, - title = {Control {{Bootcamp}}: {{Introduction}} to {{Robust Control}}}, - shorttitle = {Control {{Bootcamp}}}, - editor = {{Steve Brunton}}, - editortype = {director}, - date = {2017-03-07}, - url = {https://www.youtube.com/watch?v=Y6MRgg_TGy0}, - urldate = {2024-10-09}, - abstract = {This video motivates robust control with the famous 1978 paper by John Doyle, titled "Guaranteed Margins for LQG Regulators"... Abstract: There are none. Code available at: faculty.washington.edu/sbrunton/control\_bootcamp\_code.zip These lectures follow Chapters 1 \& 3 from: Machine learning control, by Duriez, Brunton, \& Noack https://www.amazon.com/Machine-Learni... Chapters available at: http://faculty.washington.edu/sbrunto... This video was produced at the University of Washington} -} - -@video{stevebruntonControlBootcampLimitations2017, - entrysubtype = {video}, - title = {Control {{Bootcamp}}: {{Limitations}} on {{Robustness}}}, - shorttitle = {Control {{Bootcamp}}}, - editor = {{Steve Brunton}}, - editortype = {director}, - date = {2017-03-08}, - url = {https://www.youtube.com/watch?v=ReAmUJMb1d8}, - urldate = {2024-10-17}, - abstract = {This video describes some of the fundamental limitations of robustness, including time delays and right-half plane zeros. Code available at: faculty.washington.edu/sbrunton/control\_bootcamp\_code.zip These lectures follow Chapters 1 \& 3 from: Machine learning control, by Duriez, Brunton, \& Noack https://www.amazon.com/Machine-Learni... Chapters available at: http://faculty.washington.edu/sbrunto... This video was produced at the University of Washington} -} - -@video{stevebruntonControlBootcampSensitivity2017, - entrysubtype = {video}, - title = {Control {{Bootcamp}}: {{Sensitivity}} and {{Robustness}}}, - shorttitle = {Control {{Bootcamp}}}, - editor = {{Steve Brunton}}, - editortype = {director}, - date = {2017-03-08}, - url = {https://www.youtube.com/watch?v=7lzH-HnUFZg}, - urldate = {2024-10-17}, - abstract = {Here we show that peaks in the sensitivity function result in a lack of robustness. Code available at: faculty.washington.edu/sbrunton/control\_bootcamp\_code.zip These lectures follow Chapters 1 \& 3 from: Machine learning control, by Duriez, Brunton, \& Noack https://www.amazon.com/Machine-Learni... Chapters available at: http://faculty.washington.edu/sbrunto... This video was produced at the University of Washington} -} - @article{stiasnyPhysicsInformedNeuralNetworks2023, title = {Physics-{{Informed Neural Networks}} for {{Time-Domain Simulations}}: {{Accuracy}}, {{Computational Cost}}, and {{Flexibility}}}, shorttitle = {Physics-{{Informed Neural Networks}} for {{Time-Domain Simulations}}}, @@ -12294,29 +7226,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/J8WQK82B/Stiasny et al. - 2023 - Transient Stability Analysis with Physics-Informed.pdf;/home/danesabo/Zotero/storage/BFZKZ9EM/2106.html} } -@online{STM32H5SeriesPDF, - title = {{{STM32H5}} Series - {{PDF Documentation}}}, - url = {https://www.st.com/en/microcontrollers-microprocessors/stm32h5-series/documentation.html}, - urldate = {2025-03-26}, - abstract = {Discover PDF resources and datasheets around STM32H5 series.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/S7IGK687/STM32H5 series - PDF Documentation.pdf;/home/danesabo/Zotero/storage/C8UIVE2T/documentation.html} -} - -@report{stoufferGuideIndustrialControl2015, - title = {Guide to {{Industrial Control Systems}} ({{ICS}}) {{Security}}}, - author = {Stouffer, Keith and Lightman, Suzanne and Pillitteri, Victoria and Abrams, Marshall and Hahn, Adam}, - date = {2015-06-03}, - number = {NIST Special Publication (SP) 800-82 Rev. 2}, - institution = {{National Institute of Standards and Technology}}, - doi = {10.6028/NIST.SP.800-82r2}, - url = {https://csrc.nist.gov/pubs/sp/800/82/r2/final}, - urldate = {2023-09-27}, - abstract = {This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/E9PTQMA4/Stouffer et al. - 2015 - Guide to Industrial Control Systems (ICS) Security.pdf} -} - @report{StrategyCyberPhysicalResilience, title = {Strategy for {{Cyber-Physical Resilience}}: {{Fortifying}} Our {{Critical Infrastructure}} for a {{Digital World}}}, file = {/home/danesabo/Zotero/storage/J5F24YH2/PCAST_Cyber-Physical-Resilience-Report_Feb2024.pdf} @@ -12338,23 +7247,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/KATDRK86/1997 - Structure and interpretation of computer programs,.pdf} } -@online{StuxnetOriginsSCADA2020, - title = {Stuxnet and {{Beyond}}: {{The Origins}} of {{SCADA}} and {{Vulnerabilities}} to {{Critical Infrastructure}} - {{HS Today}}}, - shorttitle = {Stuxnet and {{Beyond}}}, - date = {2020-12-08T16:38:15+00:00}, - url = {https://www.hstoday.us/federal-pages/dhs/stuxnet-and-beyond-the-origins-of-scada-and-vulnerabilities-to-critical-infrastructure/}, - urldate = {2022-04-02}, - abstract = {Many understand this growing threat to industrial control systems but don’t know the origins of a key attack vector.}, - langid = {american} -} - -@online{SuccessiveApproximationAnalogtoDigital, - title = {Successive {{Approximation Analog-to-Digital Converters}}: {{Improving Power Efficiency}} and {{Conversion Speed}} | {{IEEE Journals}} \& {{Magazine}} | {{IEEE Xplore}}}, - url = {https://ieeexplore.ieee.org/abstract/document/7743043}, - urldate = {2025-03-26}, - file = {/home/danesabo/Zotero/storage/GUYQD5PC/Successive Approximation Analog-to-Digital Converters Improving Power Efficiency and Conversion Spe.pdf;/home/danesabo/Zotero/storage/R4A4Q4Y3/7743043.html} -} - @article{sulamanComparisonFMEASTPA2019, title = {Comparison of the {{FMEA}} and {{STPA}} Safety Analysis Methods–a Case Study}, author = {Sulaman, Sardar Muhammad and Beer, Armin and Felderer, Michael and Höst, Martin}, @@ -12380,112 +7272,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/4BY2LV8B/Sullerey - Design Guidelines for Formal Verification.pdf} } -@article{sultanMomentsGeneralizedComplex1994, - title = {Moments of the {{Generalized Complex Matrix-Variate Normal Distribution}}}, - author = {Sultan, Shagufta A and Tracy, Derrick S}, - date = {1994}, - journaltitle = {Int. J. Math. Statist. Sci.}, - volume = {3}, - number = {2}, - pages = {217--239}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/8RQGTQT9/Sultan and Tracy - MOMENTS OF THE GENERALIZED COMPLEX MATRIX-VARIATE .pdf} -} - -@article{sunCyberSecurityPower2018, - title = {Cyber Security of a Power Grid: {{State-of-the-art}}}, - shorttitle = {Cyber Security of a Power Grid}, - author = {Sun, Chih-Che and Hahn, Adam and Liu, Chen-Ching}, - date = {2018}, - journaltitle = {International Journal of Electrical Power \textbackslash\& Energy Systems}, - shortjournal = {Int. J. Electr. Power Energy Syst.}, - volume = {99}, - pages = {45--56}, - publisher = {Elsevier Sci Ltd}, - location = {Oxford}, - issn = {0142-0615}, - doi = {10.1016/j.ijepes.2017.12.020}, - url = {http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=DOISource&SrcApp=WOS&KeyAID=10.1016%2Fj.ijepes.2017.12.020&DestApp=DOI&SrcAppSID=8COHllwH67CX3cigLe5&SrcJTitle=INTERNATIONAL+JOURNAL+OF+ELECTRICAL+POWER+%26+ENERGY+SYSTEMS&DestDOIRegistrantName=Elsevier}, - urldate = {2022-03-08}, - abstract = {The integration of computing and communication capabilities with the power grid has led to numerous vulnerabilities in the cyber-physical system (CPS). This cyber security threat can significantly impact the physical infrastructure, economy, and society. In traditional IT environments, there are already abundant attack cases demonstrating that unauthorized users have the capability to access and manipulate sensitive data from a protected network domain. Electric power grids have also heavily adopted information technology (IT) to perform real-time control, monitoring, and maintenance tasks. In 2015, a sophisticated cyber attack targeted Ukrainian's power grid causing wide area power outages. It highlights the importance of investment on cyber security against intruders. This paper provides a state-of-the-art survey of the most relevant cyber security studies in power systems. It reviews research that demonstrates cyber security risks and constructs solutions to enhance the security of a power grid. To achieve this goal, this paper covers: (1) a survey of the state-of-the-art smart grid technologies, (2) power industry practices and standards, (3) solutions that address cyber security issues, (4) a review of existing CPS testbeds for cyber security research, and (5) unsolved cyber security problems. Power grid cyber security research has been conducted at Washington State University (WSU) with a hardware-in-a-loop CPS testbed. A demonstration is provided to show how the proposed defense systems can be deployed to protect a power grid against cyber intruders.}, - langid = {english}, - keywords = {DGC read,key}, - annotation = {WOS:000430770600004}, - file = {/home/danesabo/Zotero/storage/T2I2DIYT/Sun et al. - 2018 - Cyber security of a power grid State-of-the-art.pdf} -} - -@article{sundeCalculationNeutronNoise2017, - title = {Calculation of the {{Neutron Noise Induced}} by {{Shell-Mode Core-Barrel Vibrations}} in a 1-{{D}}, {{Two-Group}}, {{Two-Region Slab Reactor Model}}}, - author = {Sunde, Carl and Demazière, Christophe and Pázsit, Imre}, - date = {2017}, - journaltitle = {Nuclear Technology}, - volume = {154}, - number = {2}, - pages = {129--141}, - issn = {0029-5450 1943-7471}, - doi = {10.13182/nt06-1}, - url = {https://www.tandfonline.com/doi/abs/10.13182/NT06-1}, - abstract = {The subject of this paper is the calculation of the in-core neutron noise induced by the shell-mode vibrations of the core barrel. The original motivation was to investigate whether an out-of-phase behavior can exist between the in-core and ex-core (ex-vessel) detectors lying at the same azimuthal position. To this end, a two-region two-group diffusion model was used in one dimension. The noise was calculated by representing the vibrations of the core barrel by a model developed earlier to describe control rod vibrations. It was found that such an out-of-phase behavior indeed exists, although only for in-core detector positions close to the core boundary. This behavior is due to the local component of the noise, which is accounted for in a two-group treatment. The finding is in accordance with the experiment whose result prompted the present work. In addition to its effect on the phase, the local component also manifests itself by a large amplitude of the noise around the vibrating core boundary, i.e., in both the core and the reflector. The appearance and the properties of the local component of the neutron noise for core-barrel vibrations is the main finding of this paper. The results suggest that the efficiency of core-barrel vibrations can be enhanced if in addition to the ex-core detectors, the in-core detectors in the outermost fuel assemblies are used.} -} - -@online{sunSoKAttacksIndustrial2021, - title = {{{SoK}}: {{Attacks}} on {{Industrial Control Logic}} and {{Formal Verification-Based Defenses}}}, - shorttitle = {{{SoK}}}, - author = {Sun, Ruimin and Mera, Alejandro and Lu, Long and Choffnes, David}, - date = {2021-03-23}, - eprint = {2006.04806}, - eprinttype = {arXiv}, - eprintclass = {cs}, - url = {http://arxiv.org/abs/2006.04806}, - urldate = {2022-05-16}, - abstract = {Programmable Logic Controllers (PLCs) play a critical role in the industrial control systems. Vulnerabilities in PLC programs might lead to attacks causing devastating consequences to the critical infrastructure, as shown in Stuxnet and similar attacks. In recent years, we have seen an exponential increase in vulnerabilities reported for PLC control logic. Looking back on past research, we found extensive studies explored control logic modification attacks, as well as formal verification-based security solutions.}, - langid = {english}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/T9L6LJMI/Sun et al. - 2021 - SoK Attacks on Industrial Control Logic and Forma.pdf;/home/danesabo/Zotero/storage/VSLPZVKJ/Sun et al. - 2021 - SoK Attacks on Industrial Control Logic and Forma.pdf;/home/danesabo/Zotero/storage/4KZGCWIW/2006.html} -} - -@online{sunSoKAttacksIndustrial2021a, - title = {{{SoK}}: {{Attacks}} on {{Industrial Control Logic}} and {{Formal Verification-Based Defenses}}}, - shorttitle = {{{SoK}}}, - author = {Sun, Ruimin and Mera, Alejandro and Lu, Long and Choffnes, David}, - date = {2021-03-23}, - eprint = {2006.04806}, - eprinttype = {arXiv}, - eprintclass = {cs}, - url = {http://arxiv.org/abs/2006.04806}, - urldate = {2024-11-11}, - abstract = {Programmable Logic Controllers (PLCs) play a critical role in the industrial control systems. Vulnerabilities in PLC programs might lead to attacks causing devastating consequences to the critical infrastructure, as shown in Stuxnet and similar attacks. In recent years, we have seen an exponential increase in vulnerabilities reported for PLC control logic. Looking back on past research, we found extensive studies explored control logic modification attacks, as well as formal verification-based security solutions. We performed systematization on these studies, and found attacks that can compromise a full chain of control and evade detection. However, the majority of the formal verification research investigated ad-hoc techniques targeting PLC programs. We discovered challenges in every aspect of formal verification, rising from (1) the ever-expanding attack surface from evolved system design, (2) the real-time constraint during the program execution, and (3) the barrier in security evaluation given proprietary and vendor-specific dependencies on different techniques. Based on the knowledge systematization, we provide a set of recommendations for future research directions, and we highlight the need of defending security issues besides safety issues.}, - pubstate = {prepublished}, - keywords = {Computer Science - Cryptography and Security}, - file = {/home/danesabo/Zotero/storage/ZM8DBCRX/Sun et al. - 2021 - SoK Attacks on Industrial Control Logic and Formal Verification-Based Defenses.pdf;/home/danesabo/Zotero/storage/63DKNBDF/2006.html} -} - -@article{symb, - title = {The {{Comprehensive LaTeX Symbol List}}}, - author = {Pakin, Scott}, - pages = {164}, - abstract = {This document lists 5913 symbols and the corresponding LATEX commands that produce them. Some of these symbols are guaranteed to be available in every LATEX 2ε system; others require fonts and packages that may not accompany a given distribution and that therefore need to be installed. All of the fonts and packages used to prepare this document—as well as this document itself—are freely available from the Comprehensive TEX Archive Network (http://www.ctan.org/).}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/29UT8IGL/Pakin - The Comprehensive LaTeX Symbol List.pdf} -} - -@online{SystematizingSoK, - title = {Systematizing {{SoK}}}, - url = {https://oaklandsok.github.io/}, - urldate = {2023-10-03}, - file = {/home/danesabo/Zotero/storage/JBY8Y4W4/oaklandsok.github.io.html} -} - -@online{SystemizationKnowledgeGuidelines, - title = {Systemization of {{Knowledge}} Guidelines}, - shorttitle = {Http}, - url = {http://jsys.org/type_SoK/}, - urldate = {2023-10-04}, - abstract = {Journal of Systems Research}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/76UMW92F/type_SoK.html} -} - @inproceedings{szegedyGoingDeeperConvolutions2015, title = {Going Deeper with Convolutions}, booktitle = {2015 {{IEEE Conference}} on {{Computer Vision}} and {{Pattern Recognition}} ({{CVPR}})}, @@ -12504,22 +7290,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/NKF8H67U/Szegedy et al. - 2015 - Going deeper with convolutions.pdf} } -@inproceedings{szekeresSoKEternalWar2013, - title = {{{SoK}}: {{Eternal War}} in {{Memory}}}, - shorttitle = {{{SoK}}}, - booktitle = {2013 {{IEEE Symposium}} on {{Security}} and {{Privacy}}}, - author = {Szekeres, László and Payer, Mathias and Wei, Tao and Song, Dawn}, - date = {2013-05}, - pages = {48--62}, - issn = {1081-6011}, - doi = {10.1109/SP.2013.13}, - url = {https://ieeexplore.ieee.org/abstract/document/6547101?casa_token=BS-5MJ0vLmIAAAAA:zbQEgMfdsqfRXpxxi0C6R7go0gaaCAcHsF9WLHt91MdiFDWvo4NS8Xbh7fDNJh44ZI-IarctggU}, - urldate = {2023-10-03}, - abstract = {Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer security. The lack of safety in these languages allows attackers to alter the program's behavior or take full control over it by hijacking its control flow. This problem has existed for more than 30 years and a vast number of potential solutions have been proposed, yet memory corruption attacks continue to pose a serious threat. Real world exploits show that all currently deployed protections can be defeated. This paper sheds light on the primary reasons for this by describing attacks that succeed on today's systems. We systematize the current knowledge about various protection techniques by setting up a general model for memory corruption attacks. Using this model we show what policies can stop which attacks. The model identifies weaknesses of currently deployed techniques, as well as other proposed protections enforcing stricter policies. We analyze the reasons why protection mechanisms implementing stricter polices are not deployed. To achieve wide adoption, protection mechanisms must support a multitude of features and must satisfy a host of requirements. Especially important is performance, as experience shows that only solutions whose overhead is in reasonable bounds get deployed. A comparison of different enforceable policies helps designers of new protection mechanisms in finding the balance between effectiveness (security) and efficiency. We identify some open research problems, and provide suggestions on improving the adoption of newer techniques.}, - eventtitle = {2013 {{IEEE Symposium}} on {{Security}} and {{Privacy}}}, - file = {/home/danesabo/Zotero/storage/IZY5CZDT/Szekeres et al. - 2013 - SoK Eternal War in Memory.pdf;/home/danesabo/Zotero/storage/3IMIIH6S/6547101.html} -} - @inproceedings{sztipanovitsDesignToolChain2015, title = {Design Tool Chain for Cyber-Physical Systems: Lessons Learned}, shorttitle = {Design Tool Chain for Cyber-Physical Systems}, @@ -12539,32 +7309,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/PZWKS6V3/Sztipanovits et al. - 2015 - Design tool chain for cyber-physical systems less.pdf} } -@article{tables-tips, - title = {{{LaTeX Table Hints}} and {{Tips}}}, - author = {Robson, Adrian P}, - pages = {16}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/EIZ7H64M/Robson - LaTeX Table Hints and Tips.pdf} -} - -@article{taghiradRobustPerformanceVerification2008, - title = {Robust {{Performance Verification}} of {{Adaptive Robust Controller}} for {{Hard Disk Drives}}}, - author = {Taghirad, Hamid D. and Jamei, Ehsan}, - date = {2008-01}, - journaltitle = {IEEE Transactions on Industrial Electronics}, - volume = {55}, - number = {1}, - pages = {448--456}, - issn = {1557-9948}, - doi = {10.1109/TIE.2007.896502}, - url = {https://ieeexplore.ieee.org/abstract/document/4401189?casa_token=7Jkf_TOKTCkAAAAA:04affOUjExgKv1F-v9iTOGA59YsLtjbaxbkwzudJDa-OlON2ihhn4Eju7MfG4JRgeFKfihmLLw}, - urldate = {2024-10-15}, - abstract = {An adaptive robust controller (ARC) has been recently developed for read/write head embedded control systems of hard disk drives (HDDs). This structure is applicable to both track seeking and track following modes, and it makes the mode switching control algorithms found in conventional HDD servosystems unnecessary. An Improved Desired Compensation ARC (IDCARC) scheme is proposed in this paper, in which the traditional ARC is powered by a dynamic adaptive term. In this approach the adaptation regressor is calculated using reference trajectory information. Moreover, a robust analysis of this method is developed, in which a controller designed based on a simple model of the system is verified in a closed loop performance of a more comprehensive model of the system. The simulation result verifies the significant improvement of the performance of IDCARC compared to that of ARC and its robustness for this model. It is observed that in the presence of large disturbances the proposed method preserves the stability and a suitable performance while the ARC fails even in stability.}, - eventtitle = {{{IEEE Transactions}} on {{Industrial Electronics}}}, - keywords = {Adaptive control,Adaptive robust control,Control systems,dynamic adaptation,hard disk drive,hard disk drive (HDD),Hard disks,nonlinear robust control,Performance analysis,Power system modeling,Programmable control,Robust control,Robustness,robustness verification,Servosystems,Stability}, - file = {/home/danesabo/Zotero/storage/ZZ54H786/Taghirad and Jamei - 2008 - Robust Performance Verification of Adaptive Robust Controller for Hard Disk Drives.pdf} -} - @online{TALIROTOOLS, title = {{{TALIRO-TOOLS}}}, url = {https://sites.google.com/a/asu.edu/s-taliro/}, @@ -12572,66 +7316,6 @@ Subject\_term: Careers, Politics, Policy}, abstract = {TALIRO (TemporAl LogIC RObustness) tools is a suit of tools for the analysis of continuous and hybrid dynamical systems using linear time temporal logics.} } -@article{tangeSystematicSurveyIndustrial2020, - title = {A {{Systematic Survey}} of {{Industrial Internet}} of {{Things Security}}: {{Requirements}} and {{Fog Computing Opportunities}}}, - shorttitle = {A {{Systematic Survey}} of {{Industrial Internet}} of {{Things Security}}}, - author = {Tange, Koen and De Donno, Michele and Fafoutis, Xenofon and Dragoni, Nicola}, - date = {2020-24}, - journaltitle = {IEEE Communications Surveys \& Tutorials}, - shortjournal = {IEEE Commun. Surv. Tutorials}, - volume = {22}, - number = {4}, - pages = {2489--2520}, - issn = {1553-877X, 2373-745X}, - doi = {10.1109/COMST.2020.3011208}, - url = {https://ieeexplore.ieee.org/document/9146364/}, - urldate = {2022-09-30}, - abstract = {A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/TPCXRCVV/Tange et al. - 2020 - A Systematic Survey of Industrial Internet of Thin.pdf} -} - -@article{tanRobustControlMicrovibrations2005, - title = {Robust Control of Microvibrations with Experimental Verification}, - author = {Tan, A C H and Meurers, T and Veres, S M and Aglietti, G and Rogers, E}, - date = {2005-05-01}, - journaltitle = {Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science}, - shortjournal = {Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science}, - volume = {219}, - number = {5}, - pages = {453--460}, - issn = {0954-4062, 2041-2983}, - doi = {10.1243/095440605X16929}, - url = {https://journals.sagepub.com/doi/10.1243/095440605X16929}, - urldate = {2024-10-22}, - abstract = {The paper addresses the problem of actively attenuating a particular class of vibrations, known as microvibrations, which arise, for example, in panels used on satellites. A control scheme that incorporates feedback action is developed which operates at a set of dominant frequencies in a disturbance spectrum, where the control path model is estimated online. Relative to earlier published techniques, a new feature of the presented controller is the use of the inverse Hessian to improve adaptation speed. The control scheme also incorporates a frequency estimation technique to determine the relevant disturbance frequencies with higher precision than the standard fast Fourier transform (FFT). The control scheme is implemented on an experimental test-bed and the total achieved attenuation, as measured from the experiments, is 26 dB. The low computational demand of the control scheme allows for single chip controller implementation, a feature which is particularly attractive for potential applications areas, such as small satellites, where there are critical overall weight restrictions to be satisfied while delivering high quality overall performance.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/7E857NVF/Tan et al. - 2005 - Robust control of microvibrations with experimental verification.pdf} -} - -@article{taoDigitalTwinIndustry2019, - title = {Digital {{Twin}} in {{Industry}}: {{State-of-the-Art}}}, - shorttitle = {Digital {{Twin}} in {{Industry}}}, - author = {Tao, Fei and Zhan, He and Liu, Ang and Nee, A. Y. C.}, - date = {2019-04}, - journaltitle = {Ieee Transactions on Industrial Informatics}, - shortjournal = {IEEE Trans. Ind. Inform.}, - volume = {15}, - number = {4}, - pages = {2405--2415}, - publisher = {Ieee-Inst Electrical Electronics Engineers Inc}, - location = {Piscataway}, - issn = {1551-3203}, - doi = {10.1109/TII.2018.2873186}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1}, - urldate = {2022-03-08}, - abstract = {Digital twin (DT) is one of the most promising enabling technologies for realizing smart manufacturing and Industry 4.0. DTs are characterized by the seamless integration between the cyber and physical spaces. The importance of DTs is increasingly recognized by both academia and industry. It has been almost 15 years since the concept of the DT was initially proposed. To date, many DT applications have been successfully implemented in different industries, including product design, production, prognostics and health management, and some other fields. However, at present, no paper has focused on the review of DT applications in industry. In an effort to understand the development and application of DTs in industry, this paper thoroughly reviews the state-of-the-art of the DT research concerning the key components of DTs, the current development of DTs, and the major DT applications in industry. This paper also outlines the current challenges and some possible directions for future work.}, - langid = {english}, - keywords = {key}, - annotation = {WOS:000467095500054}, - file = {/home/danesabo/Zotero/storage/XXJFN5SS/Tao et al. - 2019 - Digital Twin in Industry State-of-the-Art.pdf} -} - @article{taoRobustFuzzyControl2005, title = {Robust Fuzzy Control for a Plant with Fuzzy Linear Model}, author = {Tao, C.W. and Taur, J.S.}, @@ -12650,77 +7334,25 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/3YPS56DA/Tao and Taur - 2005 - Robust fuzzy control for a plant with fuzzy linear.pdf} } -@article{taoRobustFuzzyControl2005a, - title = {Robust Fuzzy Control for a Plant with Fuzzy Linear Model}, - author = {Tao, C.W. and Taur, J.S.}, - date = {2005-02}, - journaltitle = {IEEE Transactions on Fuzzy Systems}, - shortjournal = {IEEE Trans. Fuzzy Syst.}, - volume = {13}, +@article{tehSensorDataQuality2020, + title = {Sensor Data Quality: A Systematic Review}, + shorttitle = {Sensor Data Quality}, + author = {Teh, Hui Yie and Kempa-Liehr, Andreas W. and Wang, Kevin I.-Kai}, + date = {2020-12}, + journaltitle = {Journal of Big Data}, + shortjournal = {J Big Data}, + volume = {7}, number = {1}, - pages = {30--41}, - issn = {1063-6706}, - doi = {10.1109/TFUZZ.2004.839653}, - url = {http://ieeexplore.ieee.org/document/1392998/}, - urldate = {2024-08-30} -} - -@article{taoRobustFuzzyControl2005b, - title = {Robust Fuzzy Control for a Plant with Fuzzy Linear Model}, - author = {Tao, C.W. and Taur, J.S.}, - date = {2005-02}, - journaltitle = {IEEE Transactions on Fuzzy Systems}, - volume = {13}, - number = {1}, - pages = {30--41}, - issn = {1941-0034}, - doi = {10.1109/TFUZZ.2004.839653}, - url = {https://ieeexplore.ieee.org/document/1392998/?arnumber=1392998}, - urldate = {2024-08-30}, - abstract = {A robust complexity reduced proportional-integral-derivative (PID)-like fuzzy controllers is designed for a plant with fuzzy linear model. The plant model is described with the expert's linguistic information involved. The linguistic information for the plant model is represented as fuzzy sets. In order to design a robust fuzzy controller for a plant model with fuzzy sets, an approach is developed to implement the best crisp approximation of fuzzy sets into intervals. Then, Kharitonov's Theorem is applied to construct a robust fuzzy controller for the fuzzy uncertain plant with interval model. With the linear combination of input variables as a new input variable, the complexity of the fuzzy mechanism of PID-like fuzzy controller is significantly reduced. The parameters in the robust fuzzy controller are determined to satisfy the stability conditions. The robustness of the designed fuzzy controller is discussed. Also, with the provided definition of relative robustness, the robustness of the complexity reduced fuzzy controller is compared to the classical PID controller for a second-order plant with fuzzy linear model. The simulation results are included to show the effectiveness of the designed PID-like robust fuzzy controller with the complexity reduced fuzzy mechanism.}, - eventtitle = {{{IEEE Transactions}} on {{Fuzzy Systems}}}, - keywords = {Aerodynamics,Fuzzy control,Fuzzy linear model,Fuzzy sets,Input variables,Mathematical model,Proportional control,Robust control,robust fuzzy controller,Robust stability,Sliding mode control,Uncertainty}, - file = {/home/danesabo/Zotero/storage/N5C6ILB6/Tao and Taur - 2005 - Robust fuzzy control for a plant with fuzzy linear.pdf;/home/danesabo/Zotero/storage/W2MJ8X2B/1392998.html} -} - -@article{taylorControllerDesignNonlinear2014, - title = {Controller Design for Nonlinear Systems Using the {{Contoured Robust Controller Bode}} Plot}, - author = {Taylor, J. D. and Messner, William}, - date = {2014}, - journaltitle = {International Journal of Robust and Nonlinear Control}, - volume = {24}, - number = {18}, - pages = {3196--3213}, - issn = {1099-1239}, - doi = {10.1002/rnc.3049}, - url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/rnc.3049}, - urldate = {2024-11-06}, - abstract = {SUMMARYIn this paper, we develop the Contoured Robust Controller Bode (CRCBode) plot and demonstrate its use in the design of robust controllers for nonlinear single-input single-output (SISO) systems. The CRCBode plot shows contours (level sets) of a robust performance quantity on the Bode magnitude and phase plots of the controller. An iterative frequency domain loop-shaping design approach is employed to eliminate all intersections of the controller frequency response with certain ‘forbidden regions,’ indicating that a standard SISO robust stability and performance criterion is satisfied. Nonlinearities are accounted for by avoiding the maximum forbidden regions over a structured uncertainty set consisting of linearizations of the system dynamics about several operating points. We demonstrate this technique by designing and experimentally verifying a flow-rate controller for a butterfly-valve based liquid cooling system, which is robust to valve nonlinearities and flow disturbances. Finally, we compare this compensator with one generated using an automated H ∞ synthesis algorithm and discuss the advantages of the CRCBode approach. Copyright © 2013 John Wiley \& Sons, Ltd.}, + pages = {1--49}, + publisher = {SpringerOpen}, + issn = {2196-1115}, + doi = {10.1186/s40537-020-0285-1}, + url = {https://link.springer.com/article/10.1186/s40537-020-0285-1}, + urldate = {2025-03-31}, + abstract = {Sensor data quality plays a vital role in Internet of Things (IoT) applications as they are rendered useless if the data quality is bad. This systematic review aims to provide an introduction and guide for researchers who are interested in quality-related issues of physical sensor data. The process and results of the systematic review are presented which aims to answer the following research questions: what are the different types of physical sensor data errors, how to quantify or detect those errors, how to correct them and what domains are the solutions in. Out of 6970 literatures obtained from three databases (ACM Digital Library, IEEE Xplore and ScienceDirect) using the search string refined via topic modelling, 57 publications were selected and examined. Results show that the different types of sensor data errors addressed by those papers are mostly missing data and faults e.g. outliers, bias and drift. The most common solutions for error detection are based on principal component analysis (PCA) and artificial neural network (ANN) which accounts for about 40\% of all error detection papers found in the study. Similarly, for fault correction, PCA and ANN are among the most common, along with Bayesian Networks. Missing values on the other hand, are mostly imputed using Association Rule Mining. Other techniques include hybrid solutions that combine several data science methods to detect and correct the errors. Through this systematic review, it is found that the methods proposed to solve physical sensor data errors cannot be directly compared due to the non-uniform evaluation process and the high use of non-publicly available datasets. Bayesian data analysis done on the 57 selected publications also suggests that publications using publicly available datasets for method evaluation have higher citation rates.}, + issue = {1}, langid = {english}, - keywords = {butterfly valves,flow-rate regulation,loop-shaping,nonlinear systems,robust control}, - file = {/home/danesabo/Zotero/storage/ZANUQYPT/Taylor and Messner - 2014 - Controller design for nonlinear systems using the Contoured Robust Controller Bode plot.pdf;/home/danesabo/Zotero/storage/V7ULZRT3/rnc.html} -} - -@misc{tcolorbox, - title = {Tcolorbox {{Package}}}, - file = {/home/danesabo/Zotero/storage/6PN2AWJK/tcolorbox.pdf} -} - -@inproceedings{teigeTwoDecadesFormal2021, - title = {Two {{Decades}} of {{Formal Methods}} in {{Industrial Products}} at {{BTC Embedded Systems}}}, - booktitle = {Formal {{Methods}}}, - author = {Teige, Tino and Eggers, Andreas and Scheibler, Karsten and Stasch, Matthias and Brockmeyer, Udo and Holberg, Hans J. and Bienmüller, Tom}, - editor = {Huisman, Marieke and Păsăreanu, Corina and Zhan, Naijun}, - date = {2021}, - series = {Lecture {{Notes}} in {{Computer Science}}}, - pages = {725--729}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-030-90870-6_40}, - abstract = {Over the last two decades, we at BTC Embedded Systems have collected experience with various applications of formal methods in our products together with our industrial partners and customers. In this paper, we give an overview of these fields of applications.}, - isbn = {978-3-030-90870-6}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/WQNPQIWI/Teige et al. - 2021 - Two Decades of Formal Methods in Industrial Produc.pdf} + file = {/home/danesabo/Zotero/storage/YSXJIAX2/Teh et al. - 2020 - Sensor data quality a systematic review.pdf} } @article{terbeekFormalMethodsTools2022, @@ -12741,24 +7373,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/CI4DN5JM/Ter Beek et al. - 2022 - Formal methods and tools for industrial critical s.pdf} } -@article{testoniReviewNuclearMicroreactors2021, - title = {Review of Nuclear Microreactors: {{Status}}, Potentialities and Challenges}, - shorttitle = {Review of Nuclear Microreactors}, - author = {Testoni, Raffaella and Bersano, Andrea and Segantin, Stefano}, - date = {2021-08-01}, - journaltitle = {Progress in Nuclear Energy}, - shortjournal = {Progress in Nuclear Energy}, - volume = {138}, - pages = {103822}, - issn = {0149-1970}, - doi = {10.1016/j.pnucene.2021.103822}, - url = {https://www.sciencedirect.com/science/article/pii/S0149197021001888}, - urldate = {2025-01-21}, - abstract = {Nuclear energy is being reconsidered worldwide as a low-carbon and dispatchable energy source. Following the development of Small Modular Reactors (SMR) to reduce the capital costs and increase the safety of new nuclear power plants, microreactors are being designed by several companies. Microreactors are usually defined as SMR with a power output in the range 1–20 MWe. They can operate as part of the electric grid, independently from the electric grid or as part of a microgrid to produce electricity and process heat. In the present paper, some microreactors at an advanced design stage are presented: eVinci™, Aurora, Holos Generators, Xe-Mobile, NuScale, Sealer, U-Battery and Micro Modular Reactor. The main applications of microreactors and the technology features are then discussed to present the main potentialities and challenges. The main advantages are the small size, the simple plant layout and the fast on-site installation. The main challenges are the limited fuel availability, the security and proliferation risk and the licensing process. Finally, an economic analysis shows that, due to an economy of scale, despite the capital cost reduction, microreactors are not cost competitive with large nuclear plants, but they are competitive with technologies with similar scale and application, such as diesel generators and renewable sources in microgrids.}, - keywords = {Microreactors,Nuclear energy,SMR}, - file = {/home/danesabo/Zotero/storage/MGZP6X8P/testoni2021.pdf;/home/danesabo/Zotero/storage/YLPCKPRW/Testoni et al. - 2021 - Review of nuclear microreactors Status, potentialities and challenges.pdf;/home/danesabo/Zotero/storage/HVDCW3NV/S0149197021001888.html} -} - @article{thalerProofsArgumentsZeroKnowledge, title = {Proofs, {{Arguments}}, and {{Zero-Knowledge}}}, author = {Thaler, Justin}, @@ -12766,40 +7380,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/2W727EK4/Thaler - Proofs, Arguments, and Zero-Knowledge.pdf} } -@article{thieCoreMotionMonitoring1979, - title = {Core {{Motion Monitoring}}}, - author = {Thie, Joseph A}, - date = {1979}, - journaltitle = {Nuclear technology}, - volume = {45}, - number = {1}, - pages = {5--45}, - publisher = {Taylor \& Francis}, - issn = {0029-5450}, - doi = {10.13182/NT79-A32283}, - abstract = {Experimental methods for detecting types of motion within and surrounding reactor cores were employed, including the dominating influence of noise analysis techniques and the associated theoretical bases underlying these methods. Out of extensive tabulations of demonstrated applications, particular attention was given to specific methods for measuring core barrel motions, in-core instrument vibrations, steam void velocity, fuel motions, and control rod vibrations. Selected features of types of in-vessel motion monitoring programs found in commercial power reactors were noted along with their motivations. Advantages and disadvantages can be cited for specific techniques.} -} - -@misc{tikz, - title = {{{TikZ Manual}}}, - file = {/home/danesabo/Zotero/storage/CGT7IB7B/tikzpgfmanual.pdf} -} - -@online{TippingPointsSpace, - title = {Tipping {{Points}} of {{Space Debris}} in {{Low Earth Orbit}} | {{International Journal}} of the {{Commons}}}, - url = {https://thecommonsjournal.org/articles/10.5334/ijc.1275}, - urldate = {2024-12-12}, - file = {/home/danesabo/Zotero/storage/HBVNXACD/Tipping Points of Space Debris in LEO - Supplement-1.pdf;/home/danesabo/Zotero/storage/HIL8DKDV/Tipping Points of Space Debris in Low Earth Orbit International Journal of the Commons.pdf;/home/danesabo/Zotero/storage/QG7TULMU/ijc.html} -} - -@article{titlesec, - title = {Titlesec, Titleps and Titletoc {{Packages}}}, - author = {Bezos, Javier}, - pages = {24}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/MLUHA9EQ/Bezos - The titlesec, titleps and titletoc Packages.pdf} -} - @inreference{TLA2023, title = {{{TLA}}{\textsuperscript{+}}}, booktitle = {Wikipedia}, @@ -12810,17 +7390,6 @@ Subject\_term: Careers, Politics, Policy}, annotation = {Page Version ID: 1191589904} } -@article{toffner-clausenMuSynthesisMuSynthesis1995, - title = {Mu-{{Synthesis}}: {{Mu-Synthesis}}}, - shorttitle = {Mu-{{Synthesis}}}, - author = {Tøffner-Clausen, S. and Andersen, Palle}, - date = {1995}, - journaltitle = {Recent Results in Robust and Adaptive Control, EURACO Workshop Florence 11-14 September 1995}, - pages = {269--303}, - abstract = {This paper provides an introduction to mu-synthesis.}, - file = {/home/danesabo/Zotero/storage/MCTBWR4Y/fulltext.pdf} -} - @article{tomlinComputationalTechniquesVerification2003, title = {Computational Techniques for the Verification of Hybrid Systems}, author = {Tomlin, C.J. and Mitchell, I. and Bayen, A.M. and Oishi, M.}, @@ -12862,28 +7431,6 @@ Subject\_term: Careers, Politics, Policy}, url = {https://pdfs.semanticscholar.org/f7f4/aa142f6beff42a95d6254289400a6038774e.pdf} } -@article{topperModelBasedSystemsEngineering2013, - title = {Model-{{Based Systems Engineering}} in {{Support}} of {{Complex Systems Development}}}, - author = {Topper, J. Stephen and Horner, Nathaniel C.}, - date = {2013}, - journaltitle = {JOHNS HOPKINS APL TECHNICAL DIGEST}, - shortjournal = {Johns Hopkins APL Tech. Dig.}, - volume = {32}, - number = {1}, - pages = {419--432}, - publisher = {Johns Hopkins Univ Applied Physics Laboratory Llc}, - location = {Laurel}, - issn = {0270-5214, 1930-0530}, - url = {https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1}, - urldate = {2023-10-03}, - abstract = {Model-based systems engineering techniques facilitate complex system design and documentation processes. A rigorous, iterative conceptual development process based on the Unified Modeling Language (UML) or the Systems Modeling Language (SysML) and consisting of domain modeling, use case development, and behavioral and structural modeling supports design, architecting, analysis, modeling and simulation, test and evaluation, and program management activities. The resulting model is more useful than traditional documentation because it represents structure, data, and functions, along with associated documentation, in a multidimensional, navigable format. Beyond benefits to project documentation and stakeholder communication, UML- and SysML-based models also support direct analysis methods, such as functional thread extraction. The APL team is continuing to develop analysis techniques using conceptual models to reduce the risk of design and test errors, reduce costs, and improve the quality of analysis and supporting modeling and simulation activities in the development of complex systems.}, - langid = {english}, - pagetotal = {14}, - keywords = {Important}, - annotation = {Web of Science ID: WOS:000321063200005}, - file = {/home/danesabo/Zotero/storage/F5BMARBR/Topper and Horner - 2013 - Model-Based Systems Engineering in Support of Comp.pdf} -} - @article{torbenAutomaticSimulationbasedTesting2023, title = {Automatic Simulation-Based Testing of Autonomous Ships Using {{Gaussian}} Processes and Temporal Logic}, author = {Torben, Tobias Rye and Glomsrud, Jon Arne and Pedersen, Tom Arne and Utne, Ingrid B and Sørensen, Asgeir J}, @@ -12903,36 +7450,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/EQEE26WM/Torben et al. - 2023 - Automatic simulation-based testing of autonomous s.pdf} } -@inproceedings{tothBayesianLearningSequential2020, - title = {Bayesian {{Learning}} from {{Sequential Data}} Using {{Gaussian Processes}} with {{Signature Covariances}}}, - booktitle = {Proceedings of the 37th {{International Conference}} on {{Machine Learning}}}, - author = {Toth, Csaba and Oberhauser, Harald}, - date = {2020-11-21}, - pages = {9548--9560}, - publisher = {PMLR}, - issn = {2640-3498}, - url = {https://proceedings.mlr.press/v119/toth20a.html}, - urldate = {2022-04-21}, - abstract = {We develop a Bayesian approach to learning from sequential data by using Gaussian processes (GPs) with so-called signature kernels as covariance functions. This allows to make sequences of different length comparable and to rely on strong theoretical results from stochastic analysis. Signatures capture sequential structure with tensors that can scale unfavourably in sequence length and state space dimension. To deal with this, we introduce a sparse variational approach with inducing tensors. We then combine the resulting GP with LSTMs and GRUs to build larger models that leverage the strengths of each of these approaches and benchmark the resulting GPs on multivariate time series (TS) classification datasets.}, - eventtitle = {International {{Conference}} on {{Machine Learning}}}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/QYT92IJU/Toth and Oberhauser - 2020 - Bayesian Learning from Sequential Data using Gauss.pdf;/home/danesabo/Zotero/storage/Z54Z38KT/Toth and Oberhauser - 2020 - Bayesian Learning from Sequential Data using Gauss.pdf} -} - -@article{trentyOperationalFeedbackInternal1995, - title = {Operational Feedback on Internal Structure Vibration in 54 {{French PWRs}} during 300 Fuel Cycles}, - author = {Trenty, A.}, - date = {1995}, - journaltitle = {Progress in Nuclear Energy}, - volume = {29}, - number = {3--4}, - pages = {347--356}, - issn = {01491970}, - doi = {10.1016/0149-1970(95)00017-e}, - url = {https://www.sciencedirect.com/science/article/abs/pii/014919709500017E?via%3Dihub}, - abstract = {EDF has acquired extensive feedback on vibration of reactor vessel internals by analysing ex-core neutron noise on its 54 pressurized water reactors during the course of over 300 fuel cycles. This feedback has been built up by processing more than 3,000 vibratory signatures acquired since the startup of its reactors. These signatures are now centralized for the whole of France in the “SINBAD” data base. Signature processing has enabled: 1. • distinguishing between mechanical phenomena and signature variation linked to unit operation: in particular, the impact on signature level of unit operating parameters such as initial fuel enrichment and burn-up rate was assessed; 2. • among the purely mechanical phenomena, pointing up slight changes in position of vessel internals and the first signs of structural wear: relaxation (in the hold-down spring and fuel rod assemblies) and wear on surfaces of contact between internals and reactor vessel were detected; 3. • lastly and most importantly, automatic recognition of the various types of vibratory behavior of internals. It was consequently possible to draw up user requirement specifications for automated monitoring of internals, which should soon be integrated in PSAD, a system which groups several reactor monitoring functions.} -} - @inreference{TrustedComputerSystem2024, title = {Trusted {{Computer System Evaluation Criteria}}}, booktitle = {Wikipedia}, @@ -12944,23 +7461,6 @@ Subject\_term: Careers, Politics, Policy}, annotation = {Page Version ID: 1210281816} } -@article{tsialiamanisGenerativeModelsBasis2021, - title = {On Generative Models as the Basis for Digital Twins}, - author = {Tsialiamanis, George and Wagg, David J. and Dervilis, Nikolaos and Worden, Keith}, - date = {2021}, - journaltitle = {Data-Centric Engineering}, - shortjournal = {DCE}, - volume = {2}, - pages = {e11}, - issn = {2632-6736}, - doi = {10.1017/dce.2021.13}, - url = {https://www.cambridge.org/core/product/identifier/S2632673621000137/type/journal_article}, - urldate = {2022-03-02}, - abstract = {A framework is proposed for generative models as a basis for digital twins or mirrors of structures. The proposal is based on the premise that deterministic models cannot account for the uncertainty present in most structural modeling applications. Two different types of generative models are considered here. The first is a physics-based model based on the stochastic finite element (SFE) method, which is widely used when modeling structures that have material and loading uncertainties imposed. Such models can be calibrated according to data from the structure and would be expected to outperform any other model if the modeling accurately captures the true underlying physics of the structure. The potential use of SFE models as digital mirrors is illustrated via application to a linear structure with stochastic material properties. For situations where the physical formulation of such models does not suffice, a datadriven framework is proposed, using machine learning and conditional generative adversarial networks (cGANs). The latter algorithm is used to learn the distribution of the quantity of interest in a structure with material nonlinearities and uncertainties. For the examples considered in this work, the data-driven cGANs model outperforms the physicsbased approach. Finally, an example is shown where the two methods are coupled such that a hybrid model approach is demonstrated.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/9FDATPBL/On generative models as the basis for digital twins.pdf} -} - @inproceedings{tsukadaToolchainModelChecking2016, title = {A Toolchain on Model Checking {{SPIN}} via {{Kalman Decomposition}} for Control System Software}, booktitle = {2016 {{IEEE International Conference}} on {{Automation Science}} and {{Engineering}} ({{CASE}})}, @@ -12996,21 +7496,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/MB2M7PU8/Tuegel et al. - 2011 - Reengineering Aircraft Structural Life Prediction .pdf} } -@report{turkCyberIncidentsInvolving2005, - title = {Cyber {{Incidents Involving Control Systems}}}, - author = {Turk, Robert J.}, - date = {2005-10-01}, - number = {INL/EXT-05-00671}, - institution = {Idaho National Lab. (INL), Idaho Falls, ID (United States)}, - doi = {10.2172/911775}, - url = {https://www.osti.gov/biblio/911775}, - urldate = {2022-03-22}, - abstract = {The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).}, - langid = {english}, - keywords = {DGC read}, - file = {/home/danesabo/Zotero/storage/JHL3A738/Turk - 2005 - Cyber Incidents Involving Control Systems.pdf;/home/danesabo/Zotero/storage/WBH4WQ7E/911775.html} -} - @online{TypesProgrammingLanguages, title = {Types and {{Programming Languages}}}, url = {https://web-p-ebscohost-com.pitt.idm.oclc.org/ehost/ebookviewer/ebook?sid=9aae5940-b8e1-4213-9bc3-47cea530173c%40redis&vid=0&format=EB}, @@ -13028,32 +7513,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/R4C4KBVR/www.typhoon-hil.com.html} } -@inproceedings{uckunModelBasedSystemsEngineering2011, - title = {Model-{{Based Systems Engineering}} for the {{Design}} and {{Development}} of {{Complex Aerospace Systems}}}, - author = {Uckun, Serdar and Kurtoglu, Tolga and Bunus, Peter and Tumer, Irem and Hoyle, Christopher and Musliner, David}, - date = {2011-10-18}, - pages = {2011-01-2664}, - doi = {10.4271/2011-01-2664}, - url = {https://www.sae.org/content/2011-01-2664/}, - urldate = {2023-10-03}, - eventtitle = {Aerospace {{Technology Conference}} and {{Exposition}}} -} - -@inproceedings{uluagacSensoryChannelThreats2014, - title = {Sensory Channel Threats to {{Cyber Physical Systems}}: {{A}} Wake-up Call}, - shorttitle = {Sensory Channel Threats to {{Cyber Physical Systems}}}, - booktitle = {2014 {{IEEE Conference}} on {{Communications}} and {{Network Security}}}, - author = {Uluagac, A. Selcuk and Subramanian, Venkatachalam and Beyah, Raheem}, - date = {2014-10}, - pages = {301--309}, - doi = {10.1109/CNS.2014.6997498}, - url = {https://ieeexplore.ieee.org/abstract/document/6997498?casa_token=eDetTaSM9l8AAAAA:XBYe2w66DUfoi3YO8RYukrB0ZlkaI_z5-WW17tczR2njEgix6AyGvZSqsX0cnaes2IMgFIgxmQ}, - urldate = {2023-09-27}, - abstract = {Cyber-Physical Systems (CPS) is a relatively novel computing paradigm where there is a tight integration of communications, computation, and the physical environment. An important component of the CPS devices is the sensors they use to interact with each other and the physical world around them. With CPS applications, engineers monitor the structural health of highways and bridges, farmers check the health of their crops, and ecologists observe wildlife in their natural habitat. Nonetheless, current security models consider protecting only networking components of the CPS devices utilizing traditional security mechanisms (e.g., an intrusion detection system for the data that traverse the network protocol stacks). The protection mechanisms are not sufficient to protect CPS devices from threats emanating from sensory channels. Using sensory channels (e.g., light, temperature, infrared), an adversary can successfully attack systems. Specifically, the adversary can (1) trigger existing malware, (2) transfer malware, or (3) combine malicious use of different sensory channels to increase the impact of the attack on CPS devices. In this work, we focus on these novel sensory channel threats to CPS devices and applications. We first note how sensory channel threats are an emerging area for the CPS world. Then, we analyze the performance various sensory channel threats. Moreover, using an iRobot Create as our CPS platform, we exploit simple vulnerable programs on iRobot through its infrared channel. Finally, we introduce the design of a novel sensory channel aware intrusion detection system as a protection mechanism against the sensory channel threats for CPS devices.}, - eventtitle = {2014 {{IEEE Conference}} on {{Communications}} and {{Network Security}}}, - file = {/home/danesabo/Zotero/storage/GTTH2G95/Uluagac et al. - 2014 - Sensory channel threats to Cyber Physical Systems.pdf} -} - @online{UnivalentFoundationsMathematics2010, title = {Univalent {{Foundations}} of {{Mathematics}}}, date = {2010-12-16T14:05:59-0500}, @@ -13062,18 +7521,6 @@ Subject\_term: Careers, Politics, Policy}, abstract = {The correspondence between homotopy types and higher categorical analogs of groupoids which was first conjectured by Alexander Grothendieck naturally leads to a view of mathematics where sets are used to parametrize collections of objects without "internal structure" while collections of objects with "internal structure" are parametrized by more general homotopy types. Univalent Foundations are based on the combination of this view with the discovery that it is possible to directly formalize reasoning about homotopy types using Martin-Lof type theories.} } -@inproceedings{urazayevDistributedEnergyManagement2019, - title = {Distributed {{Energy Management System}} with the {{Use}} of {{Digital Twin}}}, - booktitle = {2019 {{International Multi-Conference}} on {{Engineering}}, {{Computer}} and {{Information Sciences}} ({{SIBIRCON}})}, - author = {Urazayev, Damir and Bragin, Dmitriy and Zykov, Dmitriy and Hafizov, Rashit and Pospelova, Irina and Shelupanov, Alexander}, - date = {2019-10}, - pages = {0685--0689}, - doi = {10.1109/SIBIRCON48586.2019.8958118}, - abstract = {At present, the transition from the traditional scheme of energy supply organization to new technologies and practices, implying decentralization, digitalization and intellectualization systems of energy-saving with the active involvement of consumers in the generation and management of all types of energy resources, is becoming increasingly relevant. According to forecasts of experts given in the study “Distributed energy in Russia: potential for development”, the architecture of a distributed energy (DE) system being created will include the following elements: manageable interfaces, “routers of energy”, and platforms of management and services. Most of the platform solutions being created include only a part of the elements from the list above. Existing solutions in the field of DE are based on algorithms that do not provide the flexibility of decision-making and the proper level of security. The purpose of our work is to develop the concept of the intelligent management system of DE facilities. The principle of modular programming using the kernel expansion method was taken as a basis for the development of the concept. The proposed intelligent management system operates in real-time and allows implementing new algorithms and methods of control of the power system, including the management of its active elements. The subsequent development of the project includes the development of the architecture of the software platform and the implementation of the management system of DE facilities. Using the results of the work will increase the efficiency of management of DE facilities.}, - eventtitle = {2019 {{International Multi-Conference}} on {{Engineering}}, {{Computer}} and {{Information Sciences}} ({{SIBIRCON}})}, - file = {/home/danesabo/Zotero/storage/E55PTBBZ/Urazayev et al. - 2019 - Distributed Energy Management System with the Use .pdf;/home/danesabo/Zotero/storage/LDMRPCTR/8958118.html} -} - @article{urbanDevelopingEmbeddedSoftware, title = {Developing {{Embedded Software}} with {{Model-Based Design}} to {{Meet Certification Standards}}}, author = {Urban, Paul and Harper, Jeff}, @@ -13107,10 +7554,10 @@ Subject\_term: Careers, Politics, Policy}, eprintclass = {math}, doi = {10.48550/arXiv.1408.1598}, url = {http://arxiv.org/abs/1408.1598}, - urldate = {2023-12-07}, + urldate = {2023-12-08}, abstract = {In this paper, we use the language of operads to study open dynamical systems. More specifically, we study the algebraic nature of assembling complex dynamical systems from an interconnection of simpler ones. The syntactic architecture of such interconnections is encoded using the visual language of wiring diagrams. We define the symmetric monoidal category W, from which we may construct an operad O(W), whose objects are black boxes with input and output ports, and whose morphisms are wiring diagrams, thus prescribing the algebraic rules for interconnection. We then define two W-algebras, G and L, which associate semantic content to the structures in W. Respectively, they correspond to general and to linear systems of differential equations, in which an internal state is controlled by inputs and produces outputs. As an example, we use these algebras to formalize the classical problem of systems of tanks interconnected by pipes, and hence make explicit the algebraic relationships among systems at different levels of granularity.}, pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/T2V4TXP6/Vagner et al. - 2015 - Algebras of Open Dynamical Systems on the Operad o.pdf;/home/danesabo/Zotero/storage/R4GV5EVF/1408.html} + file = {/home/danesabo/Zotero/storage/HQBVBU8A/Vagner et al. - 2015 - Algebras of Open Dynamical Systems on the Operad o.pdf;/home/danesabo/Zotero/storage/HJFNVTGE/1408.html} } @online{vagnerAlgebrasOpenDynamical2015a, @@ -13122,10 +7569,10 @@ Subject\_term: Careers, Politics, Policy}, eprintclass = {math}, doi = {10.48550/arXiv.1408.1598}, url = {http://arxiv.org/abs/1408.1598}, - urldate = {2023-12-08}, + urldate = {2023-12-07}, abstract = {In this paper, we use the language of operads to study open dynamical systems. More specifically, we study the algebraic nature of assembling complex dynamical systems from an interconnection of simpler ones. The syntactic architecture of such interconnections is encoded using the visual language of wiring diagrams. We define the symmetric monoidal category W, from which we may construct an operad O(W), whose objects are black boxes with input and output ports, and whose morphisms are wiring diagrams, thus prescribing the algebraic rules for interconnection. We then define two W-algebras, G and L, which associate semantic content to the structures in W. Respectively, they correspond to general and to linear systems of differential equations, in which an internal state is controlled by inputs and produces outputs. As an example, we use these algebras to formalize the classical problem of systems of tanks interconnected by pipes, and hence make explicit the algebraic relationships among systems at different levels of granularity.}, pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/HQBVBU8A/Vagner et al. - 2015 - Algebras of Open Dynamical Systems on the Operad o.pdf;/home/danesabo/Zotero/storage/HJFNVTGE/1408.html} + file = {/home/danesabo/Zotero/storage/T2V4TXP6/Vagner et al. - 2015 - Algebras of Open Dynamical Systems on the Operad o.pdf;/home/danesabo/Zotero/storage/R4GV5EVF/1408.html} } @article{vanderveenSelfOrganizationCyberphysicalEnergy2024, @@ -13146,25 +7593,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/BLM7F3EF/van der Veen et al. - 2024 - Self-Organization in Cyberphysical Energy Systems.pdf;/home/danesabo/Zotero/storage/3UST3BK7/10398556.html} } -@article{vazquezMultiOutputSuppportVector2003, - title = {Multi-{{Output Suppport Vector Regression}}}, - author = {Vazquez, Emmanuel and Walter, Eric}, - date = {2003-09-01}, - journaltitle = {IFAC Proceedings Volumes}, - shortjournal = {IFAC Proceedings Volumes}, - series = {13th {{IFAC Symposium}} on {{System Identification}} ({{SYSID}} 2003), {{Rotterdam}}, {{The Netherlands}}, 27-29 {{August}}, 2003}, - volume = {36}, - number = {16}, - pages = {1783--1788}, - issn = {1474-6670}, - doi = {10.1016/S1474-6670(17)35018-8}, - url = {https://www.sciencedirect.com/science/article/pii/S1474667017350188}, - urldate = {2022-04-21}, - abstract = {Support vector regression builds a model of a process that depends on a set of factors. It traditionally considers one output at a time, which means that advantage cannot be taken ofthe correlations that may exist between outputs. The purpose of this paper is to show how the body of knowledge accumulated by geostatisticians on Kriging and its extensions over the last 40 years can help extend support vector regression to the multi-output case and provides guidance for the choice of a suitable kernel for a given application, a recurrent, fundamental and largely open question.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/VEWCYHZN/Vazquez and Walter - 2003 - Multi-Output Suppport Vector Regression.pdf;/home/danesabo/Zotero/storage/944WPN9U/S1474667017350188.html} -} - @book{veneriHandsonIndustrialInternet2018, title = {Hands-on Industrial {{Internet}} of {{Things}}: Create a Powerful Industrial {{IoT}} Infrastructure Using Industry 4.0}, author = {Veneri, Giacomo and Capasso, Antonio}, @@ -13202,43 +7630,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/DYKMLYTI/d46bqL1PaidLX23hjxCYCGO_xrFquiewA1TEhUpinGY4MW7ZjB1A_W1zZ7fdGuCMvPXmbo_-jog37dk.html} } -@article{vijayakumaranReliableNextGeneration2020, - title = {A Reliable next Generation Cyber Security Architecture for Industrial Internet of Things Environment}, - author = {Vijayakumaran, C. and Muthusenthil, B. and Manickavasagam, B.}, - date = {2020-02-01}, - journaltitle = {International Journal of Electrical and Computer Engineering (IJECE)}, - shortjournal = {IJECE}, - volume = {10}, - number = {1}, - pages = {387}, - issn = {2088-8708, 2088-8708}, - doi = {10.11591/ijece.v10i1.pp387-395}, - url = {http://ijece.iaescore.com/index.php/IJECE/article/view/18300}, - urldate = {2022-09-30}, - abstract = {Architectural changes are happening in the modern industries due to the adaption and the deployment of „Internet of Things (IoT)‟ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable „Next Generation Cyber Security Architecture (NCSA)‟ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of exchanging real-time critical information between devices without any human intervention. It proposes an analytical framework that can be used to protect entities and network traffics involved in the IIoT wireless communication. It incorporates an automated cyber-defense authentication mechanism that detects and prevents security attacks when a network session has been established. The defense mechanism accomplishes the required level of security protection in the network by generating an identity token which is cryptographically encrypted and verified by a virtual gateway system. The proposed NCSA improves security in the IIoT environment and reduces operational management cost.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/UF4Z58J3/Vijayakumaran et al. - 2020 - A reliable next generation cyber security architec.pdf} -} - -@article{villalongaCloudBasedIndustrialCyber2020, - title = {Cloud-{{Based Industrial Cyber}}–{{Physical System}} for {{Data-Driven Reasoning}}: {{A Review}} and {{Use Case}} on an {{Industry}} 4.0 {{Pilot Line}}}, - shorttitle = {Cloud-{{Based Industrial Cyber}}–{{Physical System}} for {{Data-Driven Reasoning}}}, - author = {Villalonga, Alberto and Beruvides, Gerardo and Castano, Fernando and Haber, Rodolfo E.}, - date = {2020-09}, - journaltitle = {IEEE Transactions on Industrial Informatics}, - shortjournal = {IEEE Trans. Ind. Inf.}, - volume = {16}, - number = {9}, - pages = {5975--5984}, - issn = {1551-3203, 1941-0050}, - doi = {10.1109/TII.2020.2971057}, - url = {https://ieeexplore.ieee.org/document/8978483/}, - urldate = {2022-09-30}, - abstract = {Nowadays, reconfiguration and adaptation by means of optimal re-parameterization in Industrial Cyber–Physical Systems (ICPSs) is one of the bottlenecks for the digital transformation of the manufacturing industry. This article proposes a cloud-to-edge-based ICPS equipped with machine learning techniques. The proposed reasoning module includes a learning procedure based on two reinforcement learning techniques, running in parallel, for updating both the data-conditioning and processing strategy and the prediction model. The presented solution distributes computational resources and analytic engines in multiple layers and independent modules, increasing the smartness and the autonomy for monitoring and control the behavior at the shop floor level. The suitability of the proposed solution, evaluated in a pilot line, is endorsed by fast time response (i.e., 0.01 s at the edge level) and the appropriate setting of optimal operational parameters for guaranteeing the desired quality surface roughness during macro- and micro-milling operations.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/H9TLYUU6/Villalonga et al. - 2020 - Cloud-Based Industrial Cyber–Physical System for D.pdf} -} - @article{viteriExplosiveProofsMathematical2022, title = {Explosive {{Proofs}} of {{Mathematical Truths}}}, author = {Viteri, Scott and DeDeo, Simon}, @@ -13302,13 +7693,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/XENN9EAI/Voros et al. - 2004 - An Introduction to Formal Methods.pdf} } -@report{W32StuxnetDossier, - title = {W32.{{Stuxnet Dossier}}}, - url = {https://pax0r.com/hh/stuxnet/Symantec-Stuxnet-Update-Feb-2011.pdf}, - urldate = {2022-03-22}, - file = {/home/danesabo/Zotero/storage/ZDJ2MYSX/Symantec-Stuxnet-Update-Feb-2011.pdf} -} - @article{wadlerPropositionsTypes2015, title = {Propositions as Types}, author = {Wadler, Philip}, @@ -13351,23 +7735,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/C9DMSYH8/Wagner et al. - 2024 - Digital Twins in Power Systems A Proposal for a D.pdf;/home/danesabo/Zotero/storage/V8XDSUNR/10398557.html} } -@inproceedings{wahoNonbinarySuccessiveApproximation2014, - title = {Non-Binary {{Successive Approximation Analog-to-Digital Converters}}: {{A Survey}}}, - shorttitle = {Non-Binary {{Successive Approximation Analog-to-Digital Converters}}}, - booktitle = {2014 {{IEEE}} 44th {{International Symposium}} on {{Multiple-Valued Logic}}}, - author = {Waho, Takao}, - date = {2014-05}, - pages = {73--78}, - issn = {2378-2226}, - doi = {10.1109/ISMVL.2014.21}, - url = {https://ieeexplore.ieee.org/abstract/document/6844999}, - urldate = {2025-03-26}, - abstract = {Low-power successive-approximation (SA) analog-to-digital converters (ADCs) are attracting increasing attention these days in biomedical and sensor network applications. The binary search algorithm is one of the basic idea behind how they obtain a binary code representing an analog input. In practice, the imperfectness of analog circuit elements sometimes results in decision errors and decreases the resolution of A/D conversion. Thus, making accurate decisions using imperfect elements is a big challenge. This paper surveys one solution known as non-binary SA with redundancy as well as related topics and its application to state-of-the-art SA ADCs.}, - eventtitle = {2014 {{IEEE}} 44th {{International Symposium}} on {{Multiple-Valued Logic}}}, - keywords = {ADC,Approximation methods,Arrays,Capacitors,CMOS integrated circuits,non-binary,redundancy,Redundancy,Solid state circuits,successive-approximation}, - file = {/home/danesabo/Zotero/storage/9CZ9BXXK/Waho - 2014 - Non-binary Successive Approximation Analog-to-Digital Converters A Survey.pdf;/home/danesabo/Zotero/storage/YE7GXLHZ/6844999.html} -} - @article{wallPolynomialsWhoseZeros1945, title = {Polynomials {{Whose Zeros Have Negative Real Parts}}}, author = {Wall, H. S.}, @@ -13448,17 +7815,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/GJ8Q4YD8/Wang et al. - 2019 - A Formal Model-Based Design Method for Robotic Sys.pdf} } -@article{wangInterpolatingImagesDiffusion2023, - title = {Interpolating between {{Images}} with {{Diffusion Models}}}, - author = {Wang, Clinton and Golland, Polina}, - date = {2023-06-23}, - url = {https://openreview.net/forum?id=L2D9Gybx0P#all}, - urldate = {2024-11-08}, - abstract = {One little-explored frontier of image generation and editing is the task of interpolating between two input images, a feature missing from all currently deployed image generation pipelines. We argue that such a feature can expand the creative applications of such models, and propose a method for zero-shot interpolation using latent diffusion models. We apply interpolation in the latent space at a sequence of decreasing noise levels, then perform denoising conditioned on interpolated text embeddings derived from textual inversion and (optionally) subject poses derived from OpenPose. For greater consistency, or to specify additional criteria, we can generate several candidates and use CLIP to select the highest quality image. We obtain convincing interpolations across diverse subject poses, image styles, and image content, and show that standard quantitative metrics such as FID are insufficient to measure the quality of an interpolation. Code and data are available at \textbackslash url\{https://clintonjwang.github.io/interpolation\}.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/FSUBB6F2/Wang and Golland - 2023 - Interpolating between Images with Diffusion Models.pdf} -} - @online{wangPINNsBasedUncertaintyQuantification2023, title = {{{PINNs-Based Uncertainty Quantification}} for {{Transient Stability Analysis}}}, author = {Wang, Ren and Zhong, Ming and Xu, Kaidi and Sánchez-Cortés, Lola Giráldez and Guerra, Ignacio de Cominges}, @@ -13474,49 +7830,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/NA3Q8IV8/Wang et al. - 2023 - PINNs-Based Uncertainty Quantification for Transie.pdf;/home/danesabo/Zotero/storage/KVHS32C8/2311.html} } -@article{wangRobustControlStructural2004, - title = {Robust {{Control}} for {{Structural Systems}} with {{Unstructured Uncertainties}}}, - author = {Wang, Sheng-Guo and Roschke, Paul N. and Yeh, H. Y.}, - date = {2004-03-01}, - journaltitle = {Journal of Engineering Mechanics}, - volume = {130}, - number = {3}, - pages = {337--346}, - publisher = {American Society of Civil Engineers}, - issn = {0733-9399}, - doi = {10.1061/(ASCE)0733-9399(2004)130:3(337)}, - url = {https://ascelibrary.org/doi/10.1061/%28ASCE%290733-9399%282004%29130%3A3%28337%29}, - urldate = {2024-10-15}, - abstract = {Natural hazards, such as earthquakes and strong wind events, place large forces on tall, slender structures and on long-span bridges. In view of the numerous uncertainties due to model errors, stress calculations, material properties, and environmental ...}, - langid = {english}, - keywords = {bridges (structures),design engineering,earthquakes,Earthquakes,robust control,Robust design,Simulation,Structural control,structural engineering,uncertain systems,Uncertainty principles,Vibration design,vibrations}, - file = {/home/danesabo/Zotero/storage/SM7B63IE/Wang et al. - 2004 - Robust Control for Structural Systems with Unstructured Uncertainties.pdf} -} - -@inproceedings{wankhadeCyberPhysicalSystem2020, - title = {Cyber {{Physical System Framework}}: {{An Apropos Study}}}, - shorttitle = {Cyber {{Physical System Framework}}}, - booktitle = {2020 {{Fourth International Conference}} on {{Inventive Systems}} and {{Control}} ({{ICISC}})}, - author = {Wankhade, Megha and Kottur, Suhasini Vijaykumar}, - date = {2020-01}, - pages = {716--719}, - doi = {10.1109/ICISC47916.2020.9171074}, - url = {https://ieeexplore.ieee.org/abstract/document/9171074?casa_token=ThzOr3xT16gAAAAA:NktWFIimmo9FAbCfwaYlLywtCc_wYOE0B2TuTlV-stWns1HSOxoQWqD5IlOFQ2FwK4jQ-MJbig}, - urldate = {2023-09-27}, - abstract = {The next generation of engineered systems is specified as the cyber-physical systems (CPS) with the incorporation of communiqué, computation, and controller to achieve the targets of constancy, routine, sturdiness, and competence in physical systems. Cyber-Physical systems are a feedback system that requires cybersecurity and improved design tools that enables design methodology. Cyber-Physical system becomes a significant track intended for the advance of the smart engineering business. The control trial of wide-ranging and organically disseminated cyber-physical systems is intended to be sturdy and consistent with very multifaceted disseminated in addition to the vital controller. The safety difficulties in addition protective measures the aforementioned aspects are progressively advancing the concentration of exploration in the arena. This paper presents a study of different application framework that is helpful to industry and academia in the direction of design a strong security framework to improve these systems.}, - eventtitle = {2020 {{Fourth International Conference}} on {{Inventive Systems}} and {{Control}} ({{ICISC}})}, - keywords = {survey}, - file = {/home/danesabo/Zotero/storage/QJ7J54V8/Wankhade and Kottur - 2020 - Cyber Physical System Framework An Apropos Study.pdf} -} - -@article{WaPo-water, - title = {The Cybersecurity Risk to Our Water Supply Is Real. {{We}} Need to Prepare}, - author = {Montgomery, Mark and Ravich, Samantha F.}, - year = {date accesssed 02/13/2022}, - journaltitle = {The Washington Post}, - url = {https://www.washingtonpost.com/opinions/2022/01/03/cybersecurity-risk-water-supply/} -} - @article{wardellMethodRevealingAddressing2016, title = {A {{Method}} for {{Revealing}} and {{Addressing Security Vulnerabilities}} in {{Cyber-physical Systems}} by {{Modeling Malicious Agent Interactions}} with {{Formal Verification}}}, author = {Wardell, Dean C. and Mills, Robert F. and Peterson, Gilbert L. and Oxley, Mark E.}, @@ -13586,22 +7899,6 @@ Subject\_term: Careers, Politics, Policy}, pages = {681--688} } -@article{wenFeedbackLinearizationControl2024, - title = {Feedback Linearization Control for Uncertain Nonlinear Systems via Generative Adversarial Networks}, - author = {Wen, Nuan and Liu, Zhenghua and Wang, Weihong and Wang, Shaoping}, - date = {2024-03-01}, - journaltitle = {ISA Transactions}, - shortjournal = {ISA Transactions}, - volume = {146}, - pages = {555--566}, - issn = {0019-0578}, - doi = {10.1016/j.isatra.2023.12.033}, - url = {https://www.sciencedirect.com/science/article/pii/S001905782300592X}, - urldate = {2024-10-30}, - abstract = {This article presents a novel approach to leverage generative adversarial networks(GANs) techniques to learn a feedback linearization controller(FLC) for a class of uncertain nonlinear systems. By estimating uncertainty through the adversarial process, where ground truth samples are exclusively obtained from a predefined integral model, the feedback linearization controller, learned through a minimax two-player optimization framework, enhances the reference tracking performance of the input-output uncertain nonlinear system. Furthermore, we provide theoretical guarantee of convergence and stability, demonstrating the safe recovery of robust FLC. We also address the common challenge of mode collapse in GANs training through the strict convexity of our synthesized generator structure and an enhanced adversarial loss. Comprehensive simulations and practical experiments are conducted to underscore the superiority and efficacy of our proposed approach.}, - keywords = {Convex optimization,Feedback linearization,Generative adversarial networks,Nonlinear systems} -} - @online{wengAutoencoderBetaVAE2018, title = {From {{Autoencoder}} to {{Beta-VAE}}}, author = {Weng, Lilian}, @@ -13613,24 +7910,20 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/JNA8P8DJ/2018-08-12-vae.html} } -@online{wengWhatAreDiffusion2021, - title = {What Are {{Diffusion Models}}?}, - author = {Weng, Lilian}, - date = {2021-07-11T00:00:00+00:00}, - url = {https://lilianweng.github.io/posts/2021-07-11-diffusion-models/}, - urldate = {2023-10-05}, - abstract = {[Updated on 2021-09-19: Highly recommend this blog post on score-based generative modeling by Yang Song (author of several key papers in the references)]. [Updated on 2022-08-27: Added classifier-free guidance, GLIDE, unCLIP and Imagen. [Updated on 2022-08-31: Added latent diffusion model. So far, I’ve written about three types of generative models, GAN, VAE, and Flow-based models. They have shown great success in generating high-quality samples, but each has some limitations of its own.}, - langid = {english}, - keywords = {diffusion models}, - file = {/home/danesabo/Zotero/storage/BWU7KMFA/2021-07-11-diffusion-models.html} -} - -@online{WhatModelBasedSystems, - title = {What Is {{Model-Based Systems Engineering}} ({{MBSE}})?}, - url = {https://www.ansys.com/blog/model-based-systems-engineering-explained}, - urldate = {2023-10-06}, - abstract = {See how organizations are using model-based solutions that enable them to manage complexity, collaborate and communicate, reduce costs, and get products to market more quickly.}, - langid = {american} +@inproceedings{weynsSurveyFormalMethods2012, + title = {A Survey of Formal Methods in Self-Adaptive Systems}, + booktitle = {Proceedings of the {{Fifth International C}}* {{Conference}} on {{Computer Science}} and {{Software Engineering}}}, + author = {Weyns, Danny and Iftikhar, M. Usman and family=Iglesia, given=Didac Gil, prefix=de la, useprefix=true and Ahmad, Tanvir}, + date = {2012-06-27}, + series = {{{C3S2E}} '12}, + pages = {67--79}, + publisher = {Association for Computing Machinery}, + location = {New York, NY, USA}, + doi = {10.1145/2347583.2347592}, + url = {https://doi.org/10.1145/2347583.2347592}, + urldate = {2025-03-31}, + abstract = {One major challenge in self-adaptive systems is to assure the required quality properties. Formal methods provide the means to rigorously specify and reason about the behaviors of self-adaptive systems, both at design time and runtime. To the best of our knowledge, no systematic study has been performed on the use of formal methods in self-adaptive systems. As a result, there is no clear view on what methods have been used to verify self-adaptive systems, and what support these methods offer to software developers. As such insight is important for researchers and engineers, we performed a systematic literature review covering 12 main software engineering venues and 4 journals, resulting in 75 papers used for data collection. The study shows that the attention for self-adaptive software systems is gradually increasing, but the number of studies that employ formal methods remains low. The main focus of formalization is on modeling and reasoning. Model checking and theorem proving have gained limited attention. The main concerns of interest in formalization of self-adaptation are efficiency/performance and reliability. Important adaptation concerns, such as security and scalability, are hardly considered. To verify the concerns of interest, a set of new properties are defined, such as interference freedom, responsiveness, mismatch, and loss-tolerance. A relevant part of the studies use formal methods at runtime, but the use is limited to modeling and analysis. Formal methods can be applied to other runtime activities of self-adaptation, and there is a need for light-weight tools to support runtime verification.}, + isbn = {978-1-4503-1084-0} } @article{wilsonBestPracticesScientific2014, @@ -13652,63 +7945,13 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/ASKUBTZP/Wilson et al. - 2014 - Best Practices for Scientific Computing.pdf} } -@article{wolfSafetySecurityCyberPhysical2018, - title = {Safety and {{Security}} in {{Cyber-Physical Systems}} and {{Internet-of-Things Systems}}}, - author = {Wolf, Marilyn and Serpanos, Dimitrios}, - date = {2018-01}, - journaltitle = {Proceedings of the IEEE}, - volume = {106}, - number = {1}, - pages = {9--20}, - issn = {1558-2256}, - doi = {10.1109/JPROC.2017.2781198}, - url = {https://ieeexplore.ieee.org/abstract/document/8232537?casa_token=twgboow2ylwAAAAA:f3ATPxSmH1AMq9hxerfDl0j3khT6t-mgIuG9acsuTRPpMwDlVfB-49fTxtTHMLA4xdE0D9o_Dw}, - urldate = {2023-09-27}, - abstract = {Safety and security have traditionally been distinct problems in engineering and computer science. The introduction of computing elements to create cyber-physical systems (CPSs) has opened up a vast new range of potential problems that do not always show up on the radar of traditional engineers. Security, in contrast, is traditionally viewed as a data or communications security problem to be handled by computer scientists and/or computer engineers. Advances in CPSs and the Internet-of-Things (IoT) requires us to take a unified view of safety and security. This paper defines a safety/security threat model for CPSs and IoT systems and surveys emerging techniques which improve the safety and security of CPSs and IoT systems.}, - eventtitle = {Proceedings of the {{IEEE}}}, - file = {/home/danesabo/Zotero/storage/J3P35MSE/8232537.html} -} - -@inproceedings{woodModelingAnalysisNeutron1991, - title = {Modeling and Analysis of Neutron Noise from an Ex-Core Detector at a Pressurized Water Reactor}, - author = {Wood, R. T. and Perez, R. B.}, - date = {1991}, - location = {United States}, - abstract = {Two applications of a noise diagnostic methodology were performed using ex-core neutron detector data from a pressurized water reactor (PWR). A feedback dynamics model of the neutron power spectral density (PSD) was derived from a low-order whole-plant physical model made stochastic using the Langevin technique. From a functional fit to plant data, the response of the dynamic system to changes in important physical parameters was evaluated by a direct sensitivity analysis. In addition, changes in monitored spectra were related to changes in physical parameters and detection thresholds using common surveillance discriminants were determined. A resonance model was developed from perturbation theory to give the ex-core neutron detector response for small in-core mechanical motions in terms of a pole-strength factor, a resonance asymmetry (or skewness) factor, a vibration damping factor, and a frequency of vibration. The mechanical motion parameters for several resonances were determined by a functional fit of the model to plant data taken at various times during a fuel cycle and were tracked to determine trends that indicated vibrational changes of reactor internals. In addition, the resonance model gave the ability to separate the resonant components of the PSD after the parameters had been identified. As a result, the behavior of several vibration peaks were monitored over a fuel cycle. 9 refs., 6 figs., 1 tab.} -} - -@article{wooldridgeLECTUREINTRODUCTIONFORMAL, +@article{wooldridgeLECTURE6INTRODUCTION, title = {{{LECTURE}} 6: {{INTRODUCTION TO FORMAL METHODS}}}, author = {Wooldridge, Mike}, journaltitle = {Software Engineering}, langid = {english} } -@article{wrightUsingCyberInformedEngineering, - title = {Using {{Cyber-Informed Engineering}} for {{Cyber Defense Workbook}}}, - author = {Wright, Virginia and Chanoski, Sam and Turner, Tony and Freeman, Sarah}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/7PUG5TB8/Wright et al. - Using Cyber-Informed Engineering for Cyber Defense.pdf} -} - -@article{wuBatteryDigitalTwins2020, - title = {Battery Digital Twins: {{Perspectives}} on the Fusion of Models, Data and Artificial Intelligence for Smart Battery Management Systems}, - shorttitle = {Battery Digital Twins}, - author = {Wu, Billy and Widanage, W. Dhammika and Yang, Shichun and Liu, Xinhua}, - date = {2020-08}, - journaltitle = {Energy and AI}, - shortjournal = {Energy and AI}, - volume = {1}, - pages = {100016}, - issn = {26665468}, - doi = {10.1016/j.egyai.2020.100016}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S2666546820300161}, - urldate = {2022-03-02}, - langid = {english}, - keywords = {DGC read}, - file = {/home/danesabo/Zotero/storage/IW5WNMK7/Wu20.pdf} -} - @article{wuDigitalTwinsMicrogrids2024, title = {Digital {{Twins}} for {{Microgrids}}: {{Opening}} a {{New Dimension}} in the {{Power System}}}, shorttitle = {Digital {{Twins}} for {{Microgrids}}}, @@ -13727,59 +7970,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/WX3U8WEL/Wu et al. - 2024 - Digital Twins for Microgrids Opening a New Dimens.pdf;/home/danesabo/Zotero/storage/MXY9KRLA/10398548.html} } -@article{xiaoHyperparameterSelectionGaussian2015, - title = {Hyperparameter {{Selection}} for {{Gaussian Process One-Class Classification}}}, - author = {Xiao, Yingchao and Wang, Huangang and Xu, Wenli}, - date = {2015-09}, - journaltitle = {IEEE Transactions on Neural Networks and Learning Systems}, - shortjournal = {IEEE Trans. Neural Netw. Learning Syst.}, - volume = {26}, - number = {9}, - pages = {2182--2187}, - issn = {2162-237X, 2162-2388}, - doi = {10.1109/TNNLS.2014.2363457}, - url = {https://ieeexplore.ieee.org/document/6940303}, - urldate = {2022-04-21}, - abstract = {Gaussian processes (GPs) provide predicted outputs with a full conditional statistical description, which can be used to establish confidence intervals and to set hyperparameters. This characteristic provides GPs with competitive or better performance in various applications. However, the specificity of one-class classification (OCC) makes GPs unable to select suitable hyperparameters in their traditional way. This brief proposes to select hyperparameters for GP OCC using the prediction difference between edge and interior positive training samples. Experiments on 2-D artificial and University of California benchmark data sets verify the effectiveness of this method.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/LSPTYCAG/Xiao et al. - 2015 - Hyperparameter Selection for Gaussian Process One-.pdf} -} - -@book{xuNuclearPowerPlants2017, - title = {Nuclear {{Power Plants}}: {{Innovative Technologies}} for {{Instrumentation}} and {{Control Systems}}: {{International Symposium}} on {{Software Reliability}}, {{Industrial Safety}}, {{Cyber Security}} and {{Physical Protection}} of {{Nuclear Power Plant}}}, - shorttitle = {Nuclear {{Power Plants}}}, - editor = {Xu, Yang}, - date = {2017}, - series = {Lecture {{Notes}} in {{Electrical Engineering}}}, - volume = {400}, - publisher = {Springer Singapore}, - location = {Singapore}, - doi = {10.1007/978-981-10-3361-2}, - url = {http://link.springer.com/10.1007/978-981-10-3361-2}, - urldate = {2022-09-30}, - isbn = {978-981-10-3360-5 978-981-10-3361-2}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/W5BZQUID/Xu - 2017 - Nuclear Power Plants Innovative Technologies for .pdf} -} - -@article{xuSurveyIndustrialInternet2018, - title = {A {{Survey}} on {{Industrial Internet}} of {{Things}}: {{A Cyber-Physical Systems Perspective}}}, - shorttitle = {A {{Survey}} on {{Industrial Internet}} of {{Things}}}, - author = {Xu, Hansong and Yu, Wei and Griffith, David and Golmie, Nada}, - date = {2018}, - journaltitle = {IEEE Access}, - shortjournal = {IEEE Access}, - volume = {6}, - pages = {78238--78259}, - issn = {2169-3536}, - doi = {10.1109/ACCESS.2018.2884906}, - url = {https://ieeexplore.ieee.org/document/8558534/}, - urldate = {2022-09-30}, - abstract = {The vision of Industry 4.0, otherwise known as the fourth industrial revolution, is the integration of massively deployed smart computing and network technologies in industrial production and manufacturing settings for the purposes of automation, reliability, and control, implicating the development of an Industrial Internet of Things (I-IoT). Specifically, I-IoT is devoted to adopting the IoT to enable the interconnection of anything, anywhere, and at any time in the manufacturing system context to improve the productivity, efficiency, safety, and intelligence. As an emerging technology, I-IoT has distinct properties and requirements that distinguish it from consumer IoT, including the unique types of smart devices incorporated, network technologies and quality-of-service requirements, and strict needs of command and control. To more clearly understand the complexities of I-IoT and its distinct needs and to present a unified assessment of the technology from a systems’ perspective, in this paper, we comprehensively survey the body of existing research on I-IoT. Particularly, we first present the I-IoT architecture, I-IoT applications (i.e., factory automation and process automation), and their characteristics. We then consider existing research efforts from the three key system aspects of control, networking, and computing. Regarding control, we first categorize industrial control systems and then present recent and relevant research efforts. Next, considering networking, we propose a three-dimensional framework to explore the existing research space and investigate the adoption of some representative networking technologies, including 5G, machine-tomachine communication, and software-defined networking. Similarly, concerning computing, we again propose a second three-dimensional framework that explores the problem space of computing in I-IoT and investigate the cloud, edge, and hybrid cloud and edge computing platforms. Finally, we outline particular challenges and future research needs in control, networking, and computing systems, as well as for the adoption of machine learning in an I-IoT context.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/NRWS9353/Xu et al. - 2018 - A Survey on Industrial Internet of Things A Cyber.pdf} -} - @article{yaacoubCyberphysicalSystemsSecurity2020, title = {Cyber-Physical Systems Security: {{Limitations}}, Issues and Future Trends}, shorttitle = {Cyber-Physical Systems Security}, @@ -13805,23 +7995,6 @@ Subject\_term: Careers, Politics, Policy}, eprinttype = {arXiv} } -@article{yangDiffusionModelsComprehensive2023, - title = {Diffusion {{Models}}: {{A Comprehensive Survey}} of {{Methods}} and {{Applications}}}, - shorttitle = {Diffusion {{Models}}}, - author = {Yang, Ling and Zhang, Zhilong and Song, Yang and Hong, Shenda and Xu, Runsheng and Zhao, Yue and Zhang, Wentao and Cui, Bin and Yang, Ming-Hsuan}, - date = {2023-11-09}, - journaltitle = {ACM Comput. Surv.}, - volume = {56}, - number = {4}, - pages = {105:1--105:39}, - issn = {0360-0300}, - doi = {10.1145/3626235}, - url = {https://doi.org/10.1145/3626235}, - urldate = {2024-10-01}, - abstract = {Diffusion models have emerged as a powerful new family of deep generative models with record-breaking performance in many applications, including image synthesis, video generation, and molecule design. In this survey, we provide an overview of the rapidly expanding body of work on diffusion models, categorizing the research into three key areas: efficient sampling, improved likelihood estimation, and handling data with special structures. We also discuss the potential for combining diffusion models with other generative models for enhanced results. We further review the wide-ranging applications of diffusion models in fields spanning from computer vision, natural language processing, temporal data modeling, to interdisciplinary applications in other scientific disciplines. This survey aims to provide a contextualized, in-depth look at the state of diffusion models, identifying the key areas of focus and pointing to potential areas for further exploration. Github:}, - file = {/home/danesabo/Zotero/storage/2U7R7BKF/Yang et al. - 2023 - Diffusion Models A Comprehensive Survey of Methods and Applications.pdf} -} - @article{yangDiffusionModelsComprehensive2024, title = {Diffusion {{Models}}: {{A Comprehensive Survey}} of {{Methods}} and {{Applications}}}, shorttitle = {Diffusion {{Models}}}, @@ -13859,21 +8032,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/I9TCGTGB/Yang and Qiu - 2005 - A measure of risk and a decision-making model base.pdf} } -@inproceedings{yangRuntimeIntegrityVerification2019, - title = {Runtime {{Integrity Verification}} in {{Cyber-physical Systems}} Using {{Side-Channel Fingerprint}}}, - booktitle = {2019 {{IEEE International Conference}} on {{Consumer Electronics}} ({{ICCE}})}, - author = {Yang, Shuo and Alaql, Abdulrahman and Hoque, Tamzidul and Bhunia, Swarup}, - date = {2019-01}, - pages = {1--6}, - issn = {2158-4001}, - doi = {10.1109/ICCE.2019.8662071}, - url = {https://ieeexplore.ieee.org/abstract/document/8662071?casa_token=fcNFHkRNawcAAAAA:vcY_JpTHsFPPEVXy60IB0ScqkGXHkAPpk6IAlr1u6MsgPEtBDgrUpuJv3LeLGYdgpw7Nd3qwsw}, - urldate = {2023-09-27}, - abstract = {The world is moving towards a connected ecosystem of cyber-physical components, which are increasingly deployed in diverse fields, from automobiles, to power grids, city infrastructure, manufacturing, and biomedical systems. Majority of these applications call for physical proximity of users to the system due to the nature of the service (e.g., health care). Both remote (through a network) and physical access to these systems have significantly broadened the attack surface of Cyber-Physical Systems (CPS) by providing increased flexibility to observe and alter the system maliciously. Many such systems are deployed in critical applications requiring a high level of operational integrity. Existing solutions for attack detection and prevention are often not adequate, specifically with respect to emerging vulnerabilities. In this paper, we focus on run-time monitoring of CPS with respect to attacks on hardware and software. In particular, we present the motivation for run-time monitoring and then propose methods for detection of physical attacks on hardware and activation of malicious programs in system software, both of which are severe threats to traditional and emerging applications of CPS. We propose a power-up and runtime hardware-software integrity monitoring of sensing and computing equipment in CPS through continuous observation of various side-channel parameters using a plug-and-play hardware module. We present a systematic framework that includes signature generation and comparison technique through device calibration, noise reduction, and workload analysis. Finally, we present a framework for monitoring two side-channel parameters (namely, power and electromagnetic radiation) to detect component replacement and malicious code execution.}, - eventtitle = {2019 {{IEEE International Conference}} on {{Consumer Electronics}} ({{ICCE}})}, - file = {/home/danesabo/Zotero/storage/EW34JFVV/Yang et al. - 2019 - Runtime Integrity Verification in Cyber-physical S.pdf} -} - @article{yaoModelBasedDeepTransfer2022, title = {Model-{{Based Deep Transfer Learning Method}} to {{Fault Detection}} and {{Diagnosis}} in {{Nuclear Power Plants}}}, author = {Yao, Yuantao and Ge, Daochuan and Yu, Jie and Xie, Min}, @@ -13891,85 +8049,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/92IWNIQD/Yao et al. - 2022 - Model-Based Deep Transfer Learning Method to Fault.pdf} } -@unpublished{yaoQualityUncertaintyQuantification2019, - title = {Quality of {{Uncertainty Quantification}} for {{Bayesian Neural Network Inference}}}, - author = {Yao, Jiayu and Pan, Weiwei and Ghosh, Soumya and Doshi-Velez, Finale}, - date = {2019-06-23}, - eprint = {1906.09686}, - eprinttype = {arXiv}, - eprintclass = {cs, stat}, - url = {http://arxiv.org/abs/1906.09686}, - urldate = {2022-05-05}, - abstract = {Bayesian Neural Networks (BNNs) place priors over the parameters in a neural network. Inference in BNNs, however, is difficult; all inference methods for BNNs are approximate. In this work, we empirically compare the quality of predictive uncertainty estimates for 10 common inference methods on both regression and classification tasks. Our experiments demonstrate that commonly used metrics (e.g. test log-likelihood) can be misleading. Our experiments also indicate that inference innovations designed to capture structure in the posterior do not necessarily produce high quality posterior approximations.}, - file = {/home/danesabo/Zotero/storage/3STLFSLA/Yao et al. - 2019 - Quality of Uncertainty Quantification for Bayesian.pdf;/home/danesabo/Zotero/storage/KKA3FIX8/1906.html} -} - -@article{yildizEfficiencyHydrogenProduction2006, - title = {Efficiency of Hydrogen Production Systems Using Alternative Nuclear Energy Technologies}, - author = {Yildiz, B and Kazimi, M}, - date = {2006-01}, - journaltitle = {International Journal of Hydrogen Energy}, - shortjournal = {International Journal of Hydrogen Energy}, - volume = {31}, - number = {1}, - pages = {77--92}, - issn = {03603199}, - doi = {10.1016/j.ijhydene.2005.02.009}, - url = {https://linkinghub.elsevier.com/retrieve/pii/S0360319905000583}, - urldate = {2022-03-30}, - abstract = {Nuclear energy can be used as the primary energy source in centralized hydrogen production through high-temperature thermochemical processes, water electrolysis, or high-temperature steam electrolysis. Energy efficiency is important in providing hydrogen economically and in a climate friendly manner. High operating temperatures are needed for more efficient thermochemical and electrochemical hydrogen production using nuclear energy. Therefore, high-temperature reactors, such as the gas-cooled, molten-salt-cooled and liquid-metal-cooled reactor technologies, are the candidates for use in hydrogen production. Several candidate technologies that span the range from well developed to conceptual are compared in our analysis. Among these alternatives, high-temperature steam electrolysis (HTSE) coupled to an advanced gas reactor cooled by supercritical CO2 (S-CO2) and equipped with a supercritical CO2 power conversion cycle has the potential to provide higher energy efficiency at a lower temperature range than the other alternatives.}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/DX6BWXJG/Yildiz and Kazimi - 2006 - Efficiency of hydrogen production systems using al.pdf} -} - -@online{yimSEDiffusionModel2023, - title = {{{SE}}(3) Diffusion Model with Application to Protein Backbone Generation}, - author = {Yim, Jason and Trippe, Brian L. and De Bortoli, Valentin and Mathieu, Emile and Doucet, Arnaud and Barzilay, Regina and Jaakkola, Tommi}, - date = {2023-05-22}, - eprint = {2302.02277}, - eprinttype = {arXiv}, - eprintclass = {cs, q-bio, stat}, - url = {http://arxiv.org/abs/2302.02277}, - urldate = {2023-10-05}, - abstract = {The design of novel protein structures remains a challenge in protein engineering for applications across biomedicine and chemistry. In this line of work, a diffusion model over rigid bodies in 3D (referred to as frames) has shown success in generating novel, functional protein backbones that have not been observed in nature. However, there exists no principled methodological framework for diffusion on SE(3), the space of orientation preserving rigid motions in R3, that operates on frames and confers the group invariance. We address these shortcomings by developing theoretical foundations of SE(3) invariant diffusion models on multiple frames followed by a novel framework, FrameDiff, for learning the SE(3) equivariant score over multiple frames. We apply FrameDiff on monomer backbone generation and find it can generate designable monomers up to 500 amino acids without relying on a pretrained protein structure prediction network that has been integral to previous methods. We find our samples are capable of generalizing beyond any known protein structure.}, - langid = {english}, - pubstate = {prepublished}, - file = {/home/danesabo/Zotero/storage/6AHQKEGA/Yim et al. - 2023 - SE(3) diffusion model with application to protein .pdf} -} - -@article{yinRecentAdvancesFormal2020, - title = {Recent Advances on Formal Methods for Safety and Security of Cyber-Physical Systems}, - author = {Yin, Xiang and Li, Shaoyuan}, - date = {2020-12-01}, - journaltitle = {Control Theory and Technology}, - shortjournal = {Control Theory Technol.}, - volume = {18}, - number = {4}, - pages = {459--461}, - issn = {2198-0942}, - doi = {10.1007/s11768-020-00008-w}, - url = {https://doi.org/10.1007/s11768-020-00008-w}, - urldate = {2022-06-20}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/6BVGTXCF/Yin and Li - 2020 - Recent advances on formal methods for safety and s.pdf} -} - -@article{youngRefinedInstrumentalVariable1980, - title = {Refined Instrumental Variable Methods of Recursive Time-Series Analysis {{Part III}}. {{Extensions}}}, - author = {Young, Peter and Jakeman, Anthony}, - date = {1980-04}, - journaltitle = {International Journal of Control}, - shortjournal = {International Journal of Control}, - volume = {31}, - number = {4}, - pages = {741--764}, - issn = {0020-7179, 1366-5820}, - doi = {10.1080/00207178008961080}, - url = {http://www.tandfonline.com/doi/abs/10.1080/00207178008961080}, - urldate = {2024-11-08}, - langid = {english} -} - @incollection{yuSTLmcRobustSTL2022, title = {{{STLmc}}: {{Robust STL Model Checking}} of {{Hybrid Systems Using SMT}}}, shorttitle = {{{STLmc}}}, @@ -14023,23 +8102,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/6EZU83L3/Zhang et al. - 2022 - Explainable Human-in-the-loop Dynamic Data-Driven .pdf} } -@article{zhangSurveyAttackDetection2021, - title = {A Survey on Attack Detection, Estimation and Control of Industrial Cyber–Physical Systems}, - author = {Zhang, Dan and Wang, Qing-Guo and Feng, Gang and Shi, Yang and Vasilakos, Athanasios V.}, - date = {2021-10-01}, - journaltitle = {ISA Transactions}, - shortjournal = {ISA Transactions}, - volume = {116}, - pages = {1--16}, - issn = {0019-0578}, - doi = {10.1016/j.isatra.2021.01.036}, - url = {https://www.sciencedirect.com/science/article/pii/S001905782100046X}, - urldate = {2023-09-27}, - abstract = {Cyber–physical systems (CPSs) are complex systems that involve technologies such as control, communication, and computing. Nowadays, CPSs have a wide range of applications in smart cities, smart grids, smart manufacturing and intelligent transportation. However, with integration of industrial control systems with modern communication technologies, CPSs would be inevitably exposed to increasing security threats, which could lead to severe degradation of the system performance and even destruction of CPSs. This paper presents a survey on recent advances on security issues of industrial cyber–physical systems (ICPSs). We specifically discuss two typical kinds of attacks, i.e., Denial-of-Service (DoS) attack and Deception attack, and present recent results in terms of attack detection, estimation, and control of ICPSs. Classifications of current studies are analyzed and summarized based on different system modeling and analysis methods. In addition, advantages and disadvantage of various methodologies are also discussed. Finally, the paper concludes with some potential future research directions on secure ICPSs.}, - keywords = {survey}, - file = {/home/danesabo/Zotero/storage/PWC8KKBH/Zhang et al. - 2021 - A survey on attack detection, estimation and contr.pdf} -} - @inproceedings{zhangUnderstandingUncertaintyCyberPhysical2016, title = {Understanding {{Uncertainty}} in {{Cyber-Physical Systems}}: {{A Conceptual Model}}}, shorttitle = {Understanding {{Uncertainty}} in {{Cyber-Physical Systems}}}, @@ -14057,36 +8119,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/J3FYJD5D/Zhang et al. - 2016 - Understanding Uncertainty in Cyber-Physical System.pdf} } -@inproceedings{zhaoByzantineFaultTolerance2008, - title = {Byzantine {{Fault Tolerance}} for {{Electric Power Grid Monitoring}} and {{Control}}}, - booktitle = {2008 {{International Conference}} on {{Embedded Software}} and {{Systems}}}, - author = {Zhao, Wenbing and Villaseca, F. Eugenio}, - date = {2008-07}, - pages = {129--135}, - doi = {10.1109/ICESS.2008.13}, - abstract = {The stability of the electric power grid is crucial to every nation's security and well-being. As revealed by a number of large-scale blackout incidents in North America, the data communication infrastructure for power grid is in urgent need of transformation to modern technology. It has been shown by extensive research work that such blackout could have been avoided if there were more prompt information sharing and coordination among the power grid monitoring and control systems. In this paper, we point out the need for Byzantine fault tolerance and investigate the feasibility of applying Byzantine fault tolerance technology to ensure high degree of reliability and security of power grid monitoring and control. Our empirical study demonstrated that Byzantine fault tolerant monitoring and control can easily sustain the 60 Hz sampling rate needed for supervisory control and data acquisition (SCADA) operations with sub-millisecond response time under the local-area network environment. Byzantine fault tolerant monitoring and control is also feasible under the wide-area network environment for power grid applications that demand sub-second reaction time.}, - eventtitle = {2008 {{International Conference}} on {{Embedded Software}} and {{Systems}}}, - file = {/home/danesabo/Zotero/storage/P8VBL56H/Zhao and Villaseca - 2008 - Byzantine Fault Tolerance for Electric Power Grid .pdf;/home/danesabo/Zotero/storage/MU9XALCI/4595548.html} -} - -@article{zhaoDataDrivenAttackDetection2023, - title = {Data-{{Driven Attack Detection}} and {{Identification}} for {{Cyber-Physical Systems Under Sparse Sensor Attacks}}}, - author = {Zhao, Zhengen and Xu, Yunsong and Li, Yuzhe and Zhen, Ziyang and Yang, Ying and Shi, Yang}, - date = {2023-10}, - journaltitle = {IEEE Transactions on Automatic Control}, - volume = {68}, - number = {10}, - pages = {6330--6337}, - issn = {1558-2523}, - doi = {10.1109/TAC.2022.3230360}, - url = {https://ieeexplore.ieee.org/abstract/document/9992077?casa_token=QLOzqroOodIAAAAA:yAha4LvQYD_84AqAdVCAcT1QBP3lqtACiaTZMfu2oxg_mn21MrclVfnbGVFeD8cmd6NRWXQprA}, - urldate = {2023-09-27}, - abstract = {This article studies the issues of data-driven attack detection and identification for cyber-physical systems under sparse sensor attacks. First, based on the available input and output datasets, a data-driven monitor is formulated with the following two objectives: attack detection and attack identification. Then, with the subspace approach, a data-driven attack detection policy is presented, wherein the attack detector is designed directly by the process data. A subspace projection-based attack identification scheme is proposed via designing a bank of projection filters to determine the locations of attacked sensors. Moreover, the sparse recovery technique is adopted to decrease the combinatorial complexity of the subspace projection-based identification method. The attack identification is recast into a block-sparse recovery problem. Finally, the proposed methods are verified by the simulations on a flight vehicle system.}, - eventtitle = {{{IEEE Transactions}} on {{Automatic Control}}}, - keywords = {detection}, - file = {/home/danesabo/Zotero/storage/5MH4FDV2/Zhao et al. - 2023 - Data-Driven Attack Detection and Identification fo.pdf;/home/danesabo/Zotero/storage/7HWD9NET/9992077.html} -} - @article{zhaoNeuralLyapunovControl2021, title = {Neural {{Lyapunov Control}} for {{Power System Transient Stability}}: {{A Deep Learning-Based Approach}}}, shorttitle = {Neural {{Lyapunov Control}} for {{Power System Transient Stability}}}, @@ -14106,24 +8138,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/7RV26D7X/Zhao et al. - 2021 - Neural Lyapunov Control for Power System Transient.pdf} } -@article{zhaoRobustVoltageControl2020, - title = {Robust {{Voltage Control Considering Uncertainties}} of {{Renewable Energies}} and {{Loads}} via {{Improved Generative Adversarial Network}}}, - author = {Zhao, Qianyu and Liao, Wenlong and Wang, Shouxiang and Pillai, Jayakrishnan Radhakrishna}, - date = {2020-11}, - journaltitle = {Journal of Modern Power Systems and Clean Energy}, - volume = {8}, - number = {6}, - pages = {1104--1114}, - issn = {2196-5420}, - doi = {10.35833/MPCE.2020.000210}, - url = {https://ieeexplore.ieee.org/abstract/document/9275598}, - urldate = {2024-10-30}, - abstract = {The fluctuation of output power of renewable energies and loads brings challenges to the scheduling and operation of the distribution network. In this paper, a robust voltage control model is proposed to cope with the uncertainties of renewable energies and loads based on an improved generative adversarial network (IGAN). Firstly, both real and predicted data are used to train the IGAN consisting of a discriminator and a generator. The noises sampled from the Gaussian distribution are fed to the generator to generate a large number of scenarios that are utilized for robust voltage control after scenario reduction. Then, a new improved wolf pack algorithm (IWPA) is presented to solve the formulated robust voltage control model, since the accuracy of the solutions obtained by traditional methods is limited. The simulation results show that the IGAN can accurately capture the probability distribution characteristics and dynamic nonlinear characteristics of renewable energies and loads, which makes the scenarios generated by IGAN more suitable for robust voltage control than those generated by traditional methods. Furthermore, IWPA has a better performance than traditional methods in terms of convergence speed, accuracy, and stability for robust voltage control.}, - eventtitle = {Journal of {{Modern Power Systems}} and {{Clean Energy}}}, - keywords = {Distribution networks,Gallium nitride,generative adversarial network,Generative adversarial networks,Load modeling,Power system stability,Robust voltage control,uncertainty,Uncertainty,Voltage control,wolf pack algorithm}, - file = {/home/danesabo/Zotero/storage/2MACG5H9/Zhao et al. - 2020 - Robust Voltage Control Considering Uncertainties of Renewable Energies and Loads via Improved Genera.pdf} -} - @article{zhaoStabilityL2gainControl2008, title = {On Stability, {{L2-gain}} and {{H}}∞ Control for Switched Systems}, author = {Zhao, Jun and Hill, David J.}, @@ -14176,28 +8190,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/RNUKHQWX/Zhong et al. - 2023 - Analysis of Energy Laboratory Safety Management in.pdf} } -@article{zhouDigitalTwinFramework2019, - title = {Digital {{Twin Framework}} and {{Its Application}} to {{Power Grid Online Analysis}}}, - author = {Zhou, Mike and Yan, Jianfeng and Feng, Donghao}, - date = {2019-09}, - journaltitle = {Csee Journal of Power and Energy Systems}, - shortjournal = {CSEE J. Power Energy Syst.}, - volume = {5}, - number = {3}, - pages = {391--398}, - publisher = {China Electric Power Research Inst}, - location = {Beijing}, - issn = {2096-0042}, - doi = {10.17775/CSEEJPES.2018.01460}, - url = {http://www.webofscience.com/wos/woscc/summary/marked/relevance/1?markedListId=List%202}, - urldate = {2022-03-08}, - abstract = {Digital twin (DT) framework is introduced in the context of application for power grid online analysis. In the development process of a new power grid real-time online analysis system, an online analysis digital twin (OADT) has been implemented to realize the new online analysis architecture. The OADT approach is presented and its prominent features are discussed. The presentation, discussion, and performance testing are based on a large-scale grid network model (40K+ buses), exported directly from the EMS system of an actual power grid. A plan to apply the OADT approach to digitize power grid dispatching rules is also outlined.}, - langid = {english}, - keywords = {DGC read}, - annotation = {WOS:000511344100012}, - file = {/home/danesabo/Zotero/storage/JNYP42KB/Zhou et al. - 2019 - Digital Twin Framework and Its Application to Powe.pdf} -} - @inproceedings{zhouNeuralLyapunovControl2022, title = {Neural {{Lyapunov Control}} of {{Unknown Nonlinear Systems}} with {{Stability Guarantees}}}, author = {Zhou, Ruikun and Quartz, Thanin and Sterck, Hans De and Liu, Jun}, @@ -14210,54 +8202,6 @@ Subject\_term: Careers, Politics, Policy}, file = {/home/danesabo/Zotero/storage/2U4E5YQH/Zhou et al. - 2022 - Neural Lyapunov Control of Unknown Nonlinear Syste.pdf} } -@article{zhouSimultaneousIdentificationNominal1994, - title = {Simultaneous Identification of Nominal Model, Parametric Uncertainty and Unstructured Uncertainty for Robust Control}, - author = {Zhou, Tong and Kimura, Hidenori}, - date = {1994-03-01}, - journaltitle = {Automatica}, - shortjournal = {Automatica}, - volume = {30}, - number = {3}, - pages = {391--402}, - issn = {0005-1098}, - doi = {10.1016/0005-1098(94)90117-1}, - url = {https://www.sciencedirect.com/science/article/pii/0005109894901171}, - urldate = {2024-10-15}, - abstract = {The problem attacked in this paper is to obtain the smallest model set which is described by nominal model, parametric uncertainty bound, unstructured uncertainty bound and consistent with a number of noise-free input-output data, under the condition that the denominator of the nominal model is prescribed. For the compatibility with the available robust control theory, the unstructured uncertainty is measured by H∞-norm, while the parametric uncertainty is by parameter variation interval. It is shown that the unstructured uncertainty bound will generally increase if the nominal model error uncertainty is completely regarded as unstructured. Moreover, the identification problem is reduced to a convex optimization problem which is computationally tractable.}, - keywords = {Data matching,identification for robust control,nominal model,parametric uncertainty bound,unstructured uncertainty bound}, - file = {/home/danesabo/Zotero/storage/LQP8SU73/Zhou and Kimura - 1994 - Simultaneous identification of nominal model, parametric uncertainty and unstructured uncertainty fo.pdf;/home/danesabo/Zotero/storage/G83Q8RYC/0005109894901171.html} -} - -@inproceedings{zhouUNetNestedUNet2018, - title = {{{UNet}}++: {{A Nested U-Net Architecture}} for {{Medical Image Segmentation}}}, - shorttitle = {{{UNet}}++}, - booktitle = {Deep {{Learning}} in {{Medical Image Analysis}} and {{Multimodal Learning}} for {{Clinical Decision Support}}}, - author = {Zhou, Zongwei and Rahman Siddiquee, Md Mahfuzur and Tajbakhsh, Nima and Liang, Jianming}, - editor = {Stoyanov, Danail and Taylor, Zeike and Carneiro, Gustavo and Syeda-Mahmood, Tanveer and Martel, Anne and Maier-Hein, Lena and Tavares, João Manuel R.S. and Bradley, Andrew and Papa, João Paulo and Belagiannis, Vasileios and Nascimento, Jacinto C. and Lu, Zhi and Conjeti, Sailesh and Moradi, Mehdi and Greenspan, Hayit and Madabhushi, Anant}, - date = {2018}, - pages = {3--11}, - publisher = {Springer International Publishing}, - location = {Cham}, - doi = {10.1007/978-3-030-00889-5_1}, - abstract = {In this paper, we present UNet++, a new, more powerful architecture for medical image segmentation. Our architecture is essentially a deeply-supervised encoder-decoder network where the encoder and decoder sub-networks are connected through a series of nested, dense skip pathways. The re-designed skip pathways aim at reducing the semantic gap between the feature maps of the encoder and decoder sub-networks. We argue that the optimizer would deal with an easier learning task when the feature maps from the decoder and encoder networks are semantically similar. We have evaluated UNet++ in comparison with U-Net and wide U-Net architectures across multiple medical image segmentation tasks: nodule segmentation in the low-dose CT scans of chest, nuclei segmentation in the microscopy images, liver segmentation in abdominal CT scans, and polyp segmentation in colonoscopy videos. Our experiments demonstrate that UNet++ with deep supervision achieves an average IoU gain of 3.9 and 3.4 points over U-Net and wide U-Net, respectively.}, - isbn = {978-3-030-00889-5}, - langid = {english}, - file = {/home/danesabo/Zotero/storage/6I8URLWJ/Zhou et al. - 2018 - UNet++ A Nested U-Net Architecture for Medical Image Segmentation.pdf} -} - -@inproceedings{zimmermanMakingFormalMethods2000, - title = {Making Formal Methods Practical}, - booktitle = {19th {{DASC}}. 19th {{Digital Avionics Systems Conference}}. {{Proceedings}} ({{Cat}}. {{No}}.{{00CH37126}})}, - author = {Zimmerman, M. and Rodriguez, M. and Ingram, B. and Katahira, M. and family=Villepin, given=M., prefix=de, useprefix=true and Leveson, N.}, - date = {2000-10}, - volume = {1}, - pages = {1B2/1-1B2/8 vol.1}, - doi = {10.1109/DASC.2000.886879}, - abstract = {Despite their potential, formal methods have had difficulty gaining acceptance in the industrial sector. Some complaints are based on supposed impracticality: many consider formal methods to be an approach to system specification and analysis that requires a large learning time. Contributing to this scepticism is the fact that some types of formal methods have not yet been proven to handle systems of realistic complexity. To learn more about how to design formal specification languages that can be used for complex systems and require minimal training, we developed a formal specification of an English language specification of the vertical flight control system similar to that found in the MD-11. This paper describes the lessons learned from this experience.}, - eventtitle = {19th {{DASC}}. 19th {{Digital Avionics Systems Conference}}. {{Proceedings}} ({{Cat}}. {{No}}.{{00CH37126}})}, - file = {/home/danesabo/Zotero/storage/5T7HGMAV/Zimmerman et al. - 2000 - Making formal methods practical.pdf;/home/danesabo/Zotero/storage/GGM7YZT2/886879.html} -} - @article{zonouzDetectingIndustrialControl2014, title = {Detecting {{Industrial Control Malware Using Automated PLC Code Analytics}}}, author = {Zonouz, Saman and Rrushi, Julian and McLaughlin, Stephen}, @@ -14274,49 +8218,3 @@ Subject\_term: Careers, Politics, Policy}, langid = {english}, file = {/home/danesabo/Zotero/storage/P2TJC2AF/Zonouz et al. - 2014 - Detecting Industrial Control Malware Using Automat.pdf} } - -@report{zotero-5227, - type = {report} -} - -@online{zotero-5656, - url = {http://library.lol/main/E11CE7F0EBA40EFB3D1C2D7F91B7C726}, - urldate = {2024-11-24}, - file = {/home/danesabo/Zotero/storage/XUWQA77V/E11CE7F0EBA40EFB3D1C2D7F91B7C726.html} -} - -@online{zotero-5657, - url = {http://library.lol/main/E11CE7F0EBA40EFB3D1C2D7F91B7C726}, - urldate = {2024-11-24}, - file = {/home/danesabo/Zotero/storage/JGFKEDDM/E11CE7F0EBA40EFB3D1C2D7F91B7C726.html} -} - -@book{zotero-5689, - type = {book} -} - -@online{ZoteroConnectors, - title = {Zotero | {{Connectors}}}, - url = {https://www.zotero.org/download/connectors}, - urldate = {2024-07-02}, - file = {/home/danesabo/Zotero/storage/362GHEWB/connectors.html} -} - -@online{ZoteroConnectorsa, - title = {Zotero | {{Connectors}}}, - url = {https://www.zotero.org/download/connectors}, - urldate = {2024-07-02} -} - -@online{ZoteroConnectorsb, - title = {Zotero | {{Connectors}}}, - url = {https://www.zotero.org/download/connectors}, - urldate = {2024-07-02} -} - -@online{ZoteroConnectorsc, - title = {Zotero | {{Connectors}}}, - url = {https://www.zotero.org/download/connectors}, - urldate = {2024-07-02}, - file = {/home/danesabo/Zotero/storage/3V37THQF/connectors.html} -}