The core of the demonstration of this paper is to interpret the forward propagation process of machine learning as a parameter estimation problem of nonlinear dynamical systems. This process is to establish a connection between the Recurrent Neural Network and the discrete differential equation, so as to construct a new network structure: ODE-RU. At the same time, under the inspiration of the theory of ordinary differential equations, we propose a new forward propagation mode. In a large number of simulations and experiments, the forward propagation not only shows the trainability of the new architecture, but also achieves a low training error on the basis of main-taining the stability of the network. For the problem requiring long-term memory, we specifically study the obstacle shape reconstruction problem using the backscattering far-field features data set, and demonstrate the effectiveness of the proposed architecture using the data set. The results show that the network can effectively reduce the sensitivity to small changes in the input feature. And the error generated by the ordinary differential equation cyclic unit network in inverting the shape and position of obstacles is less than $ 10^{-2} $.
","accessed":{"date-parts":[["2024",1,30]]},"author":[{"family":"Meng","given":"Pinchao"},{"family":"Wang","given":"Xinyu"},{"family":"Yin","given":"Weishi"}],"citation-key":"mengODERUDynamicalSystem2022","container-title":"Electronic Research Archive","container-title-short":"era","DOI":"10.3934/era.2022014","ISSN":"2688-1594","issue":"1","issued":{"date-parts":[["2022"]]},"page":"257-271","source":"DOI.org (Crossref)","title":"ODE-RU: a dynamical system view on recurrent neural networks","title-short":"ODE-RU","type":"article-journal","URL":"http://www.aimspress.com/article/doi/10.3934/era.2022014","volume":"30"},{"id":"mercaldoRealTimeSCADAAttack2019","abstract":"SCADA control systems use programmable logic controller to interface with critical machines. SCADA systems are used in critical infrastructures, for instance, to control smart grid, oil pipelines, water distribution and chemical manufacturing plants: an attacker taking control of a SCADA system could cause various damages, both to the infrastructure but also to people (for instance, adding chemical substances into a water distribution systems). In this paper we propose a method to detect attacks targeting SCADA systems. We exploit model checking, in detail we model logs from SCADA systems into a network of timed automata and, through timed temporal logic, we characterize the behaviour of a SCADA system under attack. Experiments performed on a SCADA water distribution system confirmed the effectiveness of the proposed method.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Mercaldo","given":"Francesco"},{"family":"Martinelli","given":"Fabio"},{"family":"Santone","given":"Antonella"}],"citation-key":"mercaldoRealTimeSCADAAttack2019","container-title":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","DOI":"10.1109/WETICE.2019.00057","event-place":"Napoli, Italy","event-title":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","ISBN":"978-1-72810-676-2","issued":{"date-parts":[["2019",6]]},"language":"en","page":"231-236","publisher":"IEEE","publisher-place":"Napoli, Italy","source":"DOI.org (Crossref)","title":"Real-Time SCADA Attack Detection by Means of Formal Methods","type":"paper-conference","URL":"https://ieeexplore.ieee.org/document/8795430/"},{"id":"mercerSynthesizingVerifiedComponents2023","abstract":"Safety-critical systems such as avionics need to be engineered to be cyber resilient meaning that systems are able to detect and recover from attacks or safely shutdown. As there are few development tools for cyber resiliency, designers rely on guidelines and checklists, sometimes missing vulnerabilities until late in the process where remediation is expensive. Our solution is a model-based approach with cyber resilience-improving transforms that insert high-assurance components such as filters to block malicious data or monitors to detect and alarm anomalous behavior. Novel is our use of model checking and a verified compiler to specify, verify, and synthesize these components. We define code contracts as formal specifications that designers write for high-assurance components, and test contracts as tests to validate their behavior. A model checker proves whether or not code contracts satisfy test contracts in an iterative development cycle. The same model checker also proves whether or not a system with the inserted components, assuming they adhere to their code contracts, provides the desired cyber resiliency for the system. We define an algorithm to synthesize implementations for code contracts in a semantics-preserving way that is backed by a verified compiler. The entire workflow is implemented as part of the open source BriefCASE toolkit. We report on our experience using BriefCASE with a case study on a UAV system that is transformed to be cyber resilient to communication and supply chain cyber attacks. Our case study demonstrates that writing code contracts and then synthesizing correct implementations from them are feasible in real-world systems engineering for cyber resilience.","accessed":{"date-parts":[["2023",12,13]]},"author":[{"family":"Mercer","given":"Eric"},{"family":"Slind","given":"Konrad"},{"family":"Amundson","given":"Isaac"},{"family":"Cofer","given":"Darren"},{"family":"Babar","given":"Junaid"},{"family":"Hardin","given":"David"}],"citation-key":"mercerSynthesizingVerifiedComponents2023","container-title":"SOFTWARE AND SYSTEMS MODELING","container-title-short":"Softw. Syst. Model.","DOI":"10.1007/s10270-023-01096-3","event-place":"Heidelberg","ISSN":"1619-1366, 1619-1374","issue":"5","issued":{"date-parts":[["2023",10]]},"language":"English","note":"Web of Science ID: WOS:000953658900001","number-of-pages":"21","page":"1451-1471","publisher":"Springer Heidelberg","publisher-place":"Heidelberg","source":"Clarivate Analytics Web of Science","title":"Synthesizing verified components for cyber assured systems engineering","type":"article-journal","URL":"https://www.webofscience.com/api/gateway?GWVersion=2&SrcAuth=DynamicDOIArticle&SrcApp=UA&KeyAID=10.1007%2Fs10270-023-01096-3&DestApp=DOI&SrcAppSID=USW2EC0EC1PuWMCSXOYkyOwTcd6Fm&SrcJTitle=SOFTWARE+AND+SYSTEMS+MODELING&DestDOIRegistrantName=Springer-Verlag","volume":"22"},{"id":"meskeDesigningImplementingDigital2021","abstract":"Digital twins, which replicate physical assets, are perceived as enablers of digital transformation. But implementations of digital twins are still rare, and there is little advice on how to successfully develop them. We describe how a Norwegian power grid company and its technology partners designed and implemented a digital twin of its grid network, and show that a digital twin's unique characteristics are a crucial source of organizational learning that require innovative co-creation efforts and effective data governance. We also provide recommendations for designing and implementing digital twins.(1, 2)","accessed":{"date-parts":[["2022",3,8]]},"author":[{"family":"Meske","given":"Christian"},{"family":"Osmundsen","given":"Karen S."},{"family":"Junglas","given":"Iris"}],"citation-key":"meskeDesigningImplementingDigital2021","container-title":"Mis Quarterly Executive","container-title-short":"MIS Q. Exec.","DOI":"10.17705/2msqe.00048","event-place":"Bloomington","ISSN":"1540-1960","issue":"3","issued":{"date-parts":[["2021",9]]},"language":"English","note":"WOS:000694715100003","page":"183-198","publisher":"Indiana Univ, Oper & Decision Technol Dept","publisher-place":"Bloomington","source":"Web of Science Nextgen","title":"Designing and Implementing Digital Twins in the Energy Grid Sector","type":"article-journal","URL":"http://www.webofscience.com/wos/woscc/summary/marked/relevance/1?markedListId=List%202","volume":"20"},{"id":"MethodQuantifyingProgram","accessed":{"date-parts":[["2024",1,30]]},"citation-key":"MethodQuantifyingProgram","title":"A Method of Quantifying Program and Course Performances against ABET Criteria - Knovel","type":"webpage","URL":"https://app-knovel-com.pitt.idm.oclc.org/web/view/khtml/show.v/rcid:kpANTECPS4/cid:kt003RZTC2/viewerType:khtml//root_slug:antec-2005-plastics-annual/url_slug:method-quantifying-program?b-q=designing%20and%20teaching%20courses%20to%20satisfy%20the%20abet%20engineering%20criteria&include_synonyms=no&s_page_no=0&sort_on=default&view=collapsed&zoom=1&page=1&q=designing%20and%20teaching%20courses%20to%20satisfy%20the%20abet%20engineering%20criteria"},{"id":"micaliCompactCertificatesCollective2020","abstract":"We introduce compact certificate schemes, which allow any party to take\na large number of signatures on a message M, by many signers of different\nweights, and compress them to a much shorter certificate. This certificate\nconvinces the verifiers that signers with sufficient total weight signed\nM, even though the verifier will not see---let alone verify---all of the\nsignatures. Thus, for example, a compact certificate can be used to prove\nthat parties who jointly have a sufficient total account balance have\nattested to a given block in a blockchain.\n\nAfter defining compact certificates, we demonstrate an efficient compact\ncertificate scheme. We then show how to implement such a scheme in\na decentralized setting over an unreliable network and in the presence\nof adversarial parties who wish to disrupt certificate creation. Our\nevaluation shows that compact certificates are 50-280× smaller\nand 300-4000× cheaper to verify than a natural baseline approach.","accessed":{"date-parts":[["2024",4,1]]},"archive":"Cryptology ePrint Archive","author":[{"family":"Micali","given":"Silvio"},{"family":"Reyzin","given":"Leonid"},{"family":"Vlachos","given":"Georgios"},{"family":"Wahby","given":"Riad S."},{"family":"Zeldovich","given":"Nickolai"}],"citation-key":"micaliCompactCertificatesCollective2020","issued":{"date-parts":[["2020"]]},"note":"Publication info: Published elsewhere. IEEE S&P 2021","number":"2020/1568","source":"Cryptology ePrint Archive (eprint.iacr.org)","title":"Compact Certificates of Collective Knowledge","type":"article","URL":"https://eprint.iacr.org/2020/1568"},{"id":"micchelliLearningVectorValuedFunctions2005","abstract":"In this letter, we provide a study of learning in a Hilbert space of vector-valued functions. We motivate the need for extending learning theory of scalar-valued functions by practical considerations and establish some basic results for learning vector-valued functions that should prove useful in applications. Specifically, we allow an output space Y to be a Hilbert space, and we consider a reproducing kernel Hilbert space of functions whose values lie in Y. In this setting, we derive the form of the minimal norm interpolant to a finite set of data and apply it to study some regularization functionals that are important in learning theory. We consider specific examples of such functionals corresponding to multiple-output regularization networks and support vector machines, for both regression and classification. Finally, we provide classes of operator-valued kernels of the dot product and translation-invariant type.","accessed":{"date-parts":[["2022",4,20]]},"author":[{"family":"Micchelli","given":"Charles A."},{"family":"Pontil","given":"Massimiliano"}],"citation-key":"micchelliLearningVectorValuedFunctions2005","container-title":"Neural Computation","container-title-short":"Neural Computation","DOI":"10.1162/0899766052530802","ISSN":"0899-7667, 1530-888X","issue":"1","issued":{"date-parts":[["2005",1,1]]},"language":"en","page":"177-204","source":"DOI.org (Crossref)","title":"On Learning Vector-Valued Functions","type":"article-journal","URL":"https://direct.mit.edu/neco/article/17/1/177-204/6909","volume":"17"},{"id":"michaelFormalMethodsCyberphysical2021","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Michael","given":"James Bret"},{"family":"Drusinsky","given":"Doron"},{"family":"Wijesekera","given":"Duminda"}],"citation-key":"michaelFormalMethodsCyberphysical2021","container-title":"Computer","container-title-short":"Computer","DOI":"10.1109/MC.2021.3089267","ISSN":"0018-9162, 1558-0814","issue":"9","issued":{"date-parts":[["2021",9]]},"language":"en","page":"25-29","source":"DOI.org (Crossref)","title":"Formal Methods in Cyberphysical Systems","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/9524651/","volume":"54"},{"id":"michelStabilityDynamicalSystems2008","author":[{"family":"Michel","given":"Anthony N."},{"family":"Hou","given":"Ling"},{"family":"Liu","given":"Derong"}],"citation-key":"michelStabilityDynamicalSystems2008","collection-title":"Systems & control: foundations & applications","event-place":"Boston Basel Berlin","ISBN":"978-0-8176-4486-4","issued":{"date-parts":[["2008"]]},"language":"eng","number-of-pages":"501","publisher":"Birkhäuser","publisher-place":"Boston Basel Berlin","source":"K10plus ISBN","title":"Stability of dynamical systems: continuous, discontinuous, and discrete systems","title-short":"Stability of dynamical systems","type":"book"},{"id":"mihalicHardwareintheLoopSimulationsHistorical2022","abstract":"The design of modern industrial products is further improved through the hardware-in-the-loop (HIL) simulation. Realistic simulation is enabled by the closed loop between the hardware under test (HUT) and real-time simulation. Such a system involves a field programmable gate array (FPGA) and digital signal processor (DSP). An HIL model can bypass serious damage to the real object, reduce debugging cost, and, finally, reduce the comprehensive effort during the testing. This paper provides a historical overview of HIL simulations through different engineering challenges, i.e., within automotive, power electronics systems, and different industrial drives. Various platforms, such as National Instruments, dSPACE, Typhoon HIL, or MATLAB Simulink Real-Time toolboxes and Speedgoat hardware systems, offer a powerful tool for efficient and successful investigations in different fields. Therefore, HIL simulation practice must begin already during the university’s education process to prepare the students for professional engagements in the industry, which was also verified experimentally at the end of the paper.","accessed":{"date-parts":[["2024",8,8]]},"author":[{"family":"Mihalič","given":"Franc"},{"family":"Truntič","given":"Mitja"},{"family":"Hren","given":"Alenka"}],"citation-key":"mihalicHardwareintheLoopSimulationsHistorical2022","container-title":"Electronics","DOI":"10.3390/electronics11152462","ISSN":"2079-9292","issue":"15","issued":{"date-parts":[["2022",1]]},"language":"en","license":"http://creativecommons.org/licenses/by/3.0/","number":"15","page":"2462","publisher":"Multidisciplinary Digital Publishing Institute","source":"www.mdpi.com","title":"Hardware-in-the-Loop Simulations: A Historical Overview of Engineering Challenges","title-short":"Hardware-in-the-Loop Simulations","type":"article-journal","URL":"https://www.mdpi.com/2079-9292/11/15/2462","volume":"11"},{"id":"millerDistributedTrustedWeb2020","abstract":"Most computer checked proofs are tied to the particular technology of a prover’s software. While sharing results between proof assistants is a recognized and desirable goal, the current organization of theorem proving tools makes such sharing an exception instead of the rule. In this talk, I argue that we need to turn the current architecture of proof assistants and formal proofs inside-out. That is, instead of having a few mature theorem provers include within them their formally checked theorems and proofs, I propose that proof assistants should sit on the edge of a web of formal proofs and that proof assistant should be exporting their proofs so that they can exist independently of any theorem prover. While it is necessary to maintain the dependencies between definitions, theories, and theorems, no explicit library structure should be imposed on this web of formal proofs. Thus a theorem and its proofs should not necessarily be located at a particular URL or within a particular prover’s library. While the world of symbolic logic and proof theory certainly allows for proofs to be seen as global and permanent objects, there is a lot of research and engineering work that is needed to make this possible. I describe some of the required research and development that must be done to achieve this goal.","author":[{"family":"Miller","given":"Dale"}],"citation-key":"millerDistributedTrustedWeb2020","container-title":"Distributed Computing and Internet Technology","DOI":"10.1007/978-3-030-36987-3_2","editor":[{"family":"Hung","given":"Dang Van"},{"family":"D´Souza","given":"Meenakshi"}],"event-place":"Cham","ISBN":"978-3-030-36987-3","issued":{"date-parts":[["2020"]]},"language":"en","page":"21-40","publisher":"Springer International Publishing","publisher-place":"Cham","source":"Springer Link","title":"A Distributed and Trusted Web of Formal Proofs","type":"paper-conference"},{"id":"millerExplanationArtificialIntelligence2019","author":[{"family":"Miller","given":"Tim"}],"citation-key":"millerExplanationArtificialIntelligence2019","container-title":"Artificial intelligence","ISBN":"0004-3702","issued":{"date-parts":[["2019"]]},"page":"1-38","publisher":"Elsevier","title":"Explanation in artificial intelligence: Insights from the social sciences","type":"article-journal","volume":"267"},{"id":"miPredictionMaintenanceIntegrated2021","abstract":"Predictive maintenance is one of the important technical means to guarantee and improve the normal industrial production. The existing bottlenecks for popularization and application are analyzed. In order to solve these problems, a cooperative awareness and interconnection framework across multiple organizations for total factors that affect prediction maintenance decision-making is discussed. Initially, the structure and operation mecha nism of this framework are proposed. It is designed to support the sharing of data, knowledge and resources. As a key supporting technology, the digital twin is also integrated into it to improve the accuracy of fault diagnosis and prediction and support making a maintenance plan with higher accuracy and reliability. Then, under this framework, an integrated mathematical programming model is established with considering the parameter uncertainty and an NSGA-II hybrid algorithm is utilized to solve it. Moreover, an adjustment strategy for a maintenance plan is discussed in response to the dynamic characteristics of the actual maintenance environment. Finally, a case, prediction maintenance decision-making for bearings in grinding rolls of the large vertical mill, is studied. Analysis results verify the advantage of the integrated solving mechanism based on the proposed framework. The framework and integrated decision-making approach can guide the implementation of predic tive maintenance with higher accuracy and reliability for industrial enterprises.","accessed":{"date-parts":[["2022",3,2]]},"author":[{"family":"Mi","given":"Shanghua"},{"family":"Feng","given":"Yixiong"},{"family":"Zheng","given":"Hao"},{"family":"Wang","given":"Yong"},{"family":"Gao","given":"Yicong"},{"family":"Tan","given":"Jianrong"}],"citation-key":"miPredictionMaintenanceIntegrated2021","container-title":"Journal of Manufacturing Systems","container-title-short":"Journal of Manufacturing Systems","DOI":"10.1016/j.jmsy.2020.08.001","ISSN":"02786125","issued":{"date-parts":[["2021",1]]},"language":"en","page":"329-345","source":"DOI.org (Crossref)","title":"Prediction maintenance integrated decision-making approach supported by digital twin-driven cooperative awareness and interconnection framework","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S0278612520301345","volume":"58"},{"id":"MissionAccomplishedIntroduction","accessed":{"date-parts":[["2022",6,20]]},"citation-key":"MissionAccomplishedIntroduction","title":"Mission Accomplished: An Introduction to Formal Methods in Mobile Robot Motion Planning and Control | Unmanned Systems","type":"webpage","URL":"https://www.worldscientific.com/doi/abs/10.1142/S2301385014300029"},{"id":"mitcbmmDiffusionScoreBasedGenerative2023","abstract":"Yang Song, Stanford University\n\nGenerating data with complex patterns, such as images, audio, and molecular structures, requires fitting very flexible statistical models to the data distribution. Even in the age of deep neural networks, building such models is difficult because they typically require an intractable normalization procedure to represent a probability distribution. To address this challenge, we consider modeling the vector field of gradients of the data distribution (known as the score function), which does not require normalization and therefore can take full advantage of the flexibility of deep neural networks. I will show how to (1) estimate the score function from data with flexible deep neural networks and efficient statistical methods, (2) generate new data using stochastic differential equations and Markov chain Monte Carlo, and even (3) evaluate probability values accurately as in a traditional statistical model. The resulting method, called score-based generative modeling or diffusion modeling, achieves record performance in applications including image synthesis, text-to-speech generation, time series prediction, and point cloud generation, challenging the long-time dominance of generative adversarial networks (GANs) on many of these tasks. Furthermore, score-based generative models are particularly suitable for Bayesian reasoning tasks such as solving ill-posed inverse problems, yielding superior performance on several tasks in medical image reconstruction.","accessed":{"date-parts":[["2023",10,10]]},"citation-key":"mitcbmmDiffusionScoreBasedGenerative2023","dimensions":"1:32:00","director":[{"literal":"MITCBMM"}],"issued":{"date-parts":[["2023",1,17]]},"source":"YouTube","title":"Diffusion and Score-Based Generative Models","type":"motion_picture","URL":"https://www.youtube.com/watch?v=wMmqCMwuM2Q"},{"id":"mitchellFlexibleExtensibleEfficient2008","abstract":"Level set methods are a popular and powerful class of numerical algorithms for dynamic implicit surfaces and solution of Hamilton-Jacobi PDEs. While the advanced level set schemes combine both efficiency and accuracy, their implementation complexity makes it difficult for the community to reproduce new results and make quantitative comparisons between methods. This paper describes the Toolbox of Level Set Methods, a collection of Matlab routines implementing the basic level set algorithms on fixed Cartesian grids for rectangular domains in arbitrary dimension. The Toolbox’s code and interface are designed to permit flexible combinations of different schemes and PDE forms, allow easy extension through the addition of new algorithms, and achieve efficient execution despite the fact that the code is entirely written as m-files. The current contents of the Toolbox and some coding patterns important to achieving its flexibility, extensibility and efficiency are briefly explained, as is the process of adding two new algorithms. Code for both the Toolbox and the new algorithms is available from the Web.","accessed":{"date-parts":[["2023",10,12]]},"author":[{"family":"Mitchell","given":"Ian M."}],"citation-key":"mitchellFlexibleExtensibleEfficient2008","container-title":"Journal of Scientific Computing","container-title-short":"J Sci Comput","DOI":"10.1007/s10915-007-9174-4","ISSN":"1573-7691","issue":"2","issued":{"date-parts":[["2008",6,1]]},"language":"en","page":"300-329","source":"Springer Link","title":"The Flexible, Extensible and Efficient Toolbox of Level Set Methods","type":"article-journal","URL":"https://doi.org/10.1007/s10915-007-9174-4","volume":"35"},{"id":"mitchellOverapproximatingReachableSets2003","author":[{"family":"Mitchell","given":"Ian M"},{"family":"Tomlin","given":"Claire J"}],"citation-key":"mitchellOverapproximatingReachableSets2003","container-title":"Journal of Scientific Computing","issue":"1--3","issued":{"date-parts":[["2003"]]},"language":"en","source":"Zotero","title":"Overapproximating Reachable Sets by Hamilton-Jacobi Projections","type":"article-journal","volume":"19"},{"id":"mitchellTimedependentHamiltonJacobiFormulation2005","abstract":"We describe and implement an algorithm for computing the set of reachable states of a continuous dynamic game. The algorithm is based on a proof that the reachable set is the zero sublevel set of the viscosity solution of a particular time-dependent Hamilton–Jacobi–Isaacs partial differential equation. While alternative techniques for computing the reachable set have been proposed, the differential game formulation allows treatment of nonlinear systems with inputs and uncertain parameters. Because the time-dependent equation’s solution is continuous and defined throughout the state space, methods from the level set literature can be used to generate more accurate approximations than are possible for formulations with potentially discontinuous solutions. A numerical implementation of our formulation is described and has been released on the web. Its correctness is verified through a two vehicle, three dimensional collision avoidance example for which an analytic solution is available.","accessed":{"date-parts":[["2023",10,27]]},"author":[{"family":"Mitchell","given":"I.M."},{"family":"Bayen","given":"A.M."},{"family":"Tomlin","given":"C.J."}],"citation-key":"mitchellTimedependentHamiltonJacobiFormulation2005","container-title":"IEEE Transactions on Automatic Control","container-title-short":"IEEE Trans. Automat. Contr.","DOI":"10.1109/TAC.2005.851439","ISSN":"0018-9286","issue":"7","issued":{"date-parts":[["2005",7]]},"language":"en","page":"947-957","source":"DOI.org (Crossref)","title":"A time-dependent Hamilton-Jacobi formulation of reachable sets for continuous dynamic games","type":"article-journal","URL":"http://ieeexplore.ieee.org/document/1463302/","volume":"50"},{"id":"mitchellToolboxHamiltonJacobiSolvers2005","author":[{"family":"Mitchell","given":"Ian M."},{"family":"Templeton","given":"Jeremy A."}],"citation-key":"mitchellToolboxHamiltonJacobiSolvers2005","container-title":"A Toolbox of Hamilton-Jacobi Solvers for Analysis of Nondeterministic Continuous and Hybrid Systems\",","ISBN":"978-3-540-31954-2","issued":{"date-parts":[["2005"]]},"page":"480--494","publisher":"Springer Berlin Heidelberg","title":"A Toolbox of Hamilton-Jacobi Solvers for Analysis of Nondeterministic Continuous and Hybrid Systems","type":"paper-conference"},{"id":"mitchellToolboxLevelSet2005","author":[{"family":"Mitchell","given":"Ian"}],"citation-key":"mitchellToolboxLevelSet2005","issued":{"date-parts":[["2005"]]},"language":"en","source":"Zotero","title":"A Toolbox of Level Set Methods","type":"article-journal"},{"id":"mitraFormalizedTheoryVerifying2008","abstract":"Correctness of many hybrid and distributed systems require stability and convergence guarantees. Unlike the standard induction principle for verifying invariance, a theory for verifying stability or convergence of automata is currently not available. In this paper, we formalize one such theory proposed by Tsitsiklis [27]. We build on the existing PVS metatheory for untimed, timed, and hybrid input/output automata, and incorporate the concepts about fairness, stability, Lyapunov-like functions, and convergence. The resulting theory provides two sets of sufficient conditions, which when instantiated and verified for particular automata, guarantee convergence and stability, respectively.","author":[{"family":"Mitra","given":"Sayan"},{"family":"Chandy","given":"K. Mani"}],"citation-key":"mitraFormalizedTheoryVerifying2008","container-title":"Theorem Proving in Higher Order Logics","DOI":"10.1007/978-3-540-71067-7_20","editor":[{"family":"Mohamed","given":"Otmane Ait"},{"family":"Muñoz","given":"César"},{"family":"Tahar","given":"Sofiène"}],"event-place":"Berlin, Heidelberg","ISBN":"978-3-540-71067-7","issued":{"date-parts":[["2008"]]},"language":"en","page":"230-245","publisher":"Springer","publisher-place":"Berlin, Heidelberg","source":"Springer Link","title":"A Formalized Theory for Verifying Stability and Convergence of Automata in PVS","type":"paper-conference"},{"id":"MizarHomePage","accessed":{"date-parts":[["2024",3,20]]},"citation-key":"MizarHomePage","title":"Mizar Home Page","type":"webpage","URL":"http://mizar.org/"},{"id":"ModelBasedSystemsEngineering","abstract":"All models are wrong, but some are useful. —George E. P. Box Model-Based Systems Engineering MBSE is the application of modeling systems as a cost-effective way to explore and document system characteristics. By testing and validating system characteristics early, models facilitate timely learning of properties and behaviors, enabling fast feedback on requirements and design decisions. Models provide an efficient way to explore, update, and communicate system aspects to stakeholders while significantly reducing or eliminating dependence on traditional documents. MBSERead more","accessed":{"date-parts":[["2023",10,6]]},"citation-key":"ModelBasedSystemsEngineering","container-title":"Scaled Agile Framework","language":"en-US","title":"Model-Based Systems Engineering","type":"post-weblog","URL":"https://scaledagileframework.com/model-based-systems-engineering/"},{"id":"ModelBasedSystemsEngineeringa","abstract":"Manage system complexity, improve communication, and produce optimized systems with Model-Based System Engineering.","accessed":{"date-parts":[["2023",10,6]]},"citation-key":"ModelBasedSystemsEngineeringa","language":"en","title":"Model-Based Systems Engineering (MBSE)","type":"webpage","URL":"https://www.mathworks.com/solutions/model-based-systems-engineering.html"},{"id":"ModelFreePlantTuning","accessed":{"date-parts":[["2024",7,10]]},"citation-key":"ModelFreePlantTuning","title":"Model-Free Plant Tuning | IEEE Journals & Magazine | IEEE Xplore","type":"webpage","URL":"https://ieeexplore.ieee.org/abstract/document/7586127"},{"id":"mohanS3ASecureSystem2013","abstract":"The recently discovered 'W32.Stuxnet' worm has drastically changed the perception that systems managing critical infrastructure are invulnerable to software security attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic real-time) execution behavior to detect an intrusion within 0.6 μs while still guaranteeing the safety of the plant. We also show that even if an attacker is successful (or gains access to the operating system's administrative privileges), the overall state of the physical system still remains safe.","accessed":{"date-parts":[["2023",9,27]]},"author":[{"family":"Mohan","given":"Sibin"},{"family":"Bak","given":"Stanley"},{"family":"Betti","given":"Emiliano"},{"family":"Yun","given":"Heechul"},{"family":"Sha","given":"Lui"},{"family":"Caccamo","given":"Marco"}],"citation-key":"mohanS3ASecureSystem2013","collection-title":"HiCoNS '13","container-title":"Proceedings of the 2nd ACM international conference on High confidence networked systems","DOI":"10.1145/2461446.2461456","event-place":"New York, NY, USA","ISBN":"978-1-4503-1961-4","issued":{"date-parts":[["2013",4,9]]},"page":"65–74","publisher":"Association for Computing Machinery","publisher-place":"New York, NY, USA","source":"ACM Digital Library","title":"S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systems","title-short":"S3A","type":"paper-conference","URL":"https://dl.acm.org/doi/10.1145/2461446.2461456"},{"id":"molnarInterpretableMachineLearning","author":[{"family":"Molnar","given":"Christoph"}],"citation-key":"molnarInterpretableMachineLearning","language":"en","source":"Zotero","title":"Interpretable Machine Learning","type":"article-journal"},{"id":"montalvoFirstEvidencePivotal2016","abstract":"The Division of Subatomic Physics and Plasma Physics (formerly Division of Nuclear Engineering) in Chalmers, Göteborg, and the Ringhals Nuclear Plant have investigated the core barrel vibrations in the Ringhals PWRs over the last 20 years. Based on the different symmetry properties of the vibration modes, a mode separation technique was developed to enhance the contributions from the different modes. Recent observations of wear at both the lower and upper core-barrel-support structures in the Ringhals PWRs indicated that vibration modes of the core barrel other than pendular (beam mode) and shell mode are likely to occur. A beam mode type movement alone is not able to explain such a wear, and therefore, it is fair to assume that the vibration mode in question is a small amplitude periodic tilting movement of the core barrel around a horizontal, diagonal pivot at the half height of the core. In this work, ex-core data taken in the Ringhals-4 PWR were analyzed in order to find evidence of such a tilting movement. First, cross spectra between various ex-core detectors were calculated and analyzed to locate the frequency range of the new vibrational mode. Then, a model based on symmetry considerations was derived in order to extract the sought mode from the spectra. The measurements were evaluated by the new mode enhancement technique. The results show that it is possible to enhance such a mode and find it in the spectra by properly combining the signals in the time domain.","author":[{"family":"Montalvo","given":"C."},{"family":"Pazsit","given":"Imre"},{"family":"Nylén","given":"H."},{"family":"Dykin","given":"Victor"}],"citation-key":"montalvoFirstEvidencePivotal2016","ISSN":"1510825738","issued":{"date-parts":[["2016"]]},"page":"2571","title":"First evidence of the pivotal motion (\"tilting mode\") of the core Barrel in the RINGHALS-4 PWR","type":"article-journal"},{"id":"montalvomartinSurveillanceDiagnosticsBeam2012","abstract":"Surveillance of core barrel vibrations has been performed in the Swedish Ringhals PWRs for several years. This surveillance is focused mainly on the pendular motion of the core barrel, which is known as the beam mode. The monitoring of the beam mode has suggested that its amplitude increases along the cycle and decreases after refuelling. In the last 5 years several measurements have been taken in order to understand this behaviour. Besides, a non-linear fitting procedure has been implemented in order to better distinguish the different components of vibration. By using this fitting procedure, two modes of vibration have been identified in the frequency range of the beam mode. Several results coming from the trend analysis performed during these years indicate that one of the modes is due to the core barrel motion itself and the other is due to the individual flow induced vibrations of the fuel elements. In this work, the latest results of this monitoring are presented.","author":[{"family":"Montalvo Martín","given":"Cristina"},{"family":"Pázsit","given":"Imre"},{"family":"Nylén","given":"Henrik"}],"citation-key":"montalvomartinSurveillanceDiagnosticsBeam2012","issued":{"date-parts":[["2012"]]},"publisher":"E.T.S.I. Minas (UPM)","title":"Surveillance and diagnostics of the beam mode vibrations of the ringhals pwrs","type":"paper-conference"},{"id":"Montreat360App2022","abstract":"Montreat 360° is an app for Montreat College students that helps track experiential learning - real-life experience - through campus involvement.","accessed":{"date-parts":[["2023",11,7]]},"citation-key":"Montreat360App2022","issued":{"date-parts":[["2022",9,29]]},"language":"en-US","title":"Montreat 360° | App for Students at Montreat College","type":"webpage","URL":"https://www.montreat.edu/student-life/montreat-360/"},{"id":"moratoOptimalInspectionMaintenance2022","abstract":"Civil and maritime engineering systems, among others, from bridges to offshore platforms and wind turbines, must be efficiently managed as they are exposed to deterioration mechanisms throughout their operational life, such as fatigue or corrosion. Identifying optimal inspection and maintenance policies demands the solution of a complex sequential decision-making problem under uncertainty, with the main objective of efficiently controlling the risk associated with structural failures. Addressing this complexity, risk-based inspection planning methodologies, supported often by dynamic Bayesian networks, evaluate a set of pre-defined heuristic decision rules to reasonably simplify the decision problem. However, the resulting policies may be compromised by the limited space considered in the definition of the decision rules. Avoiding this limitation, Partially Observable Markov Decision Processes (POMDPs) provide a principled mathematical methodology for stochastic optimal control under uncertain action outcomes and observations, in which the optimal actions are prescribed as a function of the entire, dynamically updated, state probability distribution. In this paper, we combine dynamic Bayesian networks with POMDPs in a joint framework for optimal inspection and maintenance planning, and we provide the relevant formulation for developing both infinite and finite horizon POMDPs in a structural reliability context. The proposed methodology is implemented and tested for the case of a structural component subject to fatigue deterioration, demonstrating the capability of state-of-the-art point-based POMDP solvers for solving the underlying planning optimization problem. Within the numerical experiments, POMDP and heuristic-based policies are thoroughly compared, and results showcase that POMDPs achieve substantially lower costs as compared to their counterparts, even for traditional problem settings.","accessed":{"date-parts":[["2022",2,11]]},"author":[{"family":"Morato","given":"P. G."},{"family":"Papakonstantinou","given":"K. G."},{"family":"Andriotis","given":"C. P."},{"family":"Nielsen","given":"J. S."},{"family":"Rigo","given":"P."}],"citation-key":"moratoOptimalInspectionMaintenance2022","container-title":"Structural Safety","container-title-short":"Structural Safety","DOI":"10.1016/j.strusafe.2021.102140","ISSN":"01674730","issued":{"date-parts":[["2022",1]]},"language":"en","page":"102140","source":"arXiv.org","title":"Optimal Inspection and Maintenance Planning for Deteriorating Structural Components through Dynamic Bayesian Networks and Markov Decision Processes","type":"article-journal","URL":"http://arxiv.org/abs/2009.04547","volume":"94"},{"id":"morrisTOPOLOGYTEARS","author":[{"family":"Morris","given":"Sidney A"}],"citation-key":"morrisTOPOLOGYTEARS","language":"en","source":"Zotero","title":"TOPOLOGY WITHOUT TEARS","type":"article-journal"},{"id":"mouraLeanTheoremProver2021","abstract":"Lean 4 is a reimplementation of the Lean interactive theorem prover (ITP) in Lean itself. It addresses many shortcomings of the previous versions and contains many new features. Lean 4 is fully extensible: users can modify and extend the parser, elaborator, tactics, decision procedures, pretty printer, and code generator. The new system has a hygienic macro system custom-built for ITPs. It contains a new typeclass resolution procedure based on tabled resolution, addressing significant performance problems reported by the growing user base. Lean 4 is also an efficient functional programming language based on a novel programming paradigm called functional but in-place. Efficient code generation is crucial for Lean users because many write custom proof automation procedures in Lean itself.","accessed":{"date-parts":[["2024",3,28]]},"author":[{"family":"Moura","given":"Leonardo De"},{"family":"Ullrich","given":"Sebastian"}],"citation-key":"mouraLeanTheoremProver2021","container-title":"Automated Deduction – CADE 28","DOI":"10.1007/978-3-030-79876-5_37","editor":[{"family":"Platzer","given":"André"},{"family":"Sutcliffe","given":"Geoff"}],"event-place":"Cham","ISBN":"978-3-030-79875-8 978-3-030-79876-5","issued":{"date-parts":[["2021"]]},"language":"en","page":"625-635","publisher":"Springer International Publishing","publisher-place":"Cham","source":"DOI.org (Crossref)","title":"The Lean 4 Theorem Prover and Programming Language","type":"chapter","URL":"https://link.springer.com/10.1007/978-3-030-79876-5_37","volume":"12699"},{"id":"moyaDigitalTwinsThat2020","abstract":"Digital twins can be defined as digital representations of physical entities that employ real-time data to enable understanding of the operating conditions of these entities. Here we present a particular type of digital twin that involves a combination of computer vision, scientific machine learning, and augmented reality. This novel digital twin is able, therefore, to see, to interpret what it sees—and, if necessary, to correct the model it is equipped with—and presents the resulting information in the form of augmented reality. The computer vision capabilities allow the twin to receive data continuously. As any other digital twin, it is equipped with one or more models so as to assimilate data. However, if persistent deviations from the predicted values are found, the proposed methodology is able to correct on the fly the existing models, so as to accommodate them to the measured reality. Finally, the suggested methodology is completed with augmented reality capabilities so as to render a completely new type of digital twin. These concepts are tested against a proof-of-concept model consisting on a nonlinear, hyperelastic beam subjected to moving loads whose exact position is to be determined.","accessed":{"date-parts":[["2022",3,2]]},"author":[{"family":"Moya","given":"Beatriz"},{"family":"Badías","given":"Alberto"},{"family":"Alfaro","given":"Icíar"},{"family":"Chinesta","given":"Francisco"},{"family":"Cueto","given":"Elías"}],"citation-key":"moyaDigitalTwinsThat2020","container-title":"International Journal for Numerical Methods in Engineering","container-title-short":"Int J Numer Methods Eng","DOI":"10.1002/nme.6535","ISSN":"0029-5981, 1097-0207","issued":{"date-parts":[["2020",9,24]]},"language":"en","page":"nme.6535","source":"DOI.org (Crossref)","title":"Digital twins that learn and correct themselves","type":"article-journal","URL":"https://onlinelibrary.wiley.com/doi/10.1002/nme.6535"},{"id":"MultipleIndependentLevels2022","abstract":"Multiple Independent Levels of Security/Safety (MILS) is a high-assurance security architecture based on the concepts of separation and controlled information flow. It is implemented by separation mechanisms that support both untrusted and trustworthy components; ensuring that the total security solution is non-bypassable, evaluatable, always invoked, and tamperproof.","accessed":{"date-parts":[["2023",10,3]]},"citation-key":"MultipleIndependentLevels2022","container-title":"Wikipedia","issued":{"date-parts":[["2022",11,10]]},"language":"en","license":"Creative Commons Attribution-ShareAlike License","note":"Page Version ID: 1121130466","source":"Wikipedia","title":"Multiple Independent Levels of Security","type":"entry-encyclopedia","URL":"https://en.wikipedia.org/w/index.php?title=Multiple_Independent_Levels_of_Security&oldid=1121130466"},{"id":"murakamiRecursiveRealizationFinite1977","abstract":"Recursive filter design techniques are described and developed for finite impulse filters using finite field arithmetic. The finite fields considered have the formGF(q^2), the Galois field ofq^2elements, and are analogous to the field of complex numbers whenqis a prime such that(-1)is not a quadratic residue. These filters can be designed to yield either a desired finite impulse or finite frequency response function. This filtering technique has other possible applications, including the encoding or decoding of information and signal design. Infinite signal trains can be decomposed naturally into orthogonal sequences which may be useful in the encoding and decoding process and may provide another approach to convolutional coding. Since the recursive filters developed here do not have the accumulation of round-off or truncation error that one might expect in recursive computations, such filters are noise-free transducers in the sense of Shannon.","accessed":{"date-parts":[["2024",2,8]]},"author":[{"family":"Murakami","given":"H."},{"family":"Reed","given":"I."}],"citation-key":"murakamiRecursiveRealizationFinite1977","container-title":"IEEE Transactions on Information Theory","DOI":"10.1109/TIT.1977.1055697","ISSN":"1557-9654","issue":"2","issued":{"date-parts":[["1977",3]]},"page":"232-242","source":"IEEE Xplore","title":"Recursive realization of finite impulse filters using finite field arithmetic","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/1055697?casa_token=WxaCaYsb6t0AAAAA:sIXU77P4LJE4QYM_kf0nh2-nMmhNE1hRY63bzbXShn4DLd3XMuXZDv3t-wUU7VU3bV9rrEsVAQ","volume":"23"},{"id":"murataStateEquationControllability1977","abstract":"Petri nets are a versatile modeling device for studying the structure and control of concurrent systems. Petri nets and related graph models have been used for modeling a wide variety of systems from computers to social systems. In order to introduce this interesting modeling device to the researcher in control theory, this paper discusses Petri nets in the context of the state equation for a linear discrete-time system. The controllability concept of dynamic systems is applied to Petri nets for the first time. It is also shown that the controllability and reachability of a Petri net are related to maximal matchings of its bipartite graph.","accessed":{"date-parts":[["2024",2,15]]},"author":[{"family":"Murata","given":"T."}],"citation-key":"murataStateEquationControllability1977","container-title":"IEEE Transactions on Automatic Control","DOI":"10.1109/TAC.1977.1101509","ISSN":"1558-2523","issue":"3","issued":{"date-parts":[["1977",6]]},"page":"412-416","source":"IEEE Xplore","title":"State equation, controllability, and maximal matchings of petri nets","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/1101509?casa_token=6Kx_Rj-ypzoAAAAA:FZk0V_DlefIBBBex-k6BgT11teKCHnusMDOVUOQCcYM_ABsm9Zn7DyDnzTwyo9X_TN-5QFJwAg","volume":"22"},{"id":"murdochDefinitionsMethodsApplications2019","abstract":"Significance\n The recent surge in interpretability research has led to confusion on numerous fronts. In particular, it is unclear what it means to be interpretable and how to select, evaluate, or even discuss methods for producing interpretations of machine-learning models. We aim to clarify these concerns by defining interpretable machine learning and constructing a unifying framework for existing methods which highlights the underappreciated role played by human audiences. Within this framework, methods are organized into 2 classes: model based and post hoc. To provide guidance in selecting and evaluating interpretation methods, we introduce 3 desiderata: predictive accuracy, descriptive accuracy, and relevancy. Using our framework, we review existing work, grounded in real-world studies which exemplify our desiderata, and suggest directions for future work.\n , \n Machine-learning models have demonstrated great success in learning complex patterns that enable them to make predictions about unobserved data. In addition to using models for prediction, the ability to interpret what a model has learned is receiving an increasing amount of attention. However, this increased focus has led to considerable confusion about the notion of interpretability. In particular, it is unclear how the wide array of proposed interpretation methods are related and what common concepts can be used to evaluate them. We aim to address these concerns by defining interpretability in the context of machine learning and introducing the predictive, descriptive, relevant (PDR) framework for discussing interpretations. The PDR framework provides 3 overarching desiderata for evaluation: predictive accuracy, descriptive accuracy, and relevancy, with relevancy judged relative to a human audience. Moreover, to help manage the deluge of interpretation methods, we introduce a categorization of existing techniques into model-based and post hoc categories, with subgroups including sparsity, modularity, and simulatability. To demonstrate how practitioners can use the PDR framework to evaluate and understand interpretations, we provide numerous real-world examples. These examples highlight the often underappreciated role played by human audiences in discussions of interpretability. Finally, based on our framework, we discuss limitations of existing methods and directions for future work. We hope that this work will provide a common vocabulary that will make it easier for both practitioners and researchers to discuss and choose from the full range of interpretation methods.","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Murdoch","given":"W. James"},{"family":"Singh","given":"Chandan"},{"family":"Kumbier","given":"Karl"},{"family":"Abbasi-Asl","given":"Reza"},{"family":"Yu","given":"Bin"}],"citation-key":"murdochDefinitionsMethodsApplications2019","container-title":"Proceedings of the National Academy of Sciences","container-title-short":"Proc. Natl. Acad. Sci. U.S.A.","DOI":"10.1073/pnas.1900654116","ISSN":"0027-8424, 1091-6490","issue":"44","issued":{"date-parts":[["2019",10,29]]},"language":"en","page":"22071-22080","source":"DOI.org (Crossref)","title":"Definitions, methods, and applications in interpretable machine learning","type":"article-journal","URL":"https://pnas.org/doi/full/10.1073/pnas.1900654116","volume":"116"},{"id":"MysteriousNewRansomware","accessed":{"date-parts":[["2022",4,2]]},"citation-key":"MysteriousNewRansomware","title":"Mysterious New Ransomware Targets Industrial Control Systems | WIRED","type":"webpage","URL":"https://www.wired.com/story/ekans-ransomware-industrial-control-systems/"},{"id":"narayananDeterringAttacksPower2020","abstract":"The U.S. Department of Defense (DoD) increasingly relies on electric power to accomplish critical missions. This report explores two approaches for deterring attacks against the U.S. power grid in a world of increasing cyber aggression: deterrence by denial and deterrence by cost imposition. It is a first step in developing frameworks and context to support DoD decisionmaking in this area.","accessed":{"date-parts":[["2022",3,22]]},"author":[{"family":"Narayanan","given":"Anu"},{"family":"Welburn","given":"Jonathan W."},{"family":"Miller","given":"Benjamin M."},{"family":"Li","given":"Sheng Tao"},{"family":"Clark-Ginsberg","given":"Aaron"}],"citation-key":"narayananDeterringAttacksPower2020","issued":{"date-parts":[["2020",1,6]]},"language":"en","publisher":"RAND Corporation","source":"www.rand.org","title":"Deterring Attacks Against the Power Grid: Two Approaches for the U.S. Department of Defense","title-short":"Deterring Attacks Against the Power Grid","type":"report","URL":"https://www.rand.org/pubs/research_reports/RR3187.html"},{"id":"nardoneFormalSecurityAssessment2016","abstract":"Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed, unroutable networks, making them an easy target for cybercriminals. In this regard, Modbus is a widely adopted protocol in control systems. Modbus protocol, however, lacks for security properties and is vulnerable to plenty of attacks (as spoofing, flooding, or replay, to name a few). In this paper, we propose a formal modeling of Modbus protocol using an extension of hierarchical state-machines that is automatically transformed to a Promela model. This model allows us to find counterexamples of security properties by model-checking. In particular, the original contribution of this paper is the formal demonstration of the existence of man-inthe-middle attacks in Modbus-based systems. Our approach also allows to formally evaluate security properties in future extensions of Modbus protocols.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Nardone","given":"Roberto"},{"family":"Rodriguez","given":"Ricardo J."},{"family":"Marrone","given":"Stefano"}],"citation-key":"nardoneFormalSecurityAssessment2016","container-title":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","DOI":"10.1109/ICITST.2016.7856685","event-place":"Barcelona, Spain","event-title":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","ISBN":"978-1-908320-73-5","issued":{"date-parts":[["2016",12]]},"language":"en","page":"142-147","publisher":"IEEE","publisher-place":"Barcelona, Spain","source":"DOI.org (Crossref)","title":"Formal security assessment of Modbus protocol","type":"paper-conference","URL":"http://ieeexplore.ieee.org/document/7856685/"},{"id":"natbib","abstract":"The natbib package is a reimplementation of the LATEX \\cite command, to work with both author–year and numerical citations. It is compatible with the standard bibliographic style files, such as plain.bst, as well as with those for harvard, apalike, chicago, astron, authordate, and of course natbib.","author":[{"family":"Daly","given":"Patrick W"}],"citation-key":"natbib","language":"en","page":"26","source":"Zotero","title":"natbib","type":"article-journal"},{"id":"NationalCentersAcademic","accessed":{"date-parts":[["2023",11,7]]},"citation-key":"NationalCentersAcademic","title":"National Centers of Academic Excellence","type":"webpage","URL":"https://www.nsa.gov/Academics/Centers-of-Academic-Excellence/"},{"id":"NationalCyberInformedEngineering2022","citation-key":"NationalCyberInformedEngineering2022","issued":{"date-parts":[["2022",6]]},"title":"National Cyber-Informed Engineering Strategy","type":"document","URL":"https://inl.gov/content/uploads/2023/07/FINAL-DOE-National-CIE-Strategy-June-2022_0.pdf"},{"id":"NationalCyberSecurity2023","citation-key":"NationalCyberSecurity2023","issued":{"date-parts":[["2023",3]]},"title":"National Cyber Security Strategy","type":"document","URL":"https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf"},{"id":"nationalmaterialsandmanufacturingboardVisionFutureCenterBased2016","accessed":{"date-parts":[["2024",1,26]]},"author":[{"literal":"National Materials and Manufacturing Board"},{"literal":"Division on Engineering and Physical Sciences"},{"literal":"National Academy of Engineering"},{"literal":"National Academies of Sciences, Engineering, and Medicine"}],"citation-key":"nationalmaterialsandmanufacturingboardVisionFutureCenterBased2016","DOI":"10.17226/23645","editor":[{"family":"Alper","given":"Joe"}],"event-place":"Washington, D.C.","ISBN":"978-0-309-44970-0","issued":{"date-parts":[["2016"]]},"language":"en","page":"23645","publisher":"National Academies Press","publisher-place":"Washington, D.C.","source":"DOI.org (Crossref)","title":"A Vision for the Future of Center-Based Multidisciplinary Engineering Research: Proceedings of a Symposium","title-short":"A Vision for the Future of Center-Based Multidisciplinary Engineering Research","type":"book","URL":"http://www.nap.edu/catalog/23645"},{"id":"nccic2017","accessed":{"date-parts":[["2022",3,25]]},"citation-key":"nccic2017","issued":{"date-parts":[["2017"]]},"title":"NCCIC Year in Review 2017","type":"webpage","URL":"https://www.cisa.gov/uscert/sites/default/files/Annual_Reports/NCCIC_Year_in_Review_2017_Final.pdf"},{"id":"NCEES2022Annual2022","citation-key":"NCEES2022Annual2022","issued":{"date-parts":[["2022"]]},"publisher":"National Council of Examiners for Engineering an Surveying","title":"NCEES 2022 Annual Report","type":"report"},{"id":"neemaCyPhyMLLanguageMETA","author":[{"family":"Neema","given":"Sandeep"},{"family":"Scott","given":"Jason"},{"family":"Bapty","given":"Ted"}],"citation-key":"neemaCyPhyMLLanguageMETA","number":"ISIS-15-104","title":"CyPhyML Language in the META Toolchain.pdf","type":"report"},{"id":"nekrashevychGroupsTopologicalDynamics2022","accessed":{"date-parts":[["2024",1,17]]},"author":[{"family":"Nekrashevych","given":"Volodymyr"}],"citation-key":"nekrashevychGroupsTopologicalDynamics2022","event-place":"Providence, UNITED STATES","ISBN":"978-1-4704-7119-4","issued":{"date-parts":[["2022"]]},"publisher":"American Mathematical Society","publisher-place":"Providence, UNITED STATES","source":"ProQuest Ebook Central","title":"Groups and Topological Dynamics","type":"book","URL":"http://ebookcentral.proquest.com/lib/pitt-ebooks/detail.action?docID=29731920"},{"id":"nemouchiFormallyVerifiedZTA2023","abstract":"The clean energy transformation led to the integration of distributed energy resources on a top of the grid, and so a substantial increase in the complexity of power grids infrastructure and the underlying operational technology environment. Operational technology environments are becoming a system of systems, integrating heterogeneous devices which are software/hardware intensive, have ever increasing demands to exploit advances in commodity of software/hardware infrastructures, and this for good reasons – improving energy systems requirements such as cybersecurity and resilience. In such a setting, system requirements at different levels mix, thus undesirable outcomes will surely happen. The use of formal methods will remove ambiguity, increase automation and provide high levels of assurance and reliability. In this paper, we contribute a methodology and a framework for the system level verification of zero trust architecture requirements in operational technology environments. We define a formal specification for the core functionalities of operational technology environments, the corresponding invariants, and security proofs. Of particular note is our modular approach for the formal verification of asynchronous interactions in operational technology environments. The formal specification and the proofs have been mechanized using the interactive theorem proving environment Isabelle/HOL.","author":[{"family":"Nemouchi","given":"Yakoub"},{"family":"Etigowni","given":"Sriharsha"},{"family":"Zolan","given":"Alexander"},{"family":"Macwan","given":"Richard"}],"citation-key":"nemouchiFormallyVerifiedZTA2023","container-title":"Renewable Energy","issued":{"date-parts":[["2023"]]},"language":"en","source":"Zotero","title":"Formally Verified ZTA Requirements for OT/ICS Environments with Isabelle/HOL: Preprint","type":"article-journal"},{"id":"nemouchiFormallyVerifiedZTA2023a","abstract":"The clean energy transformation led to the integration of distributed energy resources on a top of the grid, and so a substantial increase in the complexity of power grids infrastructure and the underlying operational technology environment. Operational technology environments are becoming a system of systems, integrating heterogeneous devices which are software/hardware intensive, have ever increasing demands to exploit advances in commodity of software/hardware infrastructures, and this for good reasons - improving energy systems requirements such as cybersecurity and resilience. In such a setting, system requirements at different levels mix, thus undesirable outcomes will surely happen. The use of formal methods will remove ambiguity, increase automation and provide high levels of assurance and reliability. In this paper, we contribute a methodology and a framework for the system level verification of zero trust architecture requirements in operational technology environments. We define a formal specification for the core functionalities of operational technology environments, the corresponding invariants, and security proofs. Of particular note is our modular approach for the formal verification of asynchronous interactions in operational technology environments. The formal specification and the proofs have been mechanized using the interactive theorem proving environment Isabelle/HOL.","accessed":{"date-parts":[["2024",4,29]]},"author":[{"family":"Nemouchi","given":"Yakoub"},{"family":"Etigowni","given":"Sriharsha"},{"family":"Zolan","given":"Alexander"},{"family":"Macwan","given":"Richard"}],"citation-key":"nemouchiFormallyVerifiedZTA2023a","issued":{"date-parts":[["2023",11,29]]},"language":"English","number":"NREL/CP-5R00-86154","publisher":"National Renewable Energy Laboratory (NREL), Golden, CO (United States)","source":"www.osti.gov","title":"Formally Verified ZTA Requirements for OT/ICS Environments with Isabelle/HOL: Preprint","title-short":"Formally Verified ZTA Requirements for OT/ICS Environments with Isabelle/HOL","type":"report","URL":"https://www.osti.gov/biblio/2228660"},{"id":"nestlerCompetencyCybersecurityEducation","author":[{"family":"Nestler","given":"Vincent"},{"family":"Fowler","given":"Zoe"}],"citation-key":"nestlerCompetencyCybersecurityEducation","language":"en","source":"Zotero","title":"Competency in Cybersecurity Education:","type":"article-journal"},{"id":"netlSystemsViewModern2007","author":[{"family":"NETL","given":"US"}],"citation-key":"netlSystemsViewModern2007","container-title":"White Paper, Jan","issued":{"date-parts":[["2007"]]},"source":"Google Scholar","title":"A systems view of the modern grid","type":"article-journal"},{"id":"neureiterDomainSpecificModelBased2022","abstract":"Model Based Systems Engineering as a scientific discipline tries to address the increasing complexity of today's cyber-physical systems by utilizing different kinds of models. In practical application, however, this approach is often constrained to SysML-based object modeling. Even though this appears to be a suitable approach for dealing with complexity, various restrictions limit stakeholder acceptance. Considering scientific discussions in the context of modeling shows two different schools of thought. On the one hand, arguments for more formalized and rigorous concepts can be found, where on the other hand, the need for more stakeholder-oriented and easier-to-understand concepts is postulated. As both are reasonable, the question of integration arises. To address this aspect, we developed the concept of Domain Specific Systems Engineering. Our research in this field lasted for nearly a decade, and different aspects have been investigated. This paper contributes a summary of the overall approach that integrates the various aspects investigated so far. Thus, the underlying concepts are explained, and the corresponding modeling stack and tool-chain are described in more detail. Further, the practical experiences from various case studies are summarized, and identified shortcomings are discussed.","accessed":{"date-parts":[["2023",10,3]]},"author":[{"family":"Neureiter","given":"Christian"},{"family":"Binder","given":"Christoph"}],"citation-key":"neureiterDomainSpecificModelBased2022","container-title":"SYSTEMS","container-title-short":"Systems-Basel","DOI":"10.3390/systems10020042","event-place":"Basel","ISSN":"2079-8954","issue":"2","issued":{"date-parts":[["2022",4]]},"language":"English","note":"Web of Science ID: WOS:000786858800001","number-of-pages":"27","page":"42","publisher":"MDPI","publisher-place":"Basel","source":"Clarivate Analytics Web of Science","title":"A Domain-Specific, Model Based Systems Engineering Approach for Cyber-Physical Systems","type":"article-journal","URL":"https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2","volume":"10"},{"id":"newellTranslationIEC6113132018","abstract":"The trip computers for the two reactor shutdown systems of the Ontario Power Generation (OPG) Darlington Nuclear Power Generating Station are being refurbished due to hardware obsolescence. For one of the systems, the general purpose computer originally used is being replaced by a programmable logic controller (PLC). The trip computer application software has been rewritten using function block diagrams (FBDs), a commonly used PLC programming language defined in the IEC 61131-3 standard. The replacement project’s quality assurance program requires that formal verification be performed to compare the FBDs against a formal software requirements specification written using tabular expressions (TEs). The PVS theorem proving tool is used in formal verification. Custom tools developed for OPG are used to translate TEs and FBDs into PVS code. In this paper, we present a method to rigorously translate the graphical FBD language to a mathematical model in PVS using an abstract syntax to represent the FBD constructs. We use an example from the replacement project to demonstrate the use of the model to translate a FBD module into a PVS specification. We then extend that example to demonstrate the method’s applicability to a Simulink-based design.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Newell","given":"Josh"},{"family":"Pang","given":"Linna"},{"family":"Tremaine","given":"David"},{"family":"Wassyng","given":"Alan"},{"family":"Lawford","given":"Mark"}],"citation-key":"newellTranslationIEC6113132018","container-title":"Journal of Automated Reasoning","container-title-short":"J Autom Reasoning","DOI":"10.1007/s10817-017-9415-7","ISSN":"0168-7433, 1573-0670","issue":"1","issued":{"date-parts":[["2018",1]]},"language":"en","page":"63-84","source":"DOI.org (Crossref)","title":"Translation of IEC 61131-3 Function Block Diagrams to PVS for Formal Verification with Real-Time Nuclear Application","type":"article-journal","URL":"http://link.springer.com/10.1007/s10817-017-9415-7","volume":"60"},{"id":"newmanWidespreadLogicController","abstract":"More than 120 models of Siemens' S7-1500 PLCs contain a serious vulnerability—and no fix is on the way.","accessed":{"date-parts":[["2024",4,4]]},"author":[{"family":"Newman","given":"Lily Hay"}],"citation-key":"newmanWidespreadLogicController","container-title":"Wired","ISSN":"1059-1028","language":"en-US","section":"tags","source":"www.wired.com","title":"A Widespread Logic Controller Flaw Raises the Specter of Stuxnet","type":"article-magazine","URL":"https://www.wired.com/story/siemens-s7-1500-logic-controller-flaw/"},{"id":"nghiemMontecarloTechniquesFalsification2010","abstract":"We present a Monte-Carlo optimization technique for finding inputs to a system that falsify a given Metric Temporal Logic (MTL) property. Our approach performs a random walk over the space of inputs guided by a robustness metric defined by the MTL property. Robustness can be used to guide our search for a falsifying trajectory by exploring trajectories with smaller robustness values. We show that the notion of robustness can be generalized to consider hybrid system trajectories. The resulting testing framework can be applied to non-linear hybrid systems with external inputs. We show through numerous experiments on complex systems that using our framework can help automatically falsify properties with more consistency as compared to other means such as uniform sampling.","accessed":{"date-parts":[["2023",11,3]]},"author":[{"family":"Nghiem","given":"Truong"},{"family":"Sankaranarayanan","given":"Sriram"},{"family":"Fainekos","given":"Georgios"},{"family":"Ivancić","given":"Franjo"},{"family":"Gupta","given":"Aarti"},{"family":"Pappas","given":"George J."}],"citation-key":"nghiemMontecarloTechniquesFalsification2010","collection-title":"HSCC '10","container-title":"Proceedings of the 13th ACM international conference on Hybrid systems: computation and control","DOI":"10.1145/1755952.1755983","event-place":"New York, NY, USA","ISBN":"978-1-60558-955-8","issued":{"date-parts":[["2010",4,12]]},"page":"211–220","publisher":"Association for Computing Machinery","publisher-place":"New York, NY, USA","source":"ACM Digital Library","title":"Monte-carlo techniques for falsification of temporal properties of non-linear hybrid systems","type":"paper-conference","URL":"https://dl.acm.org/doi/10.1145/1755952.1755983"},{"id":"nguyenDeepReinforcementLearning2021","abstract":"The scale of Internet-connected systems has increased considerably, and these systems are being exposed to cyber attacks more than ever. The complexity and dynamics of cyber attacks require protecting mechanisms to be responsive, adaptive, and scalable. Machine learning, or more specifically deep reinforcement learning (DRL), methods have been proposed widely to address these issues. By incorporating deep learning into traditional RL, DRL is highly capable of solving complex, dynamic, and especially high-dimensional cyber defense problems. This paper presents a survey of DRL approaches developed for cyber security. We touch on different vital aspects, including DRL-based security methods for cyber-physical systems, autonomous intrusion detection techniques, and multiagent DRL-based game theory simulations for defense strategies against cyber attacks. Extensive discussions and future research directions on DRL-based cyber security are also given. We expect that this comprehensive review provides the foundations for and facilitates future studies on exploring the potential of emerging DRL to cope with increasingly complex cyber security problems.","accessed":{"date-parts":[["2022",3,2]]},"author":[{"family":"Nguyen","given":"Thanh Thi"},{"family":"Reddi","given":"Vijay Janapa"}],"citation-key":"nguyenDeepReinforcementLearning2021","container-title":"IEEE Transactions on Neural Networks and Learning Systems","container-title-short":"IEEE Trans. Neural Netw. Learning Syst.","DOI":"10.1109/TNNLS.2021.3121870","ISSN":"2162-237X, 2162-2388","issued":{"date-parts":[["2021"]]},"language":"en","page":"1-17","source":"arXiv.org","title":"Deep Reinforcement Learning for Cyber Security","type":"article-journal","URL":"http://arxiv.org/abs/1906.05799"},{"id":"nguyenDigitalTwinApproach2022","abstract":"Automating the task of fault detection and diagnosis is crucial in the effort to reduce the operation and maintenance cost in the nuclear industry. This paper describes a physics-based approach for system-level diagnosis in thermal–hydraulic systems in nuclear power plants. The inclusion of physics information allows for the creation of virtual sensors, which provide improved fault diagnosis capability. The physics information also serves to better constrain diagnostic solutions to the physical domain. As a demonstration, various test cases for fault diagnosis in a high-pressure feedwater system were considered. The use of virtual sensors allows constructing performance models for two first-point feedwater heaters which would not have been possible otherwise due to the limited sensor set. Real-time plant data provided by a utility partner were used to assess the diagnostic approach. The detection of an abnormal event immediate after a plant startup pointed to faulty behaviors in the two first-point feedwater heaters. This double-blind fault diagnosis was subsequently confirmed by the plant operator. In addition, several simulated sensor fault events demonstrated the capability of our algorithms in detecting and discriminating sensor faults.","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Nguyen","given":"Tat Nghia"},{"family":"Ponciroli","given":"Roberto"},{"family":"Bruck","given":"Paul"},{"family":"Esselman","given":"Thomas C."},{"family":"Rigatti","given":"Joseph A."},{"family":"Vilim","given":"Richard B."}],"citation-key":"nguyenDigitalTwinApproach2022","container-title":"Annals of Nuclear Energy","container-title-short":"Annals of Nuclear Energy","DOI":"10.1016/j.anucene.2022.109002","ISSN":"03064549","issued":{"date-parts":[["2022",6]]},"language":"en","page":"109002","source":"DOI.org (Crossref)","title":"A digital twin approach to system-level fault detection and diagnosis for improved equipment health monitoring","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S0306454922000378","volume":"170"},{"id":"nguyenFuzzyControlSystems2019","abstract":"More than 40 years after fuzzy logic control appeared as an effective tool to deal with complex processes, the research on fuzzy control systems has constantly evolved. Mamdani fuzzy control was originally introduced as a model-free control approach based on expert?s experience and knowledge. Due to the lack of a systematic framework to study Mamdani fuzzy systems, we have witnessed growing interest in fuzzy model-based approaches with Takagi-Sugeno fuzzy systems and singleton-type fuzzy systems (also called piecewise multiaffine systems) over the past decades. This paper reviews the key features of the three above types of fuzzy systems. Through these features, we point out the historical rationale for each type of fuzzy systems and its current research mainstreams. However, the focus is put on fuzzy model-based approaches developed via Lyapunov stability theorem and linear matrix inequality (LMI) formulations. Finally, our personal viewpoint on the perspectives and challenges of the future fuzzy control research is discussed.","accessed":{"date-parts":[["2024",7,10]]},"author":[{"family":"Nguyen","given":"Anh-Tu"},{"family":"Taniguchi","given":"Tadanari"},{"family":"Eciolaza","given":"Luka"},{"family":"Campos","given":"Victor"},{"family":"Palhares","given":"Reinaldo"},{"family":"Sugeno","given":"Michio"}],"citation-key":"nguyenFuzzyControlSystems2019","container-title":"IEEE Computational Intelligence Magazine","DOI":"10.1109/MCI.2018.2881644","ISSN":"1556-6048","issue":"1","issued":{"date-parts":[["2019",2]]},"page":"56-68","source":"IEEE Xplore","title":"Fuzzy Control Systems: Past, Present and Future","title-short":"Fuzzy Control Systems","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/8610273","volume":"14"},{"id":"nguyenModelBasedDiagnosticFrameworks","author":[{"family":"Nguyen","given":"Tat Nghia"}],"citation-key":"nguyenModelBasedDiagnosticFrameworks","language":"en","source":"Zotero","title":"Model-Based Diagnostic Frameworks for Fault Detection and System Monitoring in Nuclear Engineering Systems","type":"article-journal"},{"id":"nguyenModelbasedSecurityEngineering2017","abstract":"Context: Cyber-physical systems (CPSs) have emerged to be the next generation of engineered systems driving the so-called fourth industrial revolution. CPSs are becoming more complex, open and more prone to security threats, which urges security to be engineered systematically into CPSs. Model-Based Security Engineering (MBSE) could be a key means to tackle this challenge via security by design, abstraction, and automation. Objective: We aim at providing an initial assessment of the state of the art in MBSE for CPSs (MBSE4CPS). Specifically, this work focuses on finding out I) the publication statistics of MBSE4CPS studies; 2) the characteristics of MBSE4CPS studies; and 3) the open issues of MBSE4CPS research. Method: We conducted a systematic mapping study (SMS) following a rigorous protocol that was developed based on the state-of-the-art SMS and systematic review guidelines. From thousands of relevant publications, we systematically identified 48 primary MBSE4CPS studies for data extraction and synthesis to answer predefined research questions. Results: SMS results show that for three recent years (2014-2016) the number of primary MBSE4CPS studies has increased significantly. Within the primary studies, the popularity of using Domain-Specific Languages (DSLs) is comparable with the use of the standardised UML modelling notation. Most primary studies do not explicitly address specific security concerns (e.g., confidentiality, integrity) but rather focus on security analyses in general on threats, attacks or vulnerabilities. Few primary studies propose to engineer security solutions for CPSs. Many focus on the early stages of development lifecycle such as security requirement engineering or analysis. Conclusion: The SMS does not only provide the state of the art in MBSE4CPS, but also points out several open issues that would deserve more investigation, e.g., the lack of engineering security solutions for CPSs, limited tool support, too few industrial case studies, and the challenge of bridging DSLs in engineering secure CPSs. (C) 2016 Elsevier B.V. All rights reserved.","accessed":{"date-parts":[["2023",10,3]]},"author":[{"family":"Nguyen","given":"Phu H."},{"family":"Ali","given":"Shaukat"},{"family":"Yue","given":"Tao"}],"citation-key":"nguyenModelbasedSecurityEngineering2017","container-title":"INFORMATION AND SOFTWARE TECHNOLOGY","container-title-short":"Inf. Softw. Technol.","DOI":"10.1016/j.infsof.2016.11.004","event-place":"Amsterdam","ISSN":"0950-5849, 1873-6025","issued":{"date-parts":[["2017",3]]},"language":"English","note":"Web of Science ID: WOS:000393006700007","number-of-pages":"20","page":"116-135","publisher":"Elsevier","publisher-place":"Amsterdam","source":"Clarivate Analytics Web of Science","title":"Model-based security engineering for cyber-physical systems: A systematic mapping study","title-short":"Model-based security engineering for cyber-physical systems","type":"article-journal","URL":"https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2","volume":"83"},{"id":"nguyenPrivacyfirstManufacturingData2023","abstract":"Reducing their operating costs and optimizing manufacturing processes are main challenges for manufacturers that need no-doubt help from machine suppliers-OEMs. However, like 64% of Business entities, they do not intend to collaborate as long as their confidential data can be seen by anyone. Until now, some solutions on market using technologies like Confidential Computing, Differential Privacy, Multi Party Computation cannot completely fit to industrial requirements, data are sometimes partially encrypted or using trust execution environment (a bunker) to analyse in clear format. For this reason, until now, no secure computation and no solution for privacy-preserving data analysis are yet completely satisfactory (in terms of privacy and security constraints) and moreover they are often tested for different applications and on different datasets. Fully Homomorphic Encryption (FHE) technology is going to change the game. FHE allows service providers to work directly on encrypted data without ever decrypting it, which offers a privacy data protection for both customers and OEMs. In the collaboration with Siemens France, we provide FHE-based manufacturing data exchange space which is a part of RaiseSens© Data eXchange Platform (RS-DXP). In this respect, API-driven RS-DXP architecture allows the practical and easy integration of FHE techniques combined with optimisation engine, and non-moving data techniques applied in lightweight yet real-world manufacturing applications and deploying them in Cloud computing environment to offer a solution at low software engineering cost. This will pave the way for a wide deployment, boosting data-enabled manufacturing services.","accessed":{"date-parts":[["2024",2,1]]},"author":[{"family":"Nguyen","given":"Thanh-Hai"},{"family":"Heron","given":"Olivier"},{"family":"Riou","given":"Olivier"}],"citation-key":"nguyenPrivacyfirstManufacturingData2023","collection-title":"SOICT '23","container-title":"Proceedings of the 12th International Symposium on Information and Communication Technology","DOI":"10.1145/3628797.3628913","event-place":"New York, NY, USA","ISBN":"9798400708916","issued":{"date-parts":[["2023",12,7]]},"page":"801–807","publisher":"Association for Computing Machinery","publisher-place":"New York, NY, USA","source":"ACM Digital Library","title":"Towards Privacy-first Manufacturing Data Exchange Platform","type":"paper-conference","URL":"https://dl.acm.org/doi/10.1145/3628797.3628913"},{"id":"nguyenSurveyPaperDigital2021","abstract":"Digital twins are introduced as a solution for various power distribution system applications and security. Power distribution systems engineers lack the capability of knowing the real time status of the system and potential vulnerabilities that can harm it. The digital twin's ability to perform real time calculations and analyses make them a unique tool that can strengthen our understanding of current functions within the power grid, mitigate threats, and perform analyses to improve decision making. The goal of this paper is to introduce digital twins and demonstrate how their application in power systems can help improve efficiency, reliability, and functionality.","author":[{"family":"Nguyen","given":"Sabrina"},{"family":"Abdelhakim","given":"Mai"},{"family":"Kerestes","given":"Robert"}],"citation-key":"nguyenSurveyPaperDigital2021","container-title":"2021 IEEE Power Energy Society General Meeting (PESGM)","DOI":"10.1109/PESGM46819.2021.9638011","event-title":"2021 IEEE Power Energy Society General Meeting (PESGM)","ISSN":"1944-9933","issued":{"date-parts":[["2021",7]]},"page":"01-05","source":"IEEE Xplore","title":"Survey Paper of Digital Twins and their Integration into Electric Power Systems","type":"paper-conference"},{"id":"nicholGLIDEPhotorealisticImage2022","abstract":"Diffusion models have recently been shown to generate high-quality synthetic images, especially when paired with a guidance technique to trade off diversity for fidelity. We explore diffusion models for the problem of text-conditional image synthesis and compare two different guidance strategies: CLIP guidance and classifier-free guidance. We find that the latter is preferred by human evaluators for both photorealism and caption similarity, and often produces photorealistic samples. Samples from a 3.5 billion parameter text-conditional diffusion model using classifier-free guidance are favored by human evaluators to those from DALL-E, even when the latter uses expensive CLIP reranking. Additionally, we find that our models can be fine-tuned to perform image inpainting, enabling powerful text-driven image editing. We train a smaller model on a filtered dataset and release the code and weights at https://github.com/openai/glide-text2im.","accessed":{"date-parts":[["2023",10,5]]},"author":[{"family":"Nichol","given":"Alex"},{"family":"Dhariwal","given":"Prafulla"},{"family":"Ramesh","given":"Aditya"},{"family":"Shyam","given":"Pranav"},{"family":"Mishkin","given":"Pamela"},{"family":"McGrew","given":"Bob"},{"family":"Sutskever","given":"Ilya"},{"family":"Chen","given":"Mark"}],"citation-key":"nicholGLIDEPhotorealisticImage2022","DOI":"10.48550/arXiv.2112.10741","issued":{"date-parts":[["2022",3,8]]},"number":"arXiv:2112.10741","publisher":"arXiv","source":"arXiv.org","title":"GLIDE: Towards Photorealistic Image Generation and Editing with Text-Guided Diffusion Models","title-short":"GLIDE","type":"article","URL":"http://arxiv.org/abs/2112.10741"},{"id":"nicholImprovedDenoisingDiffusion2021","abstract":"Denoising diffusion probabilistic models (DDPM) are a class of generative models which have recently been shown to produce excellent samples. We show that with a few simple modifications, DDPMs can also achieve competitive log-likelihoods while maintaining high sample quality. Additionally, we find that learning variances of the reverse diffusion process allows sampling with an order of magnitude fewer forward passes with a negligible difference in sample quality, which is important for the practical deployment of these models. We additionally use precision and recall to compare how well DDPMs and GANs cover the target distribution. Finally, we show that the sample quality and likelihood of these models scale smoothly with model capacity and training compute, making them easily scalable. We release our code at https://github.com/openai/improved-diffusion","accessed":{"date-parts":[["2023",10,5]]},"author":[{"family":"Nichol","given":"Alex"},{"family":"Dhariwal","given":"Prafulla"}],"citation-key":"nicholImprovedDenoisingDiffusion2021","DOI":"10.48550/arXiv.2102.09672","issued":{"date-parts":[["2021",2,18]]},"number":"arXiv:2102.09672","publisher":"arXiv","source":"arXiv.org","title":"Improved Denoising Diffusion Probabilistic Models","type":"article","URL":"http://arxiv.org/abs/2102.09672"},{"id":"nicolCommonWeaknessEnumerations2023","abstract":"The storyline of MITRE’s common weakness enumeration framework illustrates how the security and privacy technical community can collaborate/cooperate with policy makers to advance policy, giving it specifics and filling gaps of technical knowledge to improve security and resilience of critical infrastructure.","accessed":{"date-parts":[["2024",2,29]]},"author":[{"family":"Nicol","given":"David M."},{"family":"Shannon","given":"Gregory"},{"family":"Akbar","given":"Monika"},{"family":"Bishop","given":"Matt"},{"family":"Chaney","given":"Michael"},{"family":"Luallen","given":"Matthew"}],"citation-key":"nicolCommonWeaknessEnumerations2023","container-title":"IEEE Security & Privacy","DOI":"10.1109/MSEC.2023.3279515","ISSN":"1558-4046","issue":"4","issued":{"date-parts":[["2023",7]]},"page":"84-93","source":"IEEE Xplore","title":"Toward Common Weakness Enumerations in Industrial Control Systems","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/10194510","volume":"21"},{"id":"nigamFormalSecurityVerification2019","abstract":"Without appropriate counter-measures, cyber-attacks can exploit the increased system connectivity provided by Industry 4.0 (I4.0) to cause catastrophic events, by, e.g., injecting or tampering with messages. The solution supported by standards, such as, OPC-UA, is to sign or encrypt messages. However, given the limited resources of devices, instead of encrypting all messages in the network, it is better to encrypt only the messages that if tampered with or injected, could lead to undesired configurations. This paper describes the use of formal verification to analyse the security of I4.0 applications. We formalize in Rewriting Logic, I4.0 applications and systems, i.e., networked sets of devices, and a symbolic intruder model. Our formalization can be executed by the tool Maude to automate such security analysis, e.g., determine which messages are sufficient to sign in order avoid injection and tampering attacks.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Nigam","given":"Vivek"},{"family":"Talcott","given":"Carolyn"}],"citation-key":"nigamFormalSecurityVerification2019","container-title":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","DOI":"10.1109/ETFA.2019.8869428","event-place":"Zaragoza, Spain","event-title":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","ISBN":"978-1-72810-303-7","issued":{"date-parts":[["2019",9]]},"language":"en","page":"1043-1050","publisher":"IEEE","publisher-place":"Zaragoza, Spain","source":"DOI.org (Crossref)","title":"Formal Security Verification of Industry 4.0 Applications","type":"paper-conference","URL":"https://ieeexplore.ieee.org/document/8869428/"},{"id":"nilssonCorrectbyConstructionAdaptiveCruise2016","abstract":"Motivated by the challenge of developing control software provably meeting specifications for real-world problems, this paper applies formal methods to adaptive cruise control (ACC). Starting from a linear temporal logic specification for ACC, obtained by interpreting relevant ACC standards, we discuss in this paper two different control software synthesis methods. Each method produces a controller that is correctby-construction, meaning that trajectories of the closed-loop systems provably meet the specification. Both methods rely on fixed-point computations of certain set-valued mappings. However, one of the methods performs these computations on the continuous state space whereas the other method operates on a finite-state abstraction. While controller synthesis is based on a low-dimensional model, each controller is tested on CarSim, an industry-standard vehicle simulator. Our results demonstrate several advantages over classical control design techniques. First, a formal approach to control design removes potential ambiguity in textual specifications by translating them into precise mathematical requirements. Second, because the resulting closedloop system is known a priori to satisfy the specification, testing can then focus on the validity of the models used in control design and whether the specification captures the intended requirements. Finally, the set from where the specification (e.g., safety) can be enforced is explicitly computed and thus conditions for passing control to an emergency controller are clearly defined.","accessed":{"date-parts":[["2023",11,20]]},"author":[{"family":"Nilsson","given":"Petter"},{"family":"Hussien","given":"Omar"},{"family":"Balkan","given":"Ayca"},{"family":"Chen","given":"Yuxiao"},{"family":"Ames","given":"Aaron D."},{"family":"Grizzle","given":"Jessy W."},{"family":"Ozay","given":"Necmiye"},{"family":"Peng","given":"Huei"},{"family":"Tabuada","given":"Paulo"}],"citation-key":"nilssonCorrectbyConstructionAdaptiveCruise2016","container-title":"IEEE Transactions on Control Systems Technology","container-title-short":"IEEE Trans. Contr. Syst. Technol.","DOI":"10.1109/TCST.2015.2501351","ISSN":"1063-6536, 1558-0865","issue":"4","issued":{"date-parts":[["2016",7]]},"language":"en","page":"1294-1307","source":"DOI.org (Crossref)","title":"Correct-by-Construction Adaptive Cruise Control: Two Approaches","title-short":"Correct-by-Construction Adaptive Cruise Control","type":"article-journal","URL":"http://ieeexplore.ieee.org/document/7349170/","volume":"24"},{"id":"nipkowConcreteSemanticsIsabelle2014","accessed":{"date-parts":[["2024",5,3]]},"author":[{"family":"Nipkow","given":"Tobias"},{"family":"Klein","given":"Gerwin"}],"citation-key":"nipkowConcreteSemanticsIsabelle2014","DOI":"10.1007/978-3-319-10542-0","event-place":"Cham","ISBN":"978-3-319-10541-3 978-3-319-10542-0","issued":{"date-parts":[["2014"]]},"language":"en","license":"https://www.springernature.com/gp/researchers/text-and-data-mining","publisher":"Springer International Publishing","publisher-place":"Cham","source":"DOI.org (Crossref)","title":"Concrete Semantics: With Isabelle/HOL","title-short":"Concrete Semantics","type":"book","URL":"https://link.springer.com/10.1007/978-3-319-10542-0"},{"id":"nitscheSatisfactionCheckingPower2014","abstract":"Since energy consumption is one of the most limiting factors for embedded and integrated systems, today’s microelectronic design demands urgently for power-aware methodologies for early specification, design-space exploration and verification of the designs’ power properties. To this end, we currently develop a contract- and component-based design concept for power properties, called Power Contracts, to provide a formal link between the bottom-up power characterization of low-level system components and the top-down specification of the systems’ high-level power intent. In this paper, we present a first proof of concept for the verification of the leaf-component power contracts of a hierarchical system design w. r. t. their implementation in UPPAAL. Building on these, we can provide assured power contracts for the hierarchical Virtual Integration (VI) of the leafcomponents to a compound power contract of the integrated final system and thus allow for a sound and traceable bottom-up integration and verification methodology for power properties.","accessed":{"date-parts":[["2023",11,8]]},"author":[{"family":"Nitsche","given":"Gregor"},{"family":"Gruttner","given":"Kim"},{"family":"Nebel","given":"Wolfgang"}],"citation-key":"nitscheSatisfactionCheckingPower2014","container-title":"Proceedings of the 2014 Forum on Specification and Design Languages (FDL)","DOI":"10.1109/FDL.2014.7119364","event-place":"Munich, Germany","event-title":"2014 Forum on Specification and Design Languages (FDL)","ISBN":"978-2-9530504-9-3","issued":{"date-parts":[["2014",10]]},"language":"en","page":"1-8","publisher":"IEEE","publisher-place":"Munich, Germany","source":"DOI.org (Crossref)","title":"Towards satisfaction checking of power contracts in Uppaal","type":"paper-conference","URL":"http://ieeexplore.ieee.org/document/7119364/"},{"id":"nogueiraIntrusionTolerantEclipseSCADA2017","abstract":"The paper describes an open-source SCADA system that was enhanced with intrusion-tolerant capabilities, focusing on the aspects related to the challenges that were addressed and the architecture of the solution. Some preliminary performance results are also included.","author":[{"family":"Nogueira","given":"André"},{"family":"Bessani","given":"Alysson"},{"family":"Neves","given":"Nuno"}],"citation-key":"nogueiraIntrusionTolerantEclipseSCADA2017","event-place":"Vienna, Austria","event-title":"Symposium on Innovative Smart Grid Cybersecurity Solutions","issued":{"date-parts":[["2017"]]},"language":"en","page":"2","publisher-place":"Vienna, Austria","source":"Zotero","title":"Intrusion-Tolerant Eclipse SCADA","type":"paper-conference"},{"id":"normey-ricoTeachingControlBasic2023","abstract":"In this article, we discuss a novel education approach to control theory in undergraduate engineering programs. In particular, we elaborate on the inclusion of an introductory course on process control during the first years of the program, to appear right after the students undergo basic calculus and physics courses. Our novel teaching proposal comprises debating the basic elements of control theory without requiring any background on advanced mathematical frameworks from the part of the students. The methodology addresses, conceptually, the majority of the steps required for the analysis and design of simple control systems. Herein, we thoroughly detail this educational guideline, as well as tools that can be used in the classroom. Furthermore, we propose a cheap test-bench kit and an open-source numerical simulator that can be used to carry out experiments during the proposed course. Most importantly, we also assess on how the Introduction to process control course has affected the undergraduate program on Control and Automation Engineering at Universidade Federal de Santa Catarina (UFSC, Brazil). Specifically, we debate the outcomes of implementing our education approach at UFSC from 2016 to 2023, considering students' rates of success in other control courses and perspectives on how the chair helped them throughout the course of their program. Based on randomised interviews, we indicate that our educational approach has had good teaching-learning results: students tend to be more motivated for other control-related subjects, while exhibiting higher rates of success.","accessed":{"date-parts":[["2024",1,16]]},"author":[{"family":"Normey-Rico","given":"Julio Elias"},{"family":"Morato","given":"Marcelo Menezes"}],"citation-key":"normey-ricoTeachingControlBasic2023","issued":{"date-parts":[["2023",10,9]]},"language":"en","number":"arXiv:2310.06001","publisher":"arXiv","source":"arXiv.org","title":"Teaching control with Basic Maths: Introduction to Process Control course as a novel educational approach for undergraduate engineering programs","title-short":"Teaching control with Basic Maths","type":"article","URL":"http://arxiv.org/abs/2310.06001"},{"id":"NOTES","citation-key":"NOTES","title":"NOTES","type":"document"},{"id":"nsa2020","accessed":{"date-parts":[["2022",3,25]]},"citation-key":"nsa2020","title":"NSA Cybersecurity 2020 Year in Review","type":"webpage","URL":"https://media.defense.gov/2021/Jan/08/2002561651/-1/-1/0/NSA%20CYBERSECURITY%202020%20YEAR%20IN%20REVIEW.PDF/NSA%20CYBERSECURITY%202020%20YEAR%20IN%20REVIEW.PDF"},{"id":"NSF","citation-key":"NSF","issued":{"date-parts":[["2016",3,4]]},"type":"document"},{"id":"NUARIAddressingNational","abstract":"More than a think tank, the Norwich University Applied Research Institutes are driven to develop effective solutions for national cyber security threats.","accessed":{"date-parts":[["2023",11,9]]},"citation-key":"NUARIAddressingNational","language":"en","title":"NUARI: Addressing National Cyber Security Issues","title-short":"NUARI","type":"webpage","URL":"https://nuari.org"},{"id":"nuskenSolvingHighdimensionalHamiltonJacobiBellman2023","abstract":"Optimal control of diffusion processes is intimately connected to the problem of solving certain Hamilton-Jacobi-Bellman equations. Building on recent machine learning inspired approaches towards high-dimensional PDEs, we investigate the potential of $\\textit{iterative diffusion optimisation}$ techniques, in particular considering applications in importance sampling and rare event simulation, and focusing on problems without diffusion control, with linearly controlled drift and running costs that depend quadratically on the control. More generally, our methods apply to nonlinear parabolic PDEs with a certain shift invariance. The choice of an appropriate loss function being a central element in the algorithmic design, we develop a principled framework based on divergences between path measures, encompassing various existing methods. Motivated by connections to forward-backward SDEs, we propose and study the novel $\\textit{log-variance}$ divergence, showing favourable properties of corresponding Monte Carlo estimators. The promise of the developed approach is exemplified by a range of high-dimensional and metastable numerical examples.","accessed":{"date-parts":[["2023",10,27]]},"author":[{"family":"Nüsken","given":"Nikolas"},{"family":"Richter","given":"Lorenz"}],"citation-key":"nuskenSolvingHighdimensionalHamiltonJacobiBellman2023","DOI":"10.48550/arXiv.2005.05409","issued":{"date-parts":[["2023",1,29]]},"number":"arXiv:2005.05409","publisher":"arXiv","source":"arXiv.org","title":"Solving high-dimensional Hamilton-Jacobi-Bellman PDEs using neural networks: perspectives from the theory of controlled diffusions and measures on path space","title-short":"Solving high-dimensional Hamilton-Jacobi-Bellman PDEs using neural networks","type":"article","URL":"http://arxiv.org/abs/2005.05409"},{"id":"nuzzoContractbasedDesignControl2014","abstract":"We introduce a platform-based design methodology that addresses the complexity and heterogeneity of cyber-physical systems by using assume-guarantee contracts to formalize the design process and enable realization of control protocols in a hierarchical and compositional manner. Given the architecture of the physical plant to be controlled, the design is carried out as a sequence of refinement steps from an initial specification to a final implementation, including synthesis from requirements and mapping of higher-level functional and nonfunctional models into a set of candidate solutions built out of a library of components at the lower level. Initial top-level requirements are captured as contracts and expressed using linear temporal logic (LTL) and signal temporal logic (STL) formulas to enable requirement analysis and early detection of inconsistencies. Requirements are then refined into a controller architecture by combining reactive synthesis steps from LTL specifications with simulation-based design space exploration steps. We demonstrate our approach on the design of embedded controllers for aircraft electric power distribution.","accessed":{"date-parts":[["2023",11,8]]},"author":[{"family":"Nuzzo","given":"Pierluigi"},{"family":"Finn","given":"John B."},{"family":"Iannopollo","given":"Antonio"},{"family":"Sangiovanni-Vincentelli","given":"Alberto L."}],"citation-key":"nuzzoContractbasedDesignControl2014","container-title":"Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014","DOI":"10.7873/DATE.2014.072","event-place":"Dresden, Germany","event-title":"Design Automation and Test in Europe","ISBN":"978-3-9815370-2-4","issued":{"date-parts":[["2014"]]},"language":"en","page":"1-4","publisher":"IEEE Conference Publications","publisher-place":"Dresden, Germany","source":"DOI.org (Crossref)","title":"Contract-based design of control protocols for safety-critical cyber-physical systems","type":"paper-conference","URL":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6800273"},{"id":"nuzzoContractbasedDesignControl2014a","abstract":"We introduce a platform-based design methodology that addresses the complexity and heterogeneity of cyber-physical systems by using assume-guarantee contracts to formalize the design process and enable realization of control protocols in a hierarchical and compositional manner. Given the architecture of the physical plant to be controlled, the design is carried out as a sequence of refinement steps from an initial specification to a final implementation, including synthesis from requirements and mapping of higher-level functional and nonfunctional models into a set of candidate solutions built out of a library of components at the lower level. Initial top-level requirements are captured as contracts and expressed using linear temporal logic (LTL) and signal temporal logic (STL) formulas to enable requirement analysis and early detection of inconsistencies. Requirements are then refined into a controller architecture by combining reactive synthesis steps from LTL specifications with simulation-based design space exploration steps. We demonstrate our approach on the design of embedded controllers for aircraft electric power distribution.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Nuzzo","given":"Pierluigi"},{"family":"Finn","given":"John B."},{"family":"Iannopollo","given":"Antonio"},{"family":"Sangiovanni-Vincentelli","given":"Alberto L."}],"citation-key":"nuzzoContractbasedDesignControl2014a","container-title":"Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014","DOI":"10.7873/DATE.2014.072","event-place":"Dresden, Germany","event-title":"Design Automation and Test in Europe","ISBN":"978-3-9815370-2-4","issued":{"date-parts":[["2014"]]},"language":"en","page":"1-4","publisher":"IEEE Conference Publications","publisher-place":"Dresden, Germany","source":"DOI.org (Crossref)","title":"Contract-based design of control protocols for safety-critical cyber-physical systems","type":"paper-conference","URL":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6800273"},{"id":"nuzzoMethodologyToolsNext2015","abstract":"The realization of complex, cyber-physical “systems of systems” can substantially benefit from model-based hierarchical and compositional methodologies to make their design possible let alone optimal. In this paper, we introduce the methodology being developed within the industrial Cyber-Physical (iCyPhy) research consortium, which addresses the complexity and heterogeneity of cyber-physical systems by formalizing the design process in a hierarchical and compositional way, and provides a unifying framework where different modeling, analysis and synthesis tools can seamlessly interconnect. We use assume-guarantee contracts and their algebra (e.g. composition, conjunction, refinement) to provide formal support to the entire design flow. The design is carried out as a sequence of refinement steps from a high-level specification (top-down phase) to an implementation built out of a library of components at the lower level (bottom-up phase). At each step, the design is refined by combining synthesis from requirements, optimization and simulation-based design space exploration methods. We illustrate our approach on design examples of embedded controllers for aircraft power distribution and air management systems.","accessed":{"date-parts":[["2023",11,8]]},"author":[{"family":"Nuzzo","given":"Pierluigi"},{"family":"Sangiovanni‐Vincentelli","given":"Alberto L."},{"family":"Murray","given":"Richard M."}],"citation-key":"nuzzoMethodologyToolsNext2015","container-title":"INCOSE International Symposium","container-title-short":"INCOSE International Symp","DOI":"10.1002/j.2334-5837.2015.00060.x","ISSN":"2334-5837, 2334-5837","issue":"1","issued":{"date-parts":[["2015",10]]},"language":"en","page":"235-249","source":"DOI.org (Crossref)","title":"Methodology and Tools for Next Generation Cyber‐Physical Systems: The iCyPhy Approach","title-short":"Methodology and Tools for Next Generation Cyber‐Physical Systems","type":"article-journal","URL":"https://incose.onlinelibrary.wiley.com/doi/10.1002/j.2334-5837.2015.00060.x","volume":"25"},{"id":"nuzzoStochasticAssumeGuaranteeContracts2019","abstract":"We present an assume-guarantee contract framework for cyber-physical system design under probabilistic requirements. Given a stochastic linear system and a set of requirements captured by bounded Stochastic Signal Temporal Logic (StSTL) contracts, we propose algorithms to check contract compatibility, consistency, and refinement, and generate a sequence of control inputs that satisfies a contract. We leverage encodings of the verification and control synthesis tasks into mixed integer optimization problems, and conservative approximations of probabilistic constraints that produce sound and tractable problem formulations. We illustrate the effectiveness of our approach on three case studies, including the design of controllers for aircraft power distribution networks.","accessed":{"date-parts":[["2023",11,8]]},"author":[{"family":"Nuzzo","given":"Pierluigi"},{"family":"Li","given":"Jiwei"},{"family":"Sangiovanni-Vincentelli","given":"Alberto L."},{"family":"Xi","given":"Yugeng"},{"family":"Li","given":"Dewei"}],"citation-key":"nuzzoStochasticAssumeGuaranteeContracts2019","container-title":"ACM Transactions on Embedded Computing Systems","container-title-short":"ACM Trans. Embed. Comput. Syst.","DOI":"10.1145/3243216","ISSN":"1539-9087, 1558-3465","issue":"1","issued":{"date-parts":[["2019",1,31]]},"language":"en","page":"1-26","source":"DOI.org (Crossref)","title":"Stochastic Assume-Guarantee Contracts for Cyber-Physical System Design","type":"article-journal","URL":"https://dl.acm.org/doi/10.1145/3243216","volume":"18"},{"id":"NYT-colonial","author":[{"family":"Krauss","given":"Clifford"}],"citation-key":"NYT-colonial","container-title":"The New York Times","issued":{"literal":"date accessed 02/13/2022"},"title":"Colonial Pipeline chief says an oversight let hackers into its system","type":"article-journal","URL":"https://www.nytimes.com/2021/06/08/business/colonial-pipeline-hack.html"},{"id":"obeidFormalVerificationSecurity2019","abstract":"Information security was initially required in specific applications, however, nowadays, most companies and even individuals are interested in securing their information assets. The new requirement can be costly, especially with the high demand on security solutions and security experts. Security patterns are reusable security solutions that prove to be efficient and can help developers achieve some security goals without the need for expertise in the security domain. Some security pattern combinations can be beneficial while others are inconsistent. Model checking can be used to verify the production of combining multiple security patterns with an architecture. Supervisory control and data acquisition (SCADA) systems control many of our critical industrial infrastructures. Due to their limitations, and their augmented connectivity, SCADA systems have many unresolved security issues. In this paper, we demonstrate how we can automatically generate a secure SCADA model based on an insecure one and how to verify the generated model.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Obeid","given":"Fadi"},{"family":"Dhaussy","given":"Philippe"}],"citation-key":"obeidFormalVerificationSecurity2019","container-title":"Computing and Informatics","container-title-short":"cai","DOI":"10.31577/cai_2019_5_1149","ISSN":"2585-8807","issue":"5","issued":{"date-parts":[["2019"]]},"language":"en","page":"1149-1180","source":"DOI.org (Crossref)","title":"Formal Verification of Security Pattern Composition: Application to SCADA","title-short":"Formal Verification of Security Pattern Composition","type":"article-journal","URL":"http://www.cai.sk/ojs/index.php/cai/article/view/2019_5_1149","volume":"38"},{"id":"oberkampfVerificationValidationPredictive2004","abstract":"Developers of computer codes, analysts who use the codes, and decision makers who rely on the results of the analyses face a critical question: How should confidence in modeling and simulation be critically assessed? Verification and validation (V&V) of computational simulations are the primary methods for building and quantifying this confidence. Briefly, verification is the assessment of the accuracy of the solution to a computational model. Validation is the assessment of the accuracy of a computational simulation by comparison with experimental data. In verification, the relationship of the simulation to the real world is not an issue. In validation, the relationship between computation and the real world, ie, experimental data, is the issue. This paper presents our viewpoint of the state of the art in V&V in computational physics. (In this paper we refer to all fields of computational engineering and physics, eg, computational fluid dynamics, computational solid mechanics, structural dynamics, shock wave physics, computational chemistry, etc, as computational physics.) We describe our view of the framework in which predictive capability relies on V&V, as well as other factors that affect predictive capability. Our opinions about the research needs and management issues in V&V are very practical: What methods and techniques need to be developed and what changes in the views of management need to occur to increase the usefulness, reliability, and impact of computational physics for decision making about engineering systems? We review the state of the art in V&V over a wide range of topics, for example, prioritization of V&V activities using the Phenomena Identification and Ranking Table (PIRT), code verification, software quality assurance (SQA), numerical error estimation, hierarchical experiments for validation, characteristics of validation experiments, the need to perform nondeterministic computational simulations in comparisons with experimental data, and validation metrics. We then provide an extensive discussion of V&V research and implementation issues that we believe must be addressed for V&V to be more effective in improving confidence in computational predictive capability. Some of the research topics addressed are development of improved procedures for the use of the PIRT for prioritizing V&V activities, the method of manufactured solutions for code verification, development and use of hierarchical validation diagrams, and the construction and use of validation metrics incorporating statistical measures. Some of the implementation topics addressed are the needed management initiatives to better align and team computationalists and experimentalists in conducting validation activities, the perspective of commercial software companies, the key role of analysts and decision makers as code customers, obstacles to the improved effectiveness of V&V, effects of cost and schedule constraints on practical applications in industrial settings, and the role of engineering standards committees in documenting best practices for V&V. There are 207 references cited in this review article.","accessed":{"date-parts":[["2024",5,21]]},"author":[{"family":"Oberkampf","given":"William L"},{"family":"Trucano","given":"Timothy G"},{"family":"Hirsch","given":"Charles"}],"citation-key":"oberkampfVerificationValidationPredictive2004","container-title":"Applied Mechanics Reviews","container-title-short":"Applied Mechanics Reviews","DOI":"10.1115/1.1767847","ISSN":"0003-6900","issue":"5","issued":{"date-parts":[["2004",12,21]]},"page":"345-384","source":"Silverchair","title":"Verification, validation, and predictive capability in computational engineering and physics","type":"article-journal","URL":"https://doi.org/10.1115/1.1767847","volume":"57"},{"id":"ogataFormalMethodsSoftware2016","accessed":{"date-parts":[["2022",9,30]]},"citation-key":"ogataFormalMethodsSoftware2016","collection-title":"Lecture Notes in Computer Science","DOI":"10.1007/978-3-319-47846-3","editor":[{"family":"Ogata","given":"Kazuhiro"},{"family":"Lawford","given":"Mark"},{"family":"Liu","given":"Shaoying"}],"event-place":"Cham","ISBN":"978-3-319-47845-6 978-3-319-47846-3","issued":{"date-parts":[["2016"]]},"language":"en","publisher":"Springer International Publishing","publisher-place":"Cham","source":"DOI.org (Crossref)","title":"Formal Methods and Software Engineering: 18th International Conference on Formal Engineering Methods, ICFEM 2016, Tokyo, Japan, November 14-18, 2016, Proceedings","title-short":"Formal Methods and Software Engineering","type":"book","URL":"http://link.springer.com/10.1007/978-3-319-47846-3","volume":"10009"},{"id":"ohaganBayesianAnalysisComputer2006","abstract":"The Bayesian approach to quantifying, analysing and reducing uncertainty in the application of complex process models is attracting increasing attention amongst users of such models. The range and power of the Bayesian methods is growing and there is already a sizeable literature on these methods. However, most of it is in specialist statistical journals. The purpose of this tutorial is to introduce the more general reader to the Bayesian approach.","accessed":{"date-parts":[["2022",4,21]]},"author":[{"family":"O’Hagan","given":"A."}],"citation-key":"ohaganBayesianAnalysisComputer2006","container-title":"Reliability Engineering & System Safety","container-title-short":"Reliability Engineering & System Safety","DOI":"10.1016/j.ress.2005.11.025","ISSN":"09518320","issue":"10-11","issued":{"date-parts":[["2006",10]]},"language":"en","page":"1290-1300","source":"DOI.org (Crossref)","title":"Bayesian analysis of computer code outputs: A tutorial","title-short":"Bayesian analysis of computer code outputs","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S0951832005002383","volume":"91"},{"id":"olivares-rojasCybersecuritySmartGrid2021","abstract":"The proliferation of cyber-physical systems is bringing with it the growing need to link these systems with virtual environments. Particularly in the smart grid, the high costs of some devices and especially the imminent need to not be able to manipulate these devices in production environments make necessary mechanisms that allow the manipulation of these physical objects in virtual environments; this has been called a digital twin. On the other hand, cyberattacks are growing in all cyber-physical systems, and in the smart grid, cybersecurity is essential due to the smart grid is a critical infrastructure. This work shows a small implementation of a digital twin system for smart metering systems in a smart home environment for testing cybersecurity issues. The results show that the use of digital twins is feasible in various contexts of the smart grid in particularly in cybersecurity testing.","accessed":{"date-parts":[["2022",3,2]]},"author":[{"family":"Olivares-Rojas","given":"Juan C."},{"family":"Reyes-Archundia","given":"Enrique"},{"family":"Gutierrez-Gnecchi","given":"Jose A."},{"family":"Molina-Moreno","given":"Ismael"},{"family":"Cerda-Jacobo","given":"Jaime"},{"family":"Mendez-Patino","given":"Arturo"}],"citation-key":"olivares-rojasCybersecuritySmartGrid2021","container-title":"IEEE Internet Computing","container-title-short":"IEEE Internet Comput.","DOI":"10.1109/MIC.2021.3063674","ISSN":"1089-7801, 1941-0131","issued":{"date-parts":[["2021"]]},"language":"en","page":"1-1","source":"DOI.org (Crossref)","title":"Towards Cybersecurity of the Smart Grid using Digital Twins","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/9368968/"},{"id":"oortwijnFormalVerificationIndustrial2019","author":[{"family":"Oortwijn","given":"Wytse"},{"family":"Huisman","given":"Marieke"}],"citation-key":"oortwijnFormalVerificationIndustrial2019","container-title":"Integrated Formal Methods: 15th International Conference, IFM 2019, Bergen, Norway, December 2–6, 2019, Proceedings 15","ISBN":"3-030-34967-5","issued":{"date-parts":[["2019"]]},"page":"418-436","publisher":"Springer","title":"Formal verification of an industrial safety-critical traffic tunnel control system","type":"paper-conference"},{"id":"OperatingSystemDevelopment2024","abstract":":books: Learn to write an embedded OS in Rust :crab:","accessed":{"date-parts":[["2024",1,2]]},"citation-key":"OperatingSystemDevelopment2024","genre":"Rust","issued":{"date-parts":[["2024",1,2]]},"license":"Apache-2.0","original-date":{"date-parts":[["2018",3,31]]},"publisher":"Rust Embedded","source":"GitHub","title":"Operating System development tutorials in Rust on the Raspberry Pi","type":"software","URL":"https://github.com/rust-embedded/rust-raspberrypi-OS-tutorials"},{"id":"oppenheimEffectsFiniteRegister1972","abstract":"When digital signal processing operations are implemented on a computer or with special-purpose hardware, errors and constraints due to finite word length are unavoidable. The main categories of finite register length effects are errors due to A/D conversion, errors due to roundoffs in the arithmetic, constraints on signal levels imposed by the need to prevent overflow, and quantization of system coefficients. The effects of finite register length on implementations of linear recursive difference equation digital filters, and the fast Fourier transform (FFT), are discussed in some detail. For these algorithms, the differing quantization effects of fixed point, floating point, and block floating point arithmetic are examined and compared. The paper is intended primarily as a tutorial review of a subject which has received considerable attention over the past few years. The groundwork is set through a discussion of the relationship between the binary representation of numbers and truncation or rounding, and a formulation of a statistical model for arithmetic roundoff. The analyses presented here are intended to illustrate techniques of working with particular models. Results of previous work are discussed and summarized when appropriate. Some examples are presented to indicate how the results developed for simple digital filters and the FFT can be applied to the analysis of more complicated systems which use these algorithms as building blocks.","accessed":{"date-parts":[["2024",2,8]]},"author":[{"family":"Oppenheim","given":"A.V."},{"family":"Weinstein","given":"C.J."}],"citation-key":"oppenheimEffectsFiniteRegister1972","container-title":"Proceedings of the IEEE","DOI":"10.1109/PROC.1972.8820","ISSN":"1558-2256","issue":"8","issued":{"date-parts":[["1972",8]]},"page":"957-976","source":"IEEE Xplore","title":"Effects of finite register length in digital filtering and the fast Fourier transform","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/1450750?casa_token=kAczMhD2oroAAAAA:GjI24f6aTAdM8lKXQE0tQ6p-6g7wJ4divWdNyJY1VX9m6NnZcPmnlaWOLfl0grGcvpHxcFV7JQ","volume":"60"},{"id":"oppenheimRealizationDigitalFilters1970","abstract":"Recently, statistical models for the effects of roundoff noise in fixed-point and floating-point realizations of digital filters have been proposed and verified, and a comparison between these realizations presented. In this paper a structure for implementing digital filters using block-floating-point arithmetic is proposed and a statistical analysis of the effects of roundoff noise is carried out. On the basis of this analysis, block-floating-point is compared to fixed-point and floating-point arithmetic with regard to roundoff noise effects.","accessed":{"date-parts":[["2024",2,8]]},"author":[{"family":"Oppenheim","given":"A."}],"citation-key":"oppenheimRealizationDigitalFilters1970","container-title":"IEEE Transactions on Audio and Electroacoustics","DOI":"10.1109/TAU.1970.1162085","ISSN":"1558-2582","issue":"2","issued":{"date-parts":[["1970",6]]},"page":"130-136","source":"IEEE Xplore","title":"Realization of digital filters using block-floating-point arithmetic","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/1162085?casa_token=Ah4FKuW8dWsAAAAA:sY06mnCtOtw44rCWhPiuSFDyipuJoHikB-SMO_-NAvYxEbwQtggd2pWmez3Xl6ztTcfeKRWdhA","volume":"18"},{"id":"oquendoDealingUncertaintySoftware2019","abstract":"When architecting Software-intensive Systems-of-Systems (SoS) on the Internet-of-Things (IoT), architects face two sorts of uncertainties. First, they have only limited knowledge about the operational environment where the SoS will actually be deployed. Second, the constituent systems which will compose the SoS might not be known a priori (at design-time) or their availability (at runtime) is affected by dynamic factors, due to the openness of the IoT. The consequent research question is thereby how to deal with uncertainty in the design of an SoS architecture on the IoT. To tackle this challenging issue, this paper addresses the notion of uncertainty due to partial information in SoS and proposes an enhanced SoS Architecture Description language (SosADL) for expressing SoS architectures on the IoT under uncertainty. The core SosADL is extended with concurrent constraints and the concept of digital twins coupling the physical and virtual worlds. This novel approach is supported by an integrated toolset, the SosADL Studio. Validation results demonstrate its effectiveness in an SoS architecture for platooning of self-driving vehicles.","accessed":{"date-parts":[["2022",3,2]]},"author":[{"family":"Oquendo","given":"Flavio"}],"citation-key":"oquendoDealingUncertaintySoftware2019","container-title":"Computational Science and Its Applications – ICCSA 2019","DOI":"10.1007/978-3-030-24289-3_57","editor":[{"family":"Misra","given":"Sanjay"},{"family":"Gervasi","given":"Osvaldo"},{"family":"Murgante","given":"Beniamino"},{"family":"Stankova","given":"Elena"},{"family":"Korkhov","given":"Vladimir"},{"family":"Torre","given":"Carmelo"},{"family":"Rocha","given":"Ana Maria A.C."},{"family":"Taniar","given":"David"},{"family":"Apduhan","given":"Bernady O."},{"family":"Tarantino","given":"Eufemia"}],"event-place":"Cham","ISBN":"978-3-030-24288-6 978-3-030-24289-3","issued":{"date-parts":[["2019"]]},"language":"en","page":"770-786","publisher":"Springer International Publishing","publisher-place":"Cham","source":"DOI.org (Crossref)","title":"Dealing with Uncertainty in Software Architecture on the Internet-of-Things with Digital Twins","type":"chapter","URL":"http://link.springer.com/10.1007/978-3-030-24289-3_57","volume":"11619"},{"id":"osborneBayesianGaussianProcesses2010","abstract":"We develop a family of Bayesian algorithms built around Gaussian processes for various problems posed by sensor networks. We firstly introduce an iterative Gaussian process for multi-sensor inference problems, and show how our algorithm is able to cope with data that may be noisy, missing, delayed and/or correlated. Our algorithm can also effectively manage data that features changepoints, such as sensor faults. Extensions to our algorithm allow us to tackle some of the decision problems faced in sensor networks, including observation scheduling. Along these lines, we also propose a general method of global optimisation, Gaussian process global optimisation (GPGO), and demonstrate how it may be used for sensor placement.","author":[{"family":"Osborne","given":"Michael"}],"citation-key":"osborneBayesianGaussianProcesses2010","genre":"Ph.D. disseration","issued":{"date-parts":[["2010"]]},"language":"en","publisher":"University of Oxford","source":"Zotero","title":"Bayesian Gaussian Processes for Sequential Prediction, Optimisation and Quadrature","type":"thesis"},{"id":"osherLevelSetMethods2001","abstract":"The level set method was devised by S. Osher and J. A. Sethian (1988, J. Comput. Phys.79, 12–49) as a simple and versatile method for computing and analyzing the motion of an interface Γ in two or three dimensions. Γ bounds a (possibly multiply connected) region Ω. The goal is to compute and analyze the subsequent motion of Γ under a velocity field v. This velocity can depend on position, time, the geometry of the interface, and the external physics. The interface is captured for later time as the zero level set of a smooth (at least Lipschitz continuous) function ϕ (x, t); i.e., Γ(t)={x|ϕ(x, t)=0}. ϕ is positive inside Ω, negative outside Ω, and is zero on Γ(t). Topological merging and breaking are well defined and easily performed. In this review article we discuss recent variants and extensions, including the motion of curves in three dimensions, the dynamic surface extension method, fast methods for steady state problems, diffusion generated motion, and the variational level set approach. We also give a user's guide to the level set dictionary and technology and couple the method to a wide variety of problems involving external physics, such as compressible and incompressible (possibly reacting) flow, Stefan problems, kinetic crystal growth, epitaxial growth of thin films, vortex-dominated flows, and extensions to multiphase motion. We conclude with a discussion of applications to computer vision and image processing.","accessed":{"date-parts":[["2023",10,27]]},"author":[{"family":"Osher","given":"Stanley"},{"family":"Fedkiw","given":"Ronald P."}],"citation-key":"osherLevelSetMethods2001","container-title":"Journal of Computational Physics","container-title-short":"Journal of Computational Physics","DOI":"10.1006/jcph.2000.6636","ISSN":"0021-9991","issue":"2","issued":{"date-parts":[["2001",5,20]]},"page":"463-502","source":"ScienceDirect","title":"Level Set Methods: An Overview and Some Recent Results","title-short":"Level Set Methods","type":"article-journal","URL":"https://www.sciencedirect.com/science/article/pii/S0021999100966361","volume":"169"},{"id":"OT-def","citation-key":"OT-def","issued":{"date-parts":[["2021"]]},"type":"document"},{"id":"oudinaModelingTrustCyberPhysical2023","abstract":"Developing trust in cyber-physical systems (CPSs) is a challenging task. Trust in CPS is needed for carrying out their intended duties and is reasonably safe from misuse and intrusion; it also enforces the applicable security policy. As an example, medical smart devices, many researches have found that trust is a key factor in explaining the relationship between individual beliefs about technological attributes and their acceptance behavior; and have associated medical device failures with severe patient injuries and deaths. The cyber-physical system is considered a trust system if the principles of security and safety, confidentiality, integrity, availability, and other attributes are assured. However, a lack of sufficient analysis of such systems, as well as appropriate explanation of relevant trust assumptions, may result in systems that fail to completely realize their functionality. The existing research does not provide suitable guidance for a systematic procedure or modeling language to support such trust-based analysis. The most pressing difficulties are achieving trust by design in CPS and systematically incorporating trust engineering into system development from the start of the system life cycle. Still, there is a need for a strategy or standard model to aid in the creation of a safe, secure, and trustworthy CPS. Model-based system engineering (MBSE) approaches for trust cyber-physical systems are a means to address system trustworthiness design challenges. This work proposes a practical and efficient MBSE method for constructing trust CPS, which provides guidance for the process of trustworthiness analysis. The SysML-based profile is supplied, together with recommendations on which approach is required at each process phase. The MBSE method is proven by expanding the autonomous car SysML and UML diagrams, and we show how trust considerations are integrated into the system development life cycle.","accessed":{"date-parts":[["2023",10,3]]},"author":[{"family":"Oudina","given":"Zina"},{"family":"Derdour","given":"Makhlouf"}],"citation-key":"oudinaModelingTrustCyberPhysical2023","container-title":"INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS","container-title-short":"Int. J. Adv. Comput. Sci. Appl.","event-place":"West Yorkshire","ISSN":"2158-107X, 2156-5570","issue":"7","issued":{"date-parts":[["2023",7]]},"language":"English","note":"Web of Science ID: WOS:001047185600001","number-of-pages":"12","page":"441-452","publisher":"Science & Information Sai Organization Ltd","publisher-place":"West Yorkshire","source":"Clarivate Analytics Web of Science","title":"Toward Modeling Trust Cyber-Physical Systems: A Model-based System Engineering Method","title-short":"Toward Modeling Trust Cyber-Physical Systems","type":"article-journal","URL":"https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2","volume":"14"},{"id":"outlierDiffusionModelsPaper2022","abstract":"Diffusion Models are generative models just like GANs. In recent times many state-of-the-art works have been released that build on top of diffusion models such as #dalle or #imagen. In this video I give a detailed explanation of how they work. At first I explain the fundamental idea of these models and later we dive deep into the math part. I try to explain all of this on a really easy & intuitive level. After the math derivation, we look at the results from different papers and how they compare to other methods.\n\n#diffusion #dalle2 #dalle #imagen \n\n00:00 Introduction\n02:48 Idea & Theory\n07:06 Architecture\n09:33 Math Derivation\n26:59 Algorithms\n28:22 Improvements\n29:43 Results\n31:34 Summary\n\nFurther Reading:\n1. Paper: https://arxiv.org/pdf/1503.03585.pdf\n2. Paper: https://arxiv.org/pdf/2006.11239.pdf\n3. Paper: https://arxiv.org/pdf/2102.09672.pdf\n4. Paper: https://arxiv.org/pdf/2105.05233.pdf\n5. VAE & Reparam. Trick: https://lilianweng.github.io/posts/20...\n6. Written Tutorial: https://lilianweng.github.io/posts/20...\n\nPyTorch Implementation Video: • Diffusion Models | PyTorch Implementa... \n\nFollow me on instagram lol: https://www.instagram.com/dome271","accessed":{"date-parts":[["2023",10,10]]},"citation-key":"outlierDiffusionModelsPaper2022","dimensions":"0:56","director":[{"literal":"Outlier"}],"issued":{"date-parts":[["2022",6,6]]},"source":"YouTube","title":"Diffusion Models | Paper Explanation | Math Explained","type":"motion_picture","URL":"https://www.youtube.com/watch?v=HoKDTa5jHvg"},{"id":"outlierDiffusionModelsPyTorch2022","abstract":"Diffusion Models are generative models just like GANs. In recent times many state-of-the-art works have been released that build on top of diffusion models such as #dalle , #imagen or #stablediffusion . In this video I'm coding a PyTorch implementation of diffusion models in a very easy and straightforward way. At first I'm showing how to implement an unconditional version and subsequently train it. After that I'm explaining 2 popular improvements for diffusion models: classifier free guidance and exponential moving average. I'm also going to implement both updates and train a conditional model on CIFAR-10 and afterwards compare the different results.\n\nCode: https://github.com/dome272/Diffusion-...\n\n#diffusion #dalle2 #dalle #imagen #stablediffusion\n\n00:00 Introduction\n02:05 Recap\n03:16 Diffusion Tools\n07:22 UNet\n13:07 Training Loop\n15:44 Unconditional Results\n16:05 Classifier Free Guidance\n19:16 Exponential Moving Average\n21:05 Conditional Results\n21:51 Github Code & Outro\n\nFurther Reading:\n1. Paper: https://arxiv.org/pdf/1503.03585.pdf\n2. Paper: https://arxiv.org/pdf/2006.11239.pdf\n3. Paper: https://arxiv.org/pdf/2102.09672.pdf\n4. Paper: https://arxiv.org/pdf/2105.05233.pdf\n5. CFG: https://arxiv.org/pdf/2207.12598.pdf\n6. Timestep Embedding: https://machinelearningmastery.com/a-...\n\nFollow me on instagram lol: https://www.instagram.com/dome271","accessed":{"date-parts":[["2023",10,11]]},"citation-key":"outlierDiffusionModelsPyTorch2022","dimensions":"22:25","director":[{"literal":"Outlier"}],"issued":{"date-parts":[["2022",9,20]]},"source":"YouTube","title":"Diffusion Models | PyTorch Implementation","type":"motion_picture","URL":"https://www.youtube.com/watch?v=TBCRlnwJtZU"},{"id":"PA-profile","citation-key":"PA-profile","issued":{"literal":"accessed 02/13/2022"},"publisher":"U.S. Energy Information Administration","title":"Pennsylvania state energy profile","type":"document","URL":"https://www.eia.gov/state/?sid=PA"},{"id":"pagettiMultitaskImplementationMultiperiodic2011","abstract":"This article presents a complete scheme for the integration and the development of multi-periodic critical embedded systems. A system is formally specified as a modular and hierarchical assembly of several locally mono-periodic synchronous functions into a globally multi-periodic synchronous system. To support this, we introduce a real-time software architecture description language, named Prelude, which is built upon the synchronous languages and which provides a high level of abstraction for describing the functional and the real-time architecture of a multiperiodic control system. A program is translated into a set of real-time tasks that can be executed on a monoprocessor real-time platform with an on-line priority-based scheduler such as Deadline-Monotonic or Earliest-Deadline-First. The compilation is formally proved correct, meaning that the generated code respects the real-time semantics of the original program (respect of periods, deadlines, release dates and precedences) as well as its functional semantics (respect of variable consumption).","accessed":{"date-parts":[["2023",11,2]]},"author":[{"family":"Pagetti","given":"Claire"},{"family":"Forget","given":"Julien"},{"family":"Boniol","given":"Frédéric"},{"family":"Cordovilla","given":"Mikel"},{"family":"Lesens","given":"David"}],"citation-key":"pagettiMultitaskImplementationMultiperiodic2011","container-title":"Discrete Event Dynamic Systems","container-title-short":"Discrete Event Dyn Syst","DOI":"10.1007/s10626-011-0107-x","ISSN":"0924-6703, 1573-7594","issue":"3","issued":{"date-parts":[["2011",9]]},"language":"en","page":"307-338","source":"DOI.org (Crossref)","title":"Multi-task Implementation of Multi-periodic Synchronous Programs","type":"article-journal","URL":"http://link.springer.com/10.1007/s10626-011-0107-x","volume":"21"},{"id":"palenskyCosimulatingIntegratedEnergy2024","abstract":"Energy system integration promises in-creased resiliency and the unlocking of synergies, while also contributing to our goal of decarbonization. It is enabled by both old and new technologies, glued together with data and digital services. Hydrolyzers, heat pumps, distributed renewable generation, smart buildings, and the digital grid edge are all currently the subject of integration with the power system and the energy sector at large. To plan and operate such a multidisciplinary and multisectoral system properly, insight, tools, and expertise are all needed. This is exactly where the state of the art fails to deliver: tools for integrated energy systems (IESs) are still in their infancy, and many times, even academia treats these sectors separately, producing experts in each of them but not across.","accessed":{"date-parts":[["2024",3,13]]},"author":[{"family":"Palensky","given":"Peter"},{"family":"Mancarella","given":"Pierluigi"},{"family":"Hardy","given":"Trevor"},{"family":"Cvetkovic","given":"Milos"}],"citation-key":"palenskyCosimulatingIntegratedEnergy2024","container-title":"IEEE Power and Energy Magazine","DOI":"10.1109/MPE.2023.3324886","ISSN":"1558-4216","issue":"1","issued":{"date-parts":[["2024",1]]},"page":"52-60","source":"IEEE Xplore","title":"Cosimulating Integrated Energy Systems With Heterogeneous Digital Twins: Matching a Connected World","title-short":"Cosimulating Integrated Energy Systems With Heterogeneous Digital Twins","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/10398554/","volume":"22"},{"id":"PAPUC","author":[{"literal":"Michael Holko, Director, Office of Cybersecurity Compliance and Oversight, Pennsylvania Public Unitily Commission"}],"citation-key":"PAPUC","issued":{"date-parts":[["2022",2,25]]},"type":"document","URL":"https://www.puc.pa.gov/media/1825/russian-cyber-threats-critical-infrastructure.pdf"},{"id":"parantModelbasedEngineeringDesigning2023","abstract":"Cyber-physical systems (CPS) are composed of independent and cooperative elements. Rapid adaptation to disturbances is an essential characteristic of CPS. One of the challenges in designing CPS is considering these specificities. Model-Based Engineering is a method for reducing complexity in system design. This paper presents a methodology for designing CPS and its control system using System Modeling Language (SysML) diagrams and IEC 61499 standard. The product's specifications are the starting point; the methodology focuses on what is produced before determining how to make it. The real-time control system is designed from high-level knowl-edge and tested software components on the plug and produce principle. Task-based structural analysis ensures the elements' synchronization to determine the system's general behavior.","accessed":{"date-parts":[["2023",10,3]]},"author":[{"family":"Parant","given":"Alexandre"},{"family":"Gellot","given":"Francois"},{"family":"Zander","given":"Damien"},{"family":"Carre-Menetrier","given":"Veronique"},{"family":"Philippot","given":"Alexandre"}],"citation-key":"parantModelbasedEngineeringDesigning2023","container-title":"COMPUTERS IN INDUSTRY","container-title-short":"Comput. Ind.","DOI":"10.1016/j.compind.2022.103808","event-place":"Amsterdam","ISSN":"0166-3615, 1872-6194","issued":{"date-parts":[["2023",2]]},"language":"English","note":"Web of Science ID: WOS:000901415100001","number-of-pages":"19","page":"103808","publisher":"Elsevier","publisher-place":"Amsterdam","source":"Clarivate Analytics Web of Science","title":"Model-based engineering for designing cyber-physical systems from product specifications","type":"article-journal","URL":"https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/2","volume":"145"},{"id":"parkReliableIntelligentDiagnostic2022","abstract":"When abnormal operating conditions occur in nuclear power plants, operators must identify the occurrence cause and implement the necessary mitigation measures. Accordingly, the operator must rapidly and accurately analyze the symptom requirements of more than 200 abnormal scenarios from the trends of many variables to perform diagnostic tasks and implement mitigation actions rapidly. However, the probability of human error increases owing to the characteristics of the diagnostic tasks performed by the operator. Researches regarding diagnostic tasks based on Artificial Intelligence (AI) have been conducted recently to reduce the likelihood of human errors; however, reliability issues due to the black box characteristics of AI have been pointed out. Hence, the application of eXplainable Artificial Intelligence (XAI), which can provide AI diagnostic evidence for operators, is considered. In conclusion, the XAI to solve the reliability problem of AI is included in the AI-based diagnostic algorithm. A reliable intelligent diagnostic assistant based on a merged diagnostic algorithm, in the form of an operator support system, is developed, and includes an interface to efficiently inform operators.","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Park","given":"Ji Hun"},{"family":"Jo","given":"Hye Seon"},{"family":"Lee","given":"Sang Hyun"},{"family":"Oh","given":"Sang Won"},{"family":"Na","given":"Man Gyun"}],"citation-key":"parkReliableIntelligentDiagnostic2022","container-title":"Nuclear Engineering and Technology","container-title-short":"Nuclear Engineering and Technology","DOI":"10.1016/j.net.2021.10.024","ISSN":"17385733","issue":"4","issued":{"date-parts":[["2022",4]]},"language":"en","page":"1271-1287","source":"DOI.org (Crossref)","title":"A reliable intelligent diagnostic assistant for nuclear power plants using explainable artificial intelligence of GRU-AE, LightGBM and SHAP","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S1738573321006082","volume":"54"},{"id":"parksNewProofRouthHurwitz1962","abstract":"The second method of Liapunov is a useful technique for investigating the stability of linear and non-linear ordinary differential equations. It is well known that the second method of Liapunov, when applied to linear differential equations with real constant coefficients, gives rise to sets of necessary and sufficient stability conditions which are alternatives to the well-known Routh-Hurwitz conditions. In this paper a direct proof of the Routh-Hurwitz conditions themselves is given using Liapunov's second method. The new proof is ‘elementary’ in that it depends on the fundamental concept of stability associated with Liapunov's second method, and not on theorems in the complex integral calculus which are required in the usual proofs. A useful by-product of this new proof is a method of determining the coefficients of a linear differential equation with real constant coefficients in terms of its Hurwitz determinants.","accessed":{"date-parts":[["2024",3,5]]},"author":[{"family":"Parks","given":"P. C."}],"citation-key":"parksNewProofRouthHurwitz1962","container-title":"Mathematical Proceedings of the Cambridge Philosophical Society","DOI":"10.1017/S030500410004072X","ISSN":"1469-8064, 0305-0041","issue":"4","issued":{"date-parts":[["1962",10]]},"language":"en","page":"694-702","source":"Cambridge University Press","title":"A new proof of the Routh-Hurwitz stability criterion using the second method of Liapunov","type":"article-journal","URL":"https://www.cambridge.org/core/journals/mathematical-proceedings-of-the-cambridge-philosophical-society/article/new-proof-of-the-routhhurwitz-stability-criterion-using-the-second-method-of-liapunov/15C073E593E77B9A869252AC398F5408","volume":"58"},{"id":"pasqualettiAttackDetectionIdentification2013","abstract":"Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial control processes, and critical infrastructures. These systems need to operate reliably in the face of unforeseen failures and external malicious attacks. In this paper: (i) we propose a mathematical framework for cyber-physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations from system-theoretic and graph-theoretic perspectives; and (ii) we design centralized and distributed attack detection and identification monitors. Finally, we validate our findings through compelling examples.","accessed":{"date-parts":[["2023",9,27]]},"author":[{"family":"Pasqualetti","given":"Fabio"},{"family":"Dörfler","given":"Florian"},{"family":"Bullo","given":"Francesco"}],"citation-key":"pasqualettiAttackDetectionIdentification2013","container-title":"IEEE Transactions on Automatic Control","DOI":"10.1109/TAC.2013.2266831","ISSN":"1558-2523","issue":"11","issued":{"date-parts":[["2013",11]]},"page":"2715-2729","source":"IEEE Xplore","title":"Attack Detection and Identification in Cyber-Physical Systems","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/6545301?casa_token=Ft_6X6mCU54AAAAA:r49oFvPbZFAmmqczYO6s2vPybo2lkcGzxgGdX15jUF2abn1cuZ4_6PVXndBQyFhZ4LH04J-nfw","volume":"58"},{"id":"pattersonDiagrammaticViewDifferential2022","abstract":"Presenting systems of differential equations in the form of diagrams has become common in certain parts of physics, especially electromagnetism and computational physics. In this work, we aim to put such use of diagrams on a firm mathematical footing, while also systematizing a broadly applicable framework to reason formally about systems of equations and their solutions. Our main mathematical tools are category-theoretic diagrams, which are well known, and morphisms between diagrams, which have been less appreciated. As an application of the diagrammatic framework, we show how complex, multiphysical systems can be modularly constructed from basic physical principles. A wealth of examples, drawn from electromagnetism, transport phenomena, fluid mechanics, and other fields, is included.
","accessed":{"date-parts":[["2023",12,12]]},"author":[{"family":"Patterson","given":"Evan"},{"family":"Baas","given":"Andrew"},{"family":"Hosgood","given":"Timothy"},{"family":"Fairbanks","given":"James"}],"citation-key":"pattersonDiagrammaticViewDifferential2022","container-title":"Mathematics in Engineering","container-title-short":"MINE","DOI":"10.3934/mine.2023036","ISSN":"2640-3501","issue":"2","issued":{"date-parts":[["2022"]]},"page":"1-59","source":"DOI.org (Crossref)","title":"A diagrammatic view of differential equations in physics","type":"article-journal","URL":"http://www.aimspress.com/article/doi/10.3934/mine.2023036","volume":"5"},{"id":"pattersonFrameworkIntegratedNuclear2016","abstract":"A conceptual framework is proposed for a digital environment extending from the prototype design of nuclear plants through operations and decommissioning to storage and waste disposal. The environment consists of a series of interconnected multi-scale, multi-physics computational models linked to the realworld by data acquired during validation of prototypes, in-service monitoring and inspections of plant, post-shut-down inspections of plant and in-situ monitoring of stored waste. The technology gaps for the implementation of the integrated nuclear digital environment (INDE) are identified and discussed together with the advantages to be gained from its implementation. Implementation of INDE will be dependent on future advances in High Performance Computing systems approaching the exascale and parallel advances in the development of algorithms for processing large amounts of data. The data itself will be acquired through innovations in measurement, analysis and uncertainty and will be applied through projects relating to lifetime extension, decommissioning and resurgent national science programmes. It is postulated that the existence of this type of framework might be inevitable given both nuclear-specific and non-nuclear drivers and may be essential for the nuclear industry to deliver current and future challenges from the clean-up of legacy waste sites to time and budget, future generation nuclear reactors and small-scale mass-production of modular nuclear power plants. It is proposed that implementation of INDE will lead to shorten development times, reduced costs and increased credibility, operability, reliability and safety.","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Patterson","given":"Eann A."},{"family":"Taylor","given":"Richard J."},{"family":"Bankhead","given":"Mark"}],"citation-key":"pattersonFrameworkIntegratedNuclear2016","container-title":"Progress in Nuclear Energy","container-title-short":"Progress in Nuclear Energy","DOI":"10.1016/j.pnucene.2015.11.009","ISSN":"01491970","issued":{"date-parts":[["2016",3]]},"language":"en","page":"97-103","source":"DOI.org (Crossref)","title":"A framework for an integrated nuclear digital environment","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S0149197015301104","volume":"87"},{"id":"pazsitBeamModeCorebarrel2006","abstract":"Analysis of core-barrel vibrations in the Swedish Ringhals PWRs has been performed by Chalmers since the early 1990's. In the first phase of this work, between 1991 and 1998, the evaluation method has been developed such that it made a consistent comparison between different measurements possible. A trend analysis showed that the beam mode amplitudes have steadily increased between 1991 and 1998 in all three plants. This paper is to report on the second phase of the work, performed during 2005, on measurements made both before and after the summer outage 2005 in all three plants. During the summer outage, the hold-down spring in Ringhals-3 was replaced. The analysis shows that the vibration amplitudes increased in an accelerated rate between 1998 and 2005 in all three plants. In Ringhals 3, however, after the change of the hold-down spring, the beam mode amplitude has reverted to close its original level of 1991. It became also clear that the extraction of the information from the vibration peaks needs to be refined and made less subjective. A new method of algorithmic peak separation was elaborated, which supplies more information than the previous analysis; it gives also the peak width in addition to peak amplitude and peak frequency, while also supplying more accurate estimates for the latter two. (authors)","author":[{"family":"Pazsit","given":"M."},{"family":"Sunde","given":"C."},{"family":"Pazsit","given":"I."}],"citation-key":"pazsitBeamModeCorebarrel2006","event-place":"United States","issued":{"date-parts":[["2006"]]},"publisher":"American Nuclear Society - ANS; La Grange Park (United States)","publisher-place":"United States","title":"Beam mode core-barrel vibrations in the PWRs Ringhals 2-4","type":"paper-conference"},{"id":"pazsitDevelopmentsCoreBarrelMotion2017","abstract":"Core-barrel motion (CBM) surveillance and diagnostics, based on the amplitude of the peaks of the normalized auto power spectral densities (APSDs) of the ex-core neutron detectors, have been performed and continuously developed in Sweden and were applied for monitoring of the three PWR units, Ringhals 2 to 4. From 2005, multiple measurements were taken during each fuel cycle, and these revealed a periodic behavior of the 8-Hz peak of the beam-mode motion: the amplitude increases within the cycle and returns to a lower value at the beginning of the next cycle. The work reported in this paper aims to clarify the physical reason for this behavior. A combination of a mode separation method in the time domain and a nonlinear curve-fitting procedure of the frequency spectra revealed that two types of vibration phenomena contribute to the beam-mode peak. The lower frequency peak around 7 Hz in the ex-core detector APSDs corresponds to the CBM, whose amplitude does not change during the cycle. The higher frequency peak around 8 Hz arises from the individual vibrations of the fuel assemblies, and its amplitude increases monotonically during the cycle. This paper gives an account of the work that has been made to verify the above hypothesis.","author":[{"family":"Pázsit","given":"Imre"},{"family":"Montalvo","given":"Cristina"},{"family":"Nylén","given":"Henrik"},{"family":"Andersson","given":"Tell"},{"family":"Hernández-Solís","given":"Augusto"},{"family":"Cartemo","given":"Petty Bernitt"}],"citation-key":"pazsitDevelopmentsCoreBarrelMotion2017","container-title":"Nuclear Science and Engineering","DOI":"10.13182/nse15-14","ISSN":"0029-5639 1943-748X","issue":"2","issued":{"date-parts":[["2017"]]},"page":"213-227","section":"213","title":"Developments in Core-Barrel Motion Monitoring and Applications to the Ringhals PWR Units","type":"article-journal","URL":"https://www.tandfonline.com/doi/abs/10.13182/NSE15-14","volume":"182"},{"id":"pazsitDevelopmentsCorebarrelVibration1998","abstract":"Diagnostics of core-barrel motion, and notably that of beam mode vibrations, has been usually performed by two distinct concepts. One strategy is to perform a qualitative analysis in the time domain, using descriptors such as vibration trajectory, probability distributions etc. This approach is rather realistic in the sense that it allows for general anisotropic pendular vibrations. The other strategy is to use frequency analysis with the goal of quantifying certain vibration properties. However, this second approach could so far handle only isotropic and unidirectional vibrations. In this paper we propose a unification of these two approaches by introducing a model by which general anisotropic vibrations can be quantified in the frequency domain. However, when separating the noise components prior to the frequency analysis, we suggest the use of symmetry properties of the noise in the time domain, based on reactor physics assumptions, as opposed to the earlier methods that use statistical independence of the components. Due to the unified approach, a combination of time and frequency domain analysis methods can be used for presentation and maximum information extraction.","author":[{"family":"Pázsit","given":"I."},{"family":"Karlsson","given":"J."},{"family":"Garis","given":"N. S."}],"citation-key":"pazsitDevelopmentsCorebarrelVibration1998","container-title":"Annals of Nuclear Energy","DOI":"10.1016/s0306-4549(98)00012-7","ISSN":"03064549","issue":"13","issued":{"date-parts":[["1998"]]},"page":"1079-1093","section":"1079","title":"Some developments in core-barrel vibration diagnostics","type":"article-journal","volume":"25"},{"id":"pazsitDiagnosticsSurveillanceMethods2004","abstract":"This paper reviews some process signal analysis and representation methods that can be used during reactor operation such that they are suitable for real-time applicatons. All listed methods have been tested on data from operating plant. The objective is to detect and interpret changes in the plant or core status at an early stage, such that appropriate measures can be taken immediately. The methods that are discussed and demonstrated in the paper can be divided into two categories. The first is the use of fast and intelligent computing methods such as neural networks and fast wavelet transform, in combination with a diagnostic unfolding procedure which would be computationally rather demanding with traditional methods. The second type is based on direct representation of the system state through visualization of large complex data, showing the space–time behavior of the system. This latter is not associated with any unfolding procedure, it uses only a moderate signal preprocessing for filtering out redundant information, but otherwise showing the process status directly. Such methods have been made possible with the development of powerful computer visualization techniques. The potentials represented by this second alternative do not seem to have been explored fully yet in reactor diagnostics. Methods corresponding to both categories will be demonstrated and discussed in the paper.","author":[{"family":"Pázsit","given":"I."}],"citation-key":"pazsitDiagnosticsSurveillanceMethods2004","container-title":"Real-Time Systems","DOI":"10.1023/B:TIME.0000019129.88316.c7","ISSN":"0922-6443","issue":"1","issued":{"date-parts":[["2004"]]},"page":"97-113","section":"97","title":"Diagnostics and Surveillance Methods in Nuclear Systems for Real-Time Applications","type":"article-journal","URL":"https://link.springer.com/content/pdf/10.1023/B:TIME.0000019129.88316.c7.pdf","volume":"27"},{"id":"pazsitNeutronNoiseDiagnostics2017","abstract":"A neutron noise-based technique for the localization of excessively vibrating control rods is elaborated upon in the previous three papers of this series. The method is based on the inversion of a formula that expresses the auto- and cross spectra of three neutron detector signals through the parameters of the vibrating rod, i.e., equilibrium position and displacement components. Successful tests of the algorithm with both simulated and real data were reported in the previous papers. The algorithm had nevertheless certain drawbacks, namely, that its use requires expert knowledge, the redundancy of extra detectors cannot be utilized, and with realistic transfer functions the calculations are rather lengthy. The use of neural networks offers an alternative way of performing the inversion procedure. This possibility was investigated by constructing a network that was trained to determine the rod position from the detector spectra. It was found that all shortcomings of the traditional localization method can be eliminated. The neural network-based identification was also tested with success.","author":[{"family":"Pázsit","given":"I."},{"family":"Garis","given":"N. S."},{"family":"Glöckler","given":"O."}],"citation-key":"pazsitNeutronNoiseDiagnostics2017","container-title":"Nuclear Science and Engineering","DOI":"10.13182/nse96-a24232","ISSN":"0029-5639 1943-748X","issue":"1","issued":{"date-parts":[["2017"]]},"page":"167-177","section":"167","title":"On the Neutron Noise Diagnostics of Pressurized Water Reactor Control Rod Vibrations —IV: Application of Neural Networks","type":"article-journal","URL":"https://www.tandfonline.com/doi/abs/10.13182/NSE96-A24232","volume":"124"},{"id":"pazsitNeutronNoiseDiagnostics2017a","abstract":"In an earlier publication, using the theory of neutron fluctuations induced by a vibrating control rod, a complete formal solution of rod vibration diagnostics based on neutron noise measurements was given in terms of Fourier-transformed neutron detector time signals. The suggested procedure was checked in numerical simulation tests where only periodic vibrations could be considered. The procedure and its numerical testing are elaborated for stochastic two-dimensional vibrations. A simple stochastic theory of two-dimensional flow-induced vibrations is given; then the diagnostic method is formulated in the stochastic case, that is, in terms of neutron detector auto- and cross-power spectra. A previously suggested approximate rod localization technique is also formulated in the stochastic case. Applicability of the methods is then investigated in numerical simulation tests, using the proposed model of stochastic two-dimensional vibrations when generating neutron detector spectra that simulate measured data.","author":[{"family":"Pázsit","given":"I."},{"family":"Glöckler","given":"O."}],"citation-key":"pazsitNeutronNoiseDiagnostics2017a","container-title":"Nuclear Science and Engineering","DOI":"10.13182/nse84-4","ISSN":"0029-5639 1943-748X","issue":"1","issued":{"date-parts":[["2017"]]},"page":"77-87","section":"77","title":"On the Neutron Noise Diagnostics of Pressurized Water Reactor Control Rod Vibrations II. Stochastic Vibrations","type":"article-journal","URL":"https://www.tandfonline.com/doi/abs/10.13182/NSE84-4","volume":"88"},{"id":"pazsitNeutronNoiseDiagnostics2017b","abstract":"In the first two papers of this series, a complete algorithm was elaborated and tested for the diagnostics of vibrating control rods in pressurized water reactors (PWRs). Although the method was thoroughly tested in numerical experiments where even the effects of background noise were accounted for, the influence of the several approximations regarding the underlying neutron physical and mechanical model of the applicability of the method in real applications could not be properly estimated. In August 1985, in-core self-powered neutron detector spectra taken at Paks-2, a PWR in Hungary, indicated the presence of an excessively vibrating control rod. With these measured noise data as input, the previously reported localization algorithm was applied in its original form. The algorithm singled out one control rod out of the possible seven, and independent investigations performed before and during the subsequent refueling showed the correctness of the localization results. It is therefore concluded that, at least in this particular application, the approximations used in the model were allowable in a case of practical interest. The algorithm was developed further to facilitate the automatization and reliability of the localization procedure. These developments and the experiences in the application of the algorithm are reported in this paper.","author":[{"family":"Pázsit","given":"I."},{"family":"Glöckler","given":"O."}],"citation-key":"pazsitNeutronNoiseDiagnostics2017b","container-title":"Nuclear Science and Engineering","DOI":"10.13182/nse88-a23561","ISSN":"0029-5639 1943-748X","issue":"4","issued":{"date-parts":[["2017"]]},"page":"313-328","section":"313","title":"On the Neutron Noise Diagnostics of Pressurized Water Reactor Control Rod Vibrations. III. Application at a Power Plant","type":"article-journal","URL":"https://www.tandfonline.com/doi/abs/10.13182/NSE88-A23561","volume":"99"},{"id":"pazsitNeutronNoiseDiagnostics2017c","abstract":"Based on the theory of neutron noise arising from the vibration of a localized absorber, the possibility of rod vibration diagnostics is investigated. It is found that noise source characteristics, namely rod position and vibration trajectory and spectra, can be unfolded from measured neutron noise signals. For the localization process, the first and more difficult part of the diagnostics, a procedure is suggested whose novelty is that it is applicable in case of arbitrary vibration trajectories. Applicability of the method is investigated in numerical experiments where effects of background noise are also accounted for.","author":[{"family":"Pázsit","given":"I."},{"family":"Glöckler","given":"O."}],"citation-key":"pazsitNeutronNoiseDiagnostics2017c","container-title":"Nuclear Science and Engineering","DOI":"10.13182/nse83-a27424","ISSN":"0029-5639 1943-748X","issue":"2","issued":{"date-parts":[["2017"]]},"page":"167-177","section":"167","title":"On the Neutron Noise Diagnostics of Pressurized Water Reactor Control Rod Vibrations. I. Periodic Vibrations","type":"article-journal","URL":"https://www.tandfonline.com/doi/abs/10.13182/NSE83-A27424","volume":"85"},{"id":"pazsitNoiseTechniquesNuclear2010","abstract":"This chapter deals with neutron fluctuations in nuclear systems. Such neutron fluctuations, or neutron noise, fall into two categories: neutron noise in zero power systems and neutron noise in power reactors. The concepts, the theory, and the methodology of these fluctuations as well as their various applications for extracting information in a nonintrusive way about the system in question are described. A number of specific applications are described, where detection and analysis of zero power and power reactor noise make it possible to extract diagnostic information about the system by determining some parameters of the system during normal operation, or by detecting, identifying, and quantifying developing anomalies at an early stage and determining their severity. This chapter ends with an outline of future developments and actual issues in the field.","author":[{"family":"Pázsit","given":"Imre"},{"family":"Demazière","given":"Christophe"}],"citation-key":"pazsitNoiseTechniquesNuclear2010","container-title":"Handbook of Nuclear Engineering","DOI":"10.1007/978-0-387-98149-9_14","event-place":"Boston, MA","ISBN":"978-0-387-98130-7 978-0-387-98149-9","issued":{"date-parts":[["2010"]]},"page":"1629-1737","publisher":"Springer US","publisher-place":"Boston, MA","section":"Chapter 14","title":"Noise Techniques in Nuclear Systems","type":"chapter","URL":"https://link.springer.com/referenceworkentry/10.1007/978-0-387-98149-9_14"},{"id":"pazsitREFINEDMETHODSURVEILLANCE2014","abstract":"Surveillance and diagnostics of core barrel vibrations has been performed in the Swedish Ringhals PWRs for several years, with main focus on the pendular motion (beam mode). The monitoring of the beam mode showed that the amplitude of the corresponding peak in the ex-core neutron spectra increases along the cycle, and decreases after refueling. Previous investigations on the reason of this behaviour, i.e. whether it is due to the increase of the core barrel vibration amplitude or to the increase of the neutron physics coupling between vibrations and neutron noise, were not decisive. The objective of the work reported here is to clarify this question. From frequency analysis, two modes of vibration have been identi-fied in the frequency range of the beam mode. Several results coming from the trend analysis performed during recent years indicate that one of the modes is due to the core barrel motion itself and remains constant during cycle, and the other is due to the indi-vidual flow induced vibrations of the fuel elements, showing an increasing trend during the cycle. In this work, the method to separate the contributions from the two modes has been refined, and the results of this approach to the latest measurements are presented. The results confirm the origin of the two vibration modes and show constant amplitude of the core barrel motion throughout the cycle.","author":[{"family":"Pazsit","given":"Imre"},{"family":"Nylén","given":"Henrik"},{"family":"Montalvo Martín","given":"Cristina"}],"citation-key":"pazsitREFINEDMETHODSURVEILLANCE2014","issued":{"date-parts":[["2014"]]},"title":"REFINED METHOD FOR SURVEILLANCE AND DIAGNOSTICS OF THE CORE BARREL VIBRATIONS OF THE RINGHALS PWRs","type":"article-journal"},{"id":"pdfpages","abstract":"This package simplifies the insertion of external multi-page PDF or PS documents. It supports pdfTeX, VTeX, and XeTeX.","author":[{"family":"Matthias","given":"Andreas"}],"citation-key":"pdfpages","language":"en","page":"12","source":"Zotero","title":"pdfpages Package","type":"article-journal"},{"id":"peetModernControlSystems","author":[{"family":"Peet","given":"Matthew"}],"citation-key":"peetModernControlSystems","title":"Modern Control Systems: Small Gain Theorem","type":"speech","URL":"https://control.asu.edu/Classes/MMAE543/543Lecture15.pdf"},{"id":"peisertSoftwareInfrastructureDevelop2023","accessed":{"date-parts":[["2023",12,19]]},"author":[{"family":"Peisert","given":"Sean"}],"citation-key":"peisertSoftwareInfrastructureDevelop2023","container-title":"IEEE Security & Privacy","container-title-short":"IEEE Secur. Privacy","DOI":"10.1109/MSEC.2023.3273492","ISSN":"1540-7993, 1558-4046","issue":"4","issued":{"date-parts":[["2023",7]]},"language":"en","page":"4-8","source":"DOI.org (Crossref)","title":"On Software Infrastructure: Develop, Prove, Profit?","title-short":"On Software Infrastructure","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/10194513/","volume":"21"},{"id":"peisertSoftwareInfrastructureDevelop2023a","abstract":"Having infrastructure survive over very long stretches of time is a nontrivial task. This is either because such infrastructure needs to be built extremely well from the outset or because it requires ongoing maintenance. The former may require prohibitively large initial investments. The latter requires ongoing investment from public agencies over the span of decades or centuries despite the pendulum swings of those governments from contrasting political aims. Without either the very high initial or ongoing investment, infrastructure can fail. Physical infrastructure failure is not inevitable—consider railways in Japan, the Panama Canal, and the U.S. Interstate Highway System.","accessed":{"date-parts":[["2023",10,25]]},"author":[{"family":"Peisert","given":"Sean"}],"citation-key":"peisertSoftwareInfrastructureDevelop2023a","container-title":"IEEE Security & Privacy","DOI":"10.1109/MSEC.2023.3273492","ISSN":"1558-4046","issue":"4","issued":{"date-parts":[["2023",7]]},"page":"4-8","source":"IEEE Xplore","title":"On Software Infrastructure: Develop, Prove, Profit?","title-short":"On Software Infrastructure","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/10194513","volume":"21"},{"id":"peletiesAsymptoticStabilityMSwitched1991","accessed":{"date-parts":[["2024",3,4]]},"author":[{"family":"Peleties","given":"Philippos"},{"family":"DeCarlo","given":"Raymond"}],"citation-key":"peletiesAsymptoticStabilityMSwitched1991","container-title":"1991 American Control Conference","DOI":"10.23919/ACC.1991.4791667","event-place":"Boston, MA, USA","event-title":"1991 American Control Conference","ISBN":"978-0-87942-565-4","issued":{"date-parts":[["1991",6]]},"page":"1679-1684","publisher":"IEEE","publisher-place":"Boston, MA, USA","source":"DOI.org (Crossref)","title":"Asymptotic Stability of m-Switched Systems using Lyapunov-Like Functions","type":"paper-conference","URL":"https://ieeexplore.ieee.org/document/4791667/"},{"id":"perez-cruzGaussianProcessesNonlinear2013","accessed":{"date-parts":[["2022",4,21]]},"author":[{"family":"Perez-Cruz","given":"Fernando"},{"family":"Van Vaerenbergh","given":"Steven"},{"family":"Murillo-Fuentes","given":"Juan Jose"},{"family":"Lazaro-Gredilla","given":"Miguel"},{"family":"Santamaria","given":"Ignacio"}],"citation-key":"perez-cruzGaussianProcessesNonlinear2013","container-title":"IEEE Signal Processing Magazine","container-title-short":"IEEE Signal Process. Mag.","DOI":"10.1109/MSP.2013.2250352","ISSN":"1053-5888","issue":"4","issued":{"date-parts":[["2013",7]]},"language":"en","page":"40-50","source":"DOI.org (Crossref)","title":"Gaussian Processes for Nonlinear Signal Processing: An Overview of Recent Advances","title-short":"Gaussian Processes for Nonlinear Signal Processing","type":"article-journal","URL":"http://ieeexplore.ieee.org/document/6530761/","volume":"30"},{"id":"petersenWorkforceFrameworkCybersecurity2020","abstract":"This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Knowledge and Skill statements that provide a foundation for learners including students, job seekers, and employees. The use of these statements helps students to develop skills, job seekers to demonstrate competencies, and employees to accomplish tasks. As a common, consistent lexicon that categorizes and describes cybersecurity work, the NICE Framework improves communication about how to identify, recruit, develop, and retain cybersecurity talent. The NICE Framework is a reference source from which organizations or sectors can develop additional publications or tools that meet their needs to define or provide guidance on different aspects of cybersecurity education, training, and workforce...","accessed":{"date-parts":[["2023",11,7]]},"author":[{"family":"Petersen","given":"Rodney"},{"family":"Santos","given":"Danielle"},{"family":"Wetzel","given":"Karen"},{"family":"Smith","given":"Matthew"},{"family":"Witte","given":"Gregory"}],"citation-key":"petersenWorkforceFrameworkCybersecurity2020","DOI":"10.6028/NIST.SP.800-181r1","issued":{"date-parts":[["2020",11,16]]},"language":"en","number":"NIST Special Publication (SP) 800-181 Rev. 1","publisher":"National Institute of Standards and Technology","source":"csrc.nist.gov","title":"Workforce Framework for Cybersecurity (NICE Framework)","type":"report","URL":"https://csrc.nist.gov/pubs/sp/800/181/r1/final"},{"id":"petersonOverviewMethodologiesCybersecurity2019","abstract":"Cyber-attacks against critical energy infrastructure have gone from possible to eventual to actual. With electrical generation sources in the United States changing under a wide range of pressures, the current fleet of nuclear power plants in the United States provides a reliable and sustainable source of electrical generation capacity. However, in order to extend the lifetime of the fleet, modernization upgrades to digital instrumentation and control systems are required. While this produces many opportunities for increased efficiency, it introduces a new level of complexity for securing and reliably operating reactors in the presence cyberthreats. The United States Nuclear Regulatory Commission recently began urging stronger cybersecurity efforts at nuclear power plants. As upgrades at nuclear power plants begin, the implementation of digital instrumentation and control systems to monitor and run the power plant introduces new vulnerabilities that must be addressed. This necessitates a more modern discussion of risk. Within this context, we critically review past cyber-vulnerability incidents at nuclear installations and other critical facilities. We then analyze challenges to vulnerabilities within the context of modernization of the current nuclear fleet and propose future research directions needed to resolve these issues.","accessed":{"date-parts":[["2022",9,30]]},"author":[{"family":"Peterson","given":"John"},{"family":"Haney","given":"Michael"},{"family":"Borrelli","given":"R.A."}],"citation-key":"petersonOverviewMethodologiesCybersecurity2019","container-title":"Nuclear Engineering and Design","container-title-short":"Nuclear Engineering and Design","DOI":"10.1016/j.nucengdes.2019.02.025","ISSN":"00295493","issued":{"date-parts":[["2019",5]]},"language":"en","page":"75-84","source":"DOI.org (Crossref)","title":"An overview of methodologies for cybersecurity vulnerability assessments conducted in nuclear power plants","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S0029549319300330","volume":"346"},{"id":"petterssonStabilityRobustnessHybrid1996","accessed":{"date-parts":[["2024",3,4]]},"author":[{"family":"Pettersson","given":"S."},{"family":"Lennartson","given":"B."}],"citation-key":"petterssonStabilityRobustnessHybrid1996","container-title":"Proceedings of 35th IEEE Conference on Decision and Control","DOI":"10.1109/CDC.1996.572653","event-place":"Kobe, Japan","event-title":"35th IEEE Conference on Decision and Control","ISBN":"978-0-7803-3590-5","issued":{"date-parts":[["1996"]]},"page":"1202-1207","publisher":"IEEE","publisher-place":"Kobe, Japan","source":"DOI.org (Crossref)","title":"Stability and robustness for hybrid systems","type":"paper-conference","URL":"http://ieeexplore.ieee.org/document/572653/","volume":"2"},{"id":"pichlerEntropyBasedRisk2020","accessed":{"date-parts":[["2024",1,26]]},"author":[{"family":"Pichler","given":"Alois"},{"family":"Schlotter","given":"Ruben"}],"citation-key":"pichlerEntropyBasedRisk2020","container-title":"European Journal of Operational Research","container-title-short":"European Journal of Operational Research","DOI":"10.1016/j.ejor.2019.01.016","ISSN":"03772217","issue":"1","issued":{"date-parts":[["2020",8]]},"language":"en","page":"223-236","source":"DOI.org (Crossref)","title":"Entropy based risk measures","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S0377221719300189","volume":"285"},{"id":"picinbonoSecondorderComplexRandom1996","abstract":"We formulate as a deconvolution problem the causalhoncausal non-Gaussian multichannel autoregressive (AR) parameter estimation problem. The super exponential aljporithm presented in a recent paper by Shalvi and Weinstein is generalized to the vector case. We present an adaptive implementation that is very attractive since it is higher order statistics (HOS) based b u t does not present the high comlputational complexity of methods proposed up to now.","accessed":{"date-parts":[["2022",4,21]]},"author":[{"family":"Picinbono","given":"B."}],"citation-key":"picinbonoSecondorderComplexRandom1996","container-title":"IEEE Transactions on Signal Processing","container-title-short":"IEEE Trans. Signal Process.","DOI":"10.1109/78.539051","ISSN":"1053587X","issue":"10","issued":{"literal":"Oct./1996"},"language":"en","page":"2637-2640","source":"DOI.org (Crossref)","title":"Second-order complex random vectors and normal distributions","type":"article-journal","URL":"http://ieeexplore.ieee.org/document/539051/","volume":"44"},{"id":"PicturingQuantumProcesses","accessed":{"date-parts":[["2023",12,12]]},"citation-key":"PicturingQuantumProcesses","container-title":"Cambridge University Press","language":"en","title":"Picturing Quantum Processes | Quantum physics, quantum information and quantum computation","type":"webpage","URL":"https://www.cambridge.org/us/academic/subjects/physics/quantum-physics-quantum-information-and-quantum-computation/picturing-quantum-processes-first-course-quantum-theory-and-diagrammatic-reasoning, https://www.cambridge.org/us/academic/subjects/physics/quantum-physics-quantum-information-and-quantum-computation"},{"id":"pillitteriGuidelinesSmartGrid2014","abstract":"This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurit","accessed":{"date-parts":[["2022",3,22]]},"author":[{"family":"Pillitteri","given":"Victoria Y."},{"family":"Brewer","given":"Tanya L."}],"citation-key":"pillitteriGuidelinesSmartGrid2014","issued":{"date-parts":[["2014",9,25]]},"language":"en","note":"Last Modified: 2018-11-10T10:11-05:00","source":"www.nist.gov","title":"Guidelines for Smart Grid Cybersecurity","type":"article-journal","URL":"https://www.nist.gov/publications/guidelines-smart-grid-cybersecurity"},{"id":"PJM-map","author":[{"literal":"PJM Corp."}],"citation-key":"PJM-map","issued":{"literal":"Date accessed 11/2021"},"type":"document","URL":"https://www.pjm.com/library/~/media/about-pjm/pjm-zones.ashx"},{"id":"platzerDifferentialDynamicLogic2008","abstract":"Hybrid systems are models for complex physical systems and are defined as dynamical systems with interacting discrete transitions and continuous evolutions along differential equations. With the goal of developing a theoretical and practical foundation for deductive verification of hybrid systems, we introduce a dynamic logic for hybrid programs, which is a program notation for hybrid systems. As a verification technique that is suitable for automation, we introduce a free variable proof calculus with a novel combination of real-valued free variables and Skolemisation for lifting quantifier elimination for real arithmetic to dynamic logic. The calculus is compositional, i.e., it reduces properties of hybrid programs to properties of their parts. Our main result proves that this calculus axiomatises the transition behaviour of hybrid systems completely relative to differential equations. In a case study with cooperating traffic agents of the European Train Control System, we further show that our calculus is well-suited for verifying realistic hybrid systems with parametric system dynamics.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Platzer","given":"André"}],"citation-key":"platzerDifferentialDynamicLogic2008","container-title":"Journal of Automated Reasoning","container-title-short":"J Autom Reasoning","DOI":"10.1007/s10817-008-9103-8","ISSN":"0168-7433, 1573-0670","issue":"2","issued":{"date-parts":[["2008",8]]},"language":"en","page":"143-189","source":"DOI.org (Crossref)","title":"Differential Dynamic Logic for Hybrid Systems","type":"article-journal","URL":"https://link.springer.com/10.1007/s10817-008-9103-8","volume":"41"},{"id":"platzerKeYmaeraHybridTheorem2008","abstract":"KeYmaera is a hybrid verification tool for hybrid systems that combines deductive, real algebraic, and computer algebraic prover technologies. It is an automated and interactive theorem prover for a natural specification and verification logic for hybrid systems. KeYmaera supports differential dynamic logic, which is a real-valued first-order dynamic logic for hybrid programs, a program notation for hybrid automata. For automating the verification process, KeYmaera implements a generalized free-variable sequent calculus and automatic proof strategies that decompose the hybrid system specification symbolically. To overcome the complexity of real arithmetic, we integrate real quantifier elimination following an iterative background closure strategy. Our tool is particularly suitable for verifying parametric hybrid systems and has been used successfully for verifying collision avoidance in case studies from train control and air traffic management.","author":[{"family":"Platzer","given":"André"},{"family":"Quesel","given":"Jan-David"}],"citation-key":"platzerKeYmaeraHybridTheorem2008","container-title":"Automated Reasoning","DOI":"10.1007/978-3-540-71070-7_15","editor":[{"family":"Armando","given":"Alessandro"},{"family":"Baumgartner","given":"Peter"},{"family":"Dowek","given":"Gilles"}],"event-place":"Berlin, Heidelberg","ISBN":"978-3-540-71070-7","issued":{"date-parts":[["2008"]]},"language":"en","page":"171-178","publisher":"Springer","publisher-place":"Berlin, Heidelberg","source":"Springer Link","title":"KeYmaera: A Hybrid Theorem Prover for Hybrid Systems (System Description)","title-short":"KeYmaera","type":"paper-conference"},{"id":"platzerLogicalFoundationsCyberPhysical2018","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Platzer","given":"André"}],"citation-key":"platzerLogicalFoundationsCyberPhysical2018","DOI":"10.1007/978-3-319-63588-0","event-place":"Cham","ISBN":"978-3-319-63587-3 978-3-319-63588-0","issued":{"date-parts":[["2018"]]},"language":"en","publisher":"Springer International Publishing","publisher-place":"Cham","source":"DOI.org (Crossref)","title":"Logical Foundations of Cyber-Physical Systems","type":"book","URL":"http://link.springer.com/10.1007/978-3-319-63588-0"},{"id":"pliatsiosSurveySCADASystems2020","abstract":"Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication, transportation, pipelines, chemicals and manufacturing plants. Legacy SCADA systems operated on isolated networks, that made them less exposed to Internet threats. However, the increasing connection of SCADA systems to the Internet, as well as corporate networks, introduces severe security issues. Security considerations for SCADA systems are gaining higher attention, as the number of security incidents against these critical infrastructures is increasing. In this survey, we provide an overview of the general SCADA architecture, along with a detailed description of the SCADA communication protocols. Additionally, we discuss certain high-impact security incidents, objectives, and threats. Furthermore, we carry out an extensive review of the security proposals and tactics that aim to secure SCADA systems. We also discuss the state of SCADA system security. Finally, we present the current research trends and future advancements of SCADA security.","accessed":{"date-parts":[["2022",9,30]]},"author":[{"family":"Pliatsios","given":"Dimitrios"},{"family":"Sarigiannidis","given":"Panagiotis"},{"family":"Lagkas","given":"Thomas"},{"family":"Sarigiannidis","given":"Antonios G."}],"citation-key":"pliatsiosSurveySCADASystems2020","container-title":"IEEE Communications Surveys & Tutorials","container-title-short":"IEEE Commun. Surv. Tutorials","DOI":"10.1109/COMST.2020.2987688","ISSN":"1553-877X, 2373-745X","issue":"3","issued":{"season":3,"date-parts":[[2020]]},"language":"en","page":"1942-1976","source":"DOI.org (Crossref)","title":"A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics","title-short":"A Survey on SCADA Systems","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/9066892/","volume":"22"},{"id":"podelskiModelCheckingHybrid2006","abstract":"We call a hybrid system stable if every trajectory inevitably ends up in a given region. Our notion of stability deviates from classical definitions in control theory. In this paper, we present a model checking algorithm for stability in the new sense. The idea of the algorithm is to reduce the stability proof for the whole system to a set of (smaller) proofs for several one-mode systems.","author":[{"family":"Podelski","given":"Andreas"},{"family":"Wagner","given":"Silke"}],"citation-key":"podelskiModelCheckingHybrid2006","collection-title":"Lecture Notes in Computer Science","container-title":"Hybrid Systems: Computation and Control","DOI":"10.1007/11730637_38","editor":[{"family":"Hespanha","given":"João P."},{"family":"Tiwari","given":"Ashish"}],"event-place":"Berlin, Heidelberg","ISBN":"978-3-540-33171-1","issued":{"date-parts":[["2006"]]},"language":"en","page":"507-521","publisher":"Springer","publisher-place":"Berlin, Heidelberg","source":"Springer Link","title":"Model Checking of Hybrid Systems: From Reachability Towards Stability","title-short":"Model Checking of Hybrid Systems","type":"paper-conference"},{"id":"polaControlCyberPhysicalSystemsLogic2019","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Pola","given":"Giordano"},{"family":"Di Benedetto","given":"Maria Domenica"}],"citation-key":"polaControlCyberPhysicalSystemsLogic2019","container-title":"Annual Reviews in Control","container-title-short":"Annual Reviews in Control","DOI":"10.1016/j.arcontrol.2019.03.010","ISSN":"13675788","issued":{"date-parts":[["2019"]]},"language":"en","page":"178-192","source":"DOI.org (Crossref)","title":"Control of Cyber-Physical-Systems with logic specifications: A formal methods approach","title-short":"Control of Cyber-Physical-Systems with logic specifications","type":"article-journal","URL":"https://linkinghub.elsevier.com/retrieve/pii/S1367578818302153","volume":"47"},{"id":"pollackHowBelieveMachineChecked1997","author":[{"family":"Pollack","given":"Robert"}],"citation-key":"pollackHowBelieveMachineChecked1997","issued":{"date-parts":[["1997"]]},"title":"How to Believe a Machine-Checked Proof","type":"article-journal"},{"id":"poloniQuadraticVectorEquations2013","abstract":"We study in a unified fashion several quadratic vector and matrix equations with nonnegativity hypotheses, by seeing them as special cases of the general problem M x = a + b(x, x), where a and the unknown x are componentwise nonnegative vectors, M is a nonsingular M-matrix, and b is a bilinear map from pairs of nonnegative vectors to nonnegative vectors. Specific cases of this equation have been studied extensively in the past by several authors, and include unilateral matrix equations from queuing problems [Bini, Latouche, Meini, 2005], nonsymmetric algebraic Riccati equations [Guo, Laub, 2000], and quadratic matrix equations encountered in neutron transport theory [Lu, 2005]. We present a unified approach which treats the common aspects of their theoretical properties and basic iterative solution algorithms. This has interesting consequences: in some cases, we are able to derive in full generality theorems and proofs appeared in literature only for special cases of the problem; this broader view highlights the role of hypotheses such as the strict positivity of the minimal solution. In an example, we adapt an algorithm derived for one equation of the class to another, with computational advantage with respect to the existing methods. We discuss possible research lines, including the relationship among Newton-type methods and the cyclic reduction algorithm for unilateral quadratic equations.","accessed":{"date-parts":[["2022",4,21]]},"author":[{"family":"Poloni","given":"Federico"}],"citation-key":"poloniQuadraticVectorEquations2013","container-title":"Linear Algebra and its Applications","container-title-short":"Linear Algebra and its Applications","DOI":"10.1016/j.laa.2011.05.036","ISSN":"00243795","issue":"4","issued":{"date-parts":[["2013",2]]},"language":"en","page":"1627-1644","source":"arXiv.org","title":"Quadratic Vector Equations","type":"article-journal","URL":"http://arxiv.org/abs/1004.1500","volume":"438"},{"id":"poluGenerativeLanguageModeling2020","abstract":"We explore the application of transformer-based language models to automated theorem proving. This work is motivated by the possibility that a major limitation of automated theorem provers compared to humans -- the generation of original mathematical terms -- might be addressable via generation from language models. We present an automated prover and proof assistant, GPT-f, for the Metamath formalization language, and analyze its performance. GPT-f found new short proofs that were accepted into the main Metamath library, which is to our knowledge, the first time a deep-learning based system has contributed proofs that were adopted by a formal mathematics community.","accessed":{"date-parts":[["2024",3,7]]},"author":[{"family":"Polu","given":"Stanislas"},{"family":"Sutskever","given":"Ilya"}],"citation-key":"poluGenerativeLanguageModeling2020","DOI":"10.48550/arXiv.2009.03393","issued":{"date-parts":[["2020",9,7]]},"number":"arXiv:2009.03393","publisher":"arXiv","source":"arXiv.org","title":"Generative Language Modeling for Automated Theorem Proving","type":"article","URL":"http://arxiv.org/abs/2009.03393"},{"id":"poreskyCyberSecurityNuclear","author":[{"family":"Poresky","given":"Christopher"},{"family":"Andreades","given":"Charalampos"},{"family":"Kendrick","given":"James"},{"family":"Peterson","given":"Per"}],"citation-key":"poreskyCyberSecurityNuclear","language":"en","page":"15","source":"Zotero","title":"Cyber Security in Nuclear Power Plants","type":"article-journal"},{"id":"porReactorNoiseAnalysis1998","abstract":"This paper presents an introduction on different types of well selected noise diagnostic methods with their occurrence in WWER reactors with an analysis of their impact on operational safety and aging which affects the installations safety as well The main objective is to attract the attention of NPP management staff dealing with safety, safety culture, maintenance, operation and quality assurance proving that such methods can give benefit not only to economy but impact safety of nuclear installations","author":[{"family":"Por","given":"G."}],"citation-key":"porReactorNoiseAnalysis1998","event-place":"International Atomic Energy Agency (IAEA)","event-title":"On-line testing of nuclear plant temperature and pressure instrumentation and other critical plant equipment IAEA regional workshop Working material","issued":{"date-parts":[["1998"]]},"page":"609","publisher":"IAEA","publisher-place":"International Atomic Energy Agency (IAEA)","title":"Reactor noise analysis applications and systems in WWER-440 and WWER-1000 type PWRs","type":"paper-conference","URL":"http://inis.iaea.org/search/search.aspx?orig_q=RN:30002930"},{"id":"poschmannExperienceFormalMethods1997","abstract":"This paper presents our experience using the formal description technique Estelle for the protocol development cycle in the area of real-time industrial communication systems. A s a real world application the PROFIBUS parts FMS and DP of the European fieldbus standard were completely implemented using formal models. These implementations are successfully used in industrial applications and embedded systems. Our development method, results, and experiences during the development process are discussed in the paper. A closed, tool based method is the overall aim concerning the development life cycle to support the requirement definition as well as the implementation of the product code with final testing, To meet these needs, our approach defines some assumptions and constraints using the syntactic and semantic model of the specif cation language Estelle, aspects of the modelling process concerning the architecture, handling data abstraction and encapsulation of the specification language vs. real-time data pow in the product code implementation, synchronous vs. asynchronous communications to local intefaces (e.g. physical layer or partly data link layer ASIC) and dealing with special local events like timeoutsr and interrupts in the specification and in the real-time execution environment. The paper discusses advantages and also critical points using the formal way of the protocol development cycle. In theory, it is quite clear that formal description techniques enhance quality. Therefore, we discuss this approach under the user’s point of view.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Poschmann","given":"A."},{"family":"Hahniche","given":"J."},{"family":"Deicke","given":"P."},{"family":"Neumann","given":"P."}],"citation-key":"poschmannExperienceFormalMethods1997","container-title":"Proceedings 1997 IEEE International Workshop on Factory Communication Systems. WFCS'97","DOI":"10.1109/WFCS.1997.634310","event-place":"Barcelona, Spain","event-title":"1997 IEEE International Workshop on Factory Communication Systems. WFCS'97","ISBN":"978-0-7803-4182-1","issued":{"date-parts":[["1997"]]},"language":"en","page":"277-286","publisher":"IEEE","publisher-place":"Barcelona, Spain","source":"DOI.org (Crossref)","title":"Experience with formal methods implementing the PROFIBUS FMS and DP protocol for industrial applications","type":"paper-conference","URL":"http://ieeexplore.ieee.org/document/634310/"},{"id":"powellOPTIMIZINGSIMULATORMERGINGSIMULATION","abstract":"There has long been a competition between simulation and optimization in the modeling of problems in transportation and logistics, machine scheduling and similar highdimensional problems in operations research. Simulation strives to model operations, often using rule-based logic. Optimization strives to find the best possible solution, minimizing costs or maximizing profits. In this tutorial, we show how these two modeling technologies can be brought together, combining the flexibility of simulation with the intelligence of optimization.","author":[{"family":"Powell","given":"Warren B"}],"citation-key":"powellOPTIMIZINGSIMULATORMERGINGSIMULATION","language":"en","source":"Zotero","title":"THE OPTIMIZING-SIMULATOR: MERGING SIMULATION AND OPTIMIZATION USING APPROXIMATE DYNAMIC PROGRAMMING","type":"article-journal"},{"id":"prestlBMWActiveCruise2000","abstract":"With series introduction of Adaptive Cruise Control (ACC) systems, automotive industry at present makes a step towards a new category of vehicle control systems. For the first time in automotive history these systems make use of information about the surrounding traffic situation. This information i","accessed":{"date-parts":[["2023",11,20]]},"author":[{"family":"Prestl","given":"Willibald"},{"family":"Sauer","given":"Thomas"},{"family":"Steinle","given":"Joachim"},{"family":"Tschernoster","given":"Oliver"}],"citation-key":"prestlBMWActiveCruise2000","DOI":"10.4271/2000-01-0344","event-place":"Warrendale, PA","genre":"SAE Technical Paper","ISSN":"0148-7191, 2688-3627","issued":{"date-parts":[["2000",3,6]]},"language":"English","number":"2000-01-0344","publisher":"SAE International","publisher-place":"Warrendale, PA","source":"www.sae.org","title":"The BMW Active Cruise Control ACC","type":"report","URL":"https://www.sae.org/publications/technical-papers/content/2000-01-0344/"},{"id":"PRISMProbabilisticSymbolic","accessed":{"date-parts":[["2023",11,3]]},"citation-key":"PRISMProbabilisticSymbolic","title":"PRISM - Probabilistic Symbolic Model Checker","type":"webpage","URL":"https://www.prismmodelchecker.org/"},{"id":"ProofsArgumentsZeroKnowledge","accessed":{"date-parts":[["2024",4,1]]},"citation-key":"ProofsArgumentsZeroKnowledge","title":"Proofs, Arguments, and Zero-Knowledge","type":"webpage","URL":"https://people.cs.georgetown.edu/jthaler/ProofsArgsAndZK.html"},{"id":"PropositionsTypesExplained","accessed":{"date-parts":[["2024",2,22]]},"citation-key":"PropositionsTypesExplained","title":"Propositions as types: explained (and debunked)","type":"webpage","URL":"https://lawrencecpaulson.github.io/2023/08/23/Propositions_as_Types.html"},{"id":"PrototypeVerificationSystem2022","abstract":"The Prototype Verification System (PVS) is a specification language integrated with support tools and an automated theorem prover, developed at the Computer Science Laboratory of SRI International in Menlo Park, California. \nPVS is based on a kernel consisting of an extension of Church's theory of types with dependent types, and is fundamentally a classical typed higher-order logic. The base types include uninterpreted types that may be introduced by the user, and built-in types such as the booleans, integers, reals, and the ordinals. Type-constructors include functions, sets, tuples, records, enumerations, and abstract data types. Predicate subtypes and dependent types can be used to introduce constraints; these constrained types may incur proof obligations (called type-correctness conditions or TCCs) during typechecking. PVS specifications are organized into parameterized theories.\nThe system is implemented in Common Lisp, and is released under the GNU General Public License (GPL).","accessed":{"date-parts":[["2024",3,19]]},"citation-key":"PrototypeVerificationSystem2022","container-title":"Wikipedia","issued":{"date-parts":[["2022",12,15]]},"language":"en","license":"Creative Commons Attribution-ShareAlike License","note":"Page Version ID: 1127497212","source":"Wikipedia","title":"Prototype Verification System","type":"entry-encyclopedia","URL":"https://en.wikipedia.org/w/index.php?title=Prototype_Verification_System&oldid=1127497212"},{"id":"puysFormalAnalysisSecurity2016","abstract":"Industrial systems are publicly the target of cyberattacks since Stuxnet [1]. Nowadays they are increasingly communicating over insecure media such as Internet. Due to their interaction with the real world, it is crucial to prove the security of their protocols. In this paper, we formally study the security of one of the most used industrial protocols: OPC-UA. Using ProVerif, a well known cryptographic protocol verification tool, we are able to check secrecy and authentication properties. We find several attacks on the protocols and provide countermeasures.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Puys","given":"Maxime"},{"family":"Potet","given":"Marie-Laure"},{"family":"Lafourcade","given":"Pascal"}],"citation-key":"puysFormalAnalysisSecurity2016","container-title":"Computer Safety, Reliability, and Security","DOI":"10.1007/978-3-319-45477-1_6","editor":[{"family":"Skavhaug","given":"Amund"},{"family":"Guiochet","given":"Jérémie"},{"family":"Bitsch","given":"Friedemann"}],"event-place":"Cham","ISBN":"978-3-319-45476-4 978-3-319-45477-1","issued":{"date-parts":[["2016"]]},"language":"en","page":"67-75","publisher":"Springer International Publishing","publisher-place":"Cham","source":"DOI.org (Crossref)","title":"Formal Analysis of Security Properties on the OPC-UA SCADA Protocol","type":"chapter","URL":"http://link.springer.com/10.1007/978-3-319-45477-1_6","volume":"9922"},{"id":"puysHardwareInTheLoopLabsSCADA2021","abstract":"In this paper, we present a SCADA cybersecurity awareness and training program based on a Hands-On training using two twin cyber-ranges named WonderICS and G-ICS. These labs are built using a Hardware-In-the-Loop simulation system of the physical process developed by the two partners. The cyber-ranges allow replication of realistic Advanced Persistent Threat (APT) attacks and demonstration of known vulnerabilities, as they rely on real industrial control devices and softwares. In this work, we present both the demonstration scenarios used for awareness on WonderICS and the training programs developed for graduate students on G-ICS.","accessed":{"date-parts":[["2024",8,8]]},"author":[{"family":"Puys","given":"Maxime"},{"family":"Thevenon","given":"Pierre-Henri"},{"family":"Mocanu","given":"Stéphane"}],"citation-key":"puysHardwareInTheLoopLabsSCADA2021","collection-title":"ARES '21","container-title":"Proceedings of the 16th International Conference on Availability, Reliability and Security","DOI":"10.1145/3465481.3469185","event-place":"New York, NY, USA","ISBN":"978-1-4503-9051-4","issued":{"date-parts":[["2021",8,17]]},"page":"1–10","publisher":"Association for Computing Machinery","publisher-place":"New York, NY, USA","source":"ACM Digital Library","title":"Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training","type":"paper-conference","URL":"https://dl.acm.org/doi/10.1145/3465481.3469185"},{"id":"qinFormalModelingVerification2017","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Qin","given":"Boya"},{"family":"Liu","given":"Dong"},{"family":"Cao","given":"Min"},{"family":"Zou","given":"Jingxi"}],"citation-key":"qinFormalModelingVerification2017","container-title":"2017 IEEE Conference on Energy Internet and Energy System Integration (EI2)","DOI":"10.1109/EI2.2017.8245721","event-place":"Beijing","event-title":"2017 IEEE Conference on Energy Internet and Energy System Integration (EI2)","ISBN":"978-1-5386-1427-3","issued":{"date-parts":[["2017",11]]},"language":"en","page":"1-6","publisher":"IEEE","publisher-place":"Beijing","source":"DOI.org (Crossref)","title":"Formal modeling and verification of flexible load control for power grid CPS based on differential dynamic logic","type":"paper-conference","URL":"http://ieeexplore.ieee.org/document/8245721/"},{"id":"raikwarSoKUsedCryptography2019","abstract":"The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance, health care, legal relations, IoT, information security, and consensus building systems, only few studies scrutinize the cryptographic concepts used in blockchain. To the best of our knowledge, there is no Systematization of Knowledge (SoK) that gives a complete picture of the existing cryptographic concepts which have been deployed or have the potential to be deployed in blockchain. In this paper, we thoroughly review and systematize all cryptographic concepts which are already used in blockchain. Additionally, we give a list of cryptographic concepts which have not yet been applied but have big potentials to improve the current blockchain solutions. We also include possible instantiations of these cryptographic concepts in the blockchain domain. Last but not least, we explicitly postulate 21 challenging problems that cryptographers interested in blockchain can work on.","accessed":{"date-parts":[["2023",10,4]]},"author":[{"family":"Raikwar","given":"Mayank"},{"family":"Gligoroski","given":"Danilo"},{"family":"Kralevska","given":"Katina"}],"citation-key":"raikwarSoKUsedCryptography2019","container-title":"IEEE Access","container-title-short":"IEEE Access","DOI":"10.1109/ACCESS.2019.2946983","ISSN":"2169-3536","issued":{"date-parts":[["2019"]]},"language":"en","page":"148550-148575","source":"DOI.org (Crossref)","title":"SoK of Used Cryptography in Blockchain","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/8865045/","volume":"7"},{"id":"rajhansVerificationHybridDynamic","abstract":"This paper concerns the use of linear hybrid automata (LHA) to verify properties of hybrid dynamic systems based on the concept of simulation relations. Following a review of basic concepts and a description of the LHA analysis tool PHAVer, assume-guarantee reasoning is described as a method for compositional verification. The results from the literature are summarized with an example to illustrate the concepts. Finally, the paper outlines some research directions for making this approach more useful.","author":[{"family":"Rajhans","given":"Akshay"}],"citation-key":"rajhansVerificationHybridDynamic","language":"en","source":"Zotero","title":"Verification of Hybrid Dynamic Systems Using Linear Hybrid Automata","type":"article"},{"id":"rajhansVerificationHybridDynamica","author":[{"family":"Rajhans","given":"Akshay"}],"citation-key":"rajhansVerificationHybridDynamica","title":"Verification of Hybrid Dynamic Systems Using Linear Hybrid Automata","type":"article-journal"},{"id":"rameshHierarchicalTextConditionalImage2022","abstract":"Contrastive models like CLIP have been shown to learn robust representations of images that capture both semantics and style. To leverage these representations for image generation, we propose a two-stage model: a prior that generates a CLIP image embedding given a text caption, and a decoder that generates an image conditioned on the image embedding. We show that explicitly generating image representations improves image diversity with minimal loss in photorealism and caption similarity. Our decoders conditioned on image representations can also produce variations of an image that preserve both its semantics and style, while varying the non-essential details absent from the image representation. Moreover, the joint embedding space of CLIP enables language-guided image manipulations in a zero-shot fashion. We use diffusion models for the decoder and experiment with both autoregressive and diffusion models for the prior, finding that the latter are computationally more efficient and produce higher-quality samples.","accessed":{"date-parts":[["2023",10,5]]},"author":[{"family":"Ramesh","given":"Aditya"},{"family":"Dhariwal","given":"Prafulla"},{"family":"Nichol","given":"Alex"},{"family":"Chu","given":"Casey"},{"family":"Chen","given":"Mark"}],"citation-key":"rameshHierarchicalTextConditionalImage2022","DOI":"10.48550/arXiv.2204.06125","issued":{"date-parts":[["2022",4,12]]},"number":"arXiv:2204.06125","publisher":"arXiv","source":"arXiv.org","title":"Hierarchical Text-Conditional Image Generation with CLIP Latents","type":"article","URL":"http://arxiv.org/abs/2204.06125"},{"id":"ramirezDynamicSystemIdentification2021","abstract":"Non-parametric system identification with Gaussian processes for underwater vehicles is explored in this research with the purpose of modelling autonomous underwater vehicle (AUV) dynamics with a low amount of data. Multi-output Gaussian processes and their aptitude for modelling the dynamic system of an underactuated AUV without losing the relationships between tied outputs are used. The simulation of a first-principle model of a Remus 100 AUV is employed to capture data for the training and validation of the multi-output Gaussian processes. The metric and required procedure to carry out multi-output Gaussian processes for AUV with 6 degrees of freedom (DoF) is also shown in this paper. Multi-output Gaussian processes compared with the popular technique of recurrent neural network show that multi-output Gaussian processes manage to surpass RNN for non-parametric dynamic system identification in underwater vehicles with highly coupled DoF with the added benefit of providing the measurement of confidence.","accessed":{"date-parts":[["2022",4,18]]},"author":[{"family":"Ramirez","given":"Wilmer Ariza"},{"family":"Kocijan","given":"Jus"},{"family":"Leong","given":"Zhi Quan"},{"family":"Nguyen","given":"Hung Duc"},{"family":"Jayasinghe","given":"Shantha Gamini"}],"citation-key":"ramirezDynamicSystemIdentification2021","container-title":"International Journal of Automation and Computing","container-title-short":"Int. J. Autom. Comput.","DOI":"10.1007/s11633-021-1308-x","event-place":"London","ISSN":"1476-8186","issue":"5","issued":{"date-parts":[["2021",10]]},"language":"English","note":"WOS:000673001900001","page":"681-693","publisher":"Springernature","publisher-place":"London","source":"Web of Science Nextgen","title":"Dynamic System Identification of Underwater Vehicles Using Multi-Output Gaussian Processes","type":"article-journal","URL":"https://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=DynamicDOIArticle&SrcApp=UA&KeyAID=10.1007%2Fs11633-021-1308-x&DestApp=DOI&SrcAppSID=USW2EC0B9Be3QMZ9xhmtqgGcprgqa&SrcJTitle=INTERNATIONAL+JOURNAL+OF+AUTOMATION+AND+COMPUTING&DestDOIRegistrantName=Springer-Verlag","volume":"18"},{"id":"RansomwareAttackLeads","accessed":{"date-parts":[["2022",4,2]]},"citation-key":"RansomwareAttackLeads","title":"Ransomware attack leads to shutdown of major U.S. pipeline system - The Washington Post","type":"webpage","URL":"https://www.washingtonpost.com/business/2021/05/08/cyber-attack-colonial-pipeline/"},{"id":"RansomwareAttackShuts","accessed":{"date-parts":[["2022",4,2]]},"citation-key":"RansomwareAttackShuts","title":"Ransomware Attack Shuts Down Colonial Pipeline : NPR","type":"webpage","URL":"https://www.npr.org/2021/05/08/995040240/cybersecurity-attack-shuts-down-a-top-u-s-gasoline-pipeline"},{"id":"rasheedDigitalTwinValues2020","abstract":"Digital twin can be defined as a virtual representation of a physical asset enabled through data and simulators for real-time prediction, optimization, monitoring, controlling, and improved decision making. Recent advances in computational pipelines, multiphysics solvers, artificial intelligence, big data cybernetics, data processing and management tools bring the promise of digital twins and their impact on society closer to reality. Digital twinning is now an important and emerging trend in many applications. Also referred to as a computational megamodel, device shadow, mirrored system, avatar or a synchronized virtual prototype, there can be no doubt that a digital twin plays a transformative role not only in how we design and operate cyber-physical intelligent systems, but also in how we advance the modularity of multi-disciplinary systems to tackle fundamental barriers not addressed by the current, evolutionary modeling practices. In this work, we review the recent status of methodologies and techniques related to the construction of digital twins mostly from a modeling perspective. Our aim is to provide a detailed coverage of the current challenges and enabling technologies along with recommendations and reflections for various stakeholders.","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Rasheed","given":"Adil"},{"family":"San","given":"Omer"},{"family":"Kvamsdal","given":"Trond"}],"citation-key":"rasheedDigitalTwinValues2020","container-title":"IEEE Access","container-title-short":"IEEE Access","DOI":"10.1109/ACCESS.2020.2970143","ISSN":"2169-3536","issued":{"date-parts":[["2020"]]},"language":"en","page":"21980-22012","source":"DOI.org (Crossref)","title":"Digital Twin: Values, Challenges and Enablers From a Modeling Perspective","title-short":"Digital Twin","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/8972429/","volume":"8"},{"id":"rashidUndergraduateCourseModelbased2020","abstract":"Model-based system engineering (MBSE) is becoming an industrial standard to design embedded systems. Therefore, its integration in electrical and computer engineering education is critical. This article presents an undergraduate course on MBSE for embedded systems through the formulation of course learning outcomes, identification of the course contents, and the construction of a holistic view for the contents. The holistic view of the course binds the contents by providing the modeling methodology, the transformation engine, and the simulation environment of an end-to-end framework. Furthermore, students obtain integrated design experience, through problem-based learning, using three case studies. Assessment through quantitative evaluation and students' feedback show the viability of the presented course.","accessed":{"date-parts":[["2023",10,3]]},"author":[{"family":"Rashid","given":"Muhammad"}],"citation-key":"rashidUndergraduateCourseModelbased2020","container-title":"COMPUTER APPLICATIONS IN ENGINEERING EDUCATION","container-title-short":"Comput. Appl. Eng. Educ.","DOI":"10.1002/cae.22233","event-place":"Hoboken","ISSN":"1061-3773, 1099-0542","issue":"3","issued":{"date-parts":[["2020",5]]},"language":"English","note":"Web of Science ID: WOS:000522056200001","number-of-pages":"13","page":"645-657","publisher":"Wiley","publisher-place":"Hoboken","source":"Clarivate Analytics Web of Science","title":"An undergraduate course on model-based system engineering for embedded systems","type":"article-journal","URL":"https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1","volume":"28"},{"id":"rasmussenAdvancesGaussianProcesses2006","author":[{"family":"Rasmussen","given":"Carl Edward"}],"citation-key":"rasmussenAdvancesGaussianProcesses2006","issued":{"date-parts":[["2006"]]},"language":"en","title":"Advances in Gaussian Processes - Tutorial at NIPS 2006 in Vancouver","type":"speech"},{"id":"rasmussenGaussianProcessesMachine2006","author":[{"family":"Rasmussen","given":"Carl Edward"},{"family":"Williams","given":"Christopher K. I."}],"call-number":"QA274.4 .R37 2006","citation-key":"rasmussenGaussianProcessesMachine2006","collection-title":"Adaptive computation and machine learning","event-place":"Cambridge, Mass","ISBN":"978-0-262-18253-9","issued":{"date-parts":[["2006"]]},"language":"en","note":"OCLC: ocm61285753","number-of-pages":"248","publisher":"MIT Press","publisher-place":"Cambridge, Mass","source":"Library of Congress ISBN","title":"Gaussian processes for machine learning","type":"book"},{"id":"rauschFormalVerificationPLC1998","abstract":"This paper presents an approach to the verification of programs for programmablelogic controllers(PLCs) using SMV, a softwqe package for formal verification of state transition systems. Binary PLC programs are converted directly into SMV modules that retain the variable names and execution sequences of the original programs. The system being controlled is modeled by a C/E system block diagram which is also transformed into a set of SMV modules, retaining the structure of the block diagram model. SMV allows the engineer to verify the behavior of the control program over all possible operating conditions. Mechanisms are discussed for representing correctly the concurrent execution of the PLC programs and the plant model using SMV primitives. The SMV approach to PLC program verification is illustrated with an example.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Rausch","given":"M."},{"family":"Krogh","given":"B.H."}],"citation-key":"rauschFormalVerificationPLC1998","container-title":"Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No.98CH36207)","DOI":"10.1109/ACC.1998.694666","event-place":"Philadelphia, PA, USA","event-title":"Proceedings of the 1998 American Control Conference (ACC)","ISBN":"978-0-7803-4530-0","issued":{"date-parts":[["1998"]]},"language":"en","page":"234-238 vol.1","publisher":"IEEE","publisher-place":"Philadelphia, PA, USA","source":"DOI.org (Crossref)","title":"Formal verification of PLC programs","type":"paper-conference","URL":"http://ieeexplore.ieee.org/document/694666/"},{"id":"rauzyFoundationsModelbasedSystems2019","abstract":"This article is a contribution to the INCOSE initiative for model-based engineering transformation. Its material has been presented at the ALSEE tour event in Oslo in September 2016. The ideas developed here come from the practical and theoretical experience of the authors in both industrial and academic frameworks. We organize the discussion around 6 theses that aim at establishing robust conceptual foundations for the model-based engineering transformation. We focus on model-based systems engineering, model-based safety assessment, and the relationship between these 2 disciplines. We report on active research initiatives that implement these 6 theses via the S2ML+X paradigm. We conclude with suggestions about future research and teaching activities.","accessed":{"date-parts":[["2023",10,3]]},"author":[{"family":"Rauzy","given":"Antoine B."},{"family":"Haskins","given":"Cecilia"}],"citation-key":"rauzyFoundationsModelbasedSystems2019","container-title":"SYSTEMS ENGINEERING","container-title-short":"Syst. Eng.","DOI":"10.1002/sys.21469","event-place":"Hoboken","ISSN":"1098-1241, 1520-6858","issue":"2","issued":{"date-parts":[["2019",3]]},"language":"English","note":"Web of Science ID: WOS:000461577200005","number-of-pages":"10","page":"146-155","publisher":"Wiley","publisher-place":"Hoboken","source":"Clarivate Analytics Web of Science","title":"Foundations for model-based systems engineering and model-based safety assessment","type":"article-journal","URL":"https://www.webofscience.com/wos/woscc/summary/563bee91-8c90-4554-ae8d-46c3ce0028ee-a808dfa0/relevance/1","volume":"22"},{"id":"rehtanzDigitalTwinBuzzword2024","abstract":"When we talk about digitization and digitalization, the term digital twin is not far away; data and information are the new oil for the economy. But hasn’t electrical power always been at the forefront with computational models and computer applications for the secure operation of power systems? With the development of computer systems in the middle of the last century, power systems were one of the first civilian applications. Many standard computing methods and models in power systems have been established for more than half a century. Why are we suddenly researching and talking so much about digital twins, and which new solutions will really be established in practice? In this special issue, we want to explore these questions and examine them from different perspectives.","accessed":{"date-parts":[["2024",3,13]]},"author":[{"family":"Rehtanz","given":"Christian"},{"family":"Häger","given":"Ulf"},{"family":"Liu","given":"Chen-Ching"}],"citation-key":"rehtanzDigitalTwinBuzzword2024","container-title":"IEEE Power and Energy Magazine","DOI":"10.1109/MPE.2023.3339094","ISSN":"1558-4216","issue":"1","issued":{"date-parts":[["2024",1]]},"page":"14-15","source":"IEEE Xplore","title":"Digital Twin: From Buzzword To Solutions [Guest Editorial]","title-short":"Digital Twin","type":"article-journal","URL":"https://ieeexplore.ieee.org/document/10398570/","volume":"22"},{"id":"ReportCybersecurityCritical2015","citation-key":"ReportCybersecurityCritical2015","genre":"Executive Survey","issued":{"date-parts":[["2015"]]},"publisher":"Trend Micro Incorporated","title":"Report on Cybersecurity and Critical Infrastructure in the Americas","type":"report"},{"id":"RevModPhys","accessed":{"date-parts":[["2024",5,21]]},"citation-key":"RevModPhys","title":"Rev. Mod. Phys. 83, 943 (2011) - Bayesian inference in physics","type":"webpage","URL":"https://journals.aps.org/rmp/abstract/10.1103/RevModPhys.83.943"},{"id":"rezendeVariationalInferenceNormalizing2016","abstract":"The choice of approximate posterior distribution is one of the core problems in variational inference. Most applications of variational inference employ simple families of posterior approximations in order to allow for efficient inference, focusing on mean-field or other simple structured approximations. This restriction has a significant impact on the quality of inferences made using variational methods. We introduce a new approach for specifying flexible, arbitrarily complex and scalable approximate posterior distributions. Our approximations are distributions constructed through a normalizing flow, whereby a simple initial density is transformed into a more complex one by applying a sequence of invertible transformations until a desired level of complexity is attained. We use this view of normalizing flows to develop categories of finite and infinitesimal flows and provide a unified view of approaches for constructing rich posterior approximations. We demonstrate that the theoretical advantages of having posteriors that better match the true posterior, combined with the scalability of amortized variational approaches, provides a clear improvement in performance and applicability of variational inference.","accessed":{"date-parts":[["2023",10,5]]},"author":[{"family":"Rezende","given":"Danilo Jimenez"},{"family":"Mohamed","given":"Shakir"}],"citation-key":"rezendeVariationalInferenceNormalizing2016","DOI":"10.48550/arXiv.1505.05770","issued":{"date-parts":[["2016",6,14]]},"number":"arXiv:1505.05770","publisher":"arXiv","source":"arXiv.org","title":"Variational Inference with Normalizing Flows","type":"article","URL":"http://arxiv.org/abs/1505.05770"},{"id":"ribeiroWhyShouldTrust2016","abstract":"Despite widespread adoption, machine learning models remain mostly black boxes. Understanding the reasons behind predictions is, however, quite important in assessing trust, which is fundamental if one plans to take action based on a prediction, or when choosing whether to deploy a new model. Such understanding also provides insights into the model, which can be used to transform an untrustworthy model or prediction into a trustworthy one. In this work, we propose LIME, a novel explanation technique that explains the predictions of any classifier in an interpretable and faithful manner, by learning an interpretable model locally around the prediction. We also propose a method to explain models by presenting representative individual predictions and their explanations in a non-redundant way, framing the task as a submodular optimization problem. We demonstrate the flexibility of these methods by explaining different models for text (e.g. random forests) and image classification (e.g. neural networks). We show the utility of explanations via novel experiments, both simulated and with human subjects, on various scenarios that require trust: deciding if one should trust a prediction, choosing between models, improving an untrustworthy classifier, and identifying why a classifier should not be trusted.","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Ribeiro","given":"Marco Tulio"},{"family":"Singh","given":"Sameer"},{"family":"Guestrin","given":"Carlos"}],"citation-key":"ribeiroWhyShouldTrust2016","issued":{"date-parts":[["2016",8,9]]},"language":"en","number":"arXiv:1602.04938","publisher":"arXiv","source":"arXiv.org","title":"\"Why Should I Trust You?\": Explaining the Predictions of Any Classifier","title-short":"\"Why Should I Trust You?","type":"article","URL":"http://arxiv.org/abs/1602.04938"},{"id":"rifaiContractiveAutoEncodersExplicit","abstract":"We present in this paper a novel approach for training deterministic auto-encoders. We show that by adding a well chosen penalty term to the classical reconstruction cost function, we can achieve results that equal or surpass those attained by other regularized autoencoders as well as denoising auto-encoders on a range of datasets. This penalty term corresponds to the Frobenius norm of the Jacobian matrix of the encoder activations with respect to the input. We show that this penalty term results in a localized space contraction which in turn yields robust features on the activation layer. Furthermore, we show how this penalty term is related to both regularized auto-encoders and denoising auto-encoders and how it can be seen as a link between deterministic and non-deterministic auto-encoders. We find empirically that this penalty helps to carve a representation that better captures the local directions of variation dictated by the data, corresponding to a lower-dimensional non-linear manifold, while being more invariant to the vast majority of directions orthogonal to the manifold. Finally, we show that by using the learned features to initialize a MLP, we achieve state of the art classification error on a range of datasets, surpassing other methods of pretraining.","author":[{"family":"Rifai","given":"Salah"},{"family":"Vincent","given":"Pascal"},{"family":"Muller","given":"Xavier"},{"family":"Glorot","given":"Xavier"},{"family":"Bengio","given":"Yoshua"}],"citation-key":"rifaiContractiveAutoEncodersExplicit","language":"en","source":"Zotero","title":"Contractive Auto-Encoders: Explicit Invariance During Feature Extraction","type":"article-journal"},{"id":"ritterDigitalTwinDetect2022","abstract":"Abstract\n This case study describes the development of technologies that enable digital-engineering and digital-twinning efforts in proliferation detection. The project presents a state-of-the-art approach to support International Atomic Energy Agency (IAEA) safeguards by incorporating diversion-pathway analysis, facility misuse, and the detection of indicators within the reactor core, applying the safeguards-by-design concept, and demonstrates its applicability as a sensitive monitoring system for advanced reactors and power plants. There are two pathways a proliferating state might take using the reactor core. One is “diversion,” where special fissionable nuclear material—i.e., Pu-239, U-233, U enriched in U-233/235—that has been declared to the IAEA is removed surreptitiously, either by taking small amounts of nuclear material over a long time (known as protracted diversion) or large amounts in a short time (known as abrupt diversion). The second pathway is “misuse,” where undeclared source material—material that can be transmuted into special fissionable nuclear material: depleted uranium, natural uranium, and thorium—is placed in the core, where it uses the neutron flux for transmutation. Digital twinning and digital engineering have demonstrated significant performance improvement and schedule reduction in the aerospace, automotive, and construction industries. This integrated modeling approach has not been fully applied to nuclear safeguards programs in the past. Digital twinning, combined with machine learning technologies, can lead to new innovations in process-monitoring detection, specifically in event classification, real-time notification, and data tampering. It represents a technological leap in evaluation and detection capability to safeguard any nuclear facility.","accessed":{"date-parts":[["2023",10,11]]},"author":[{"family":"Ritter","given":"Christopher"},{"family":"Hays","given":"Ross"},{"family":"Browning","given":"Jeren"},{"family":"Stewart","given":"Ryan"},{"family":"Bays","given":"Samuel"},{"family":"Reyes","given":"Gustavo"},{"family":"Schanfein","given":"Mark"},{"family":"Pluth","given":"Adam"},{"family":"Sabharwall","given":"Piyush"},{"family":"Kunz","given":"Ross"},{"family":"Shields","given":"Ashley"},{"family":"Koudelka","given":"John"},{"family":"Zohner","given":"Porter"}],"citation-key":"ritterDigitalTwinDetect2022","container-title":"Journal of Energy Resources Technology","DOI":"10.1115/1.4053979","ISSN":"0195-0738, 1528-8994","issue":"10","issued":{"date-parts":[["2022",10,1]]},"language":"en","page":"102108","source":"DOI.org (Crossref)","title":"Digital Twin to Detect Nuclear Proliferation: A Case Study","title-short":"Digital Twin to Detect Nuclear Proliferation","type":"article-journal","URL":"https://asmedigitalcollection.asme.org/energyresources/article/144/10/102108/1137857/Digital-Twin-to-Detect-Nuclear-Proliferation-A","volume":"144"},{"id":"robbinsMendeleyZoteroWhich2012","abstract":"Today’s bibliographic managers provide cloud storage so that papers can be attached to citations and syncing services, in order for papers and citations to be available in multiple mediums. Mendeley and Zotero are two services that offer online storage of papers and citations, desktop applications, and tablet integration. Mendeley has an iPad application and an open API so that developers can create apps for Android tablets. Zotero is an open-source project that encourages developers to create both iPad and Android apps. Both suites can be integrated with word processing software for accurate in-text and bibliographic entries, provide full-text indexing of PDF documents, and can attach notes to citations. Choosing between them depends upon what features a mobile researcher would need and use.","accessed":{"date-parts":[["2022",2,11]]},"author":[{"family":"Robbins","given":"Laura Pope"}],"citation-key":"robbinsMendeleyZoteroWhich2012","container-title":"The Charleston Advisor","container-title-short":"charleston adv","DOI":"10.5260/chara.14.2.5","ISSN":"15254011, 15254003","issue":"2","issued":{"date-parts":[["2012",10,1]]},"language":"en","page":"5-11","source":"DOI.org (Crossref)","title":"Mendeley or Zotero: Which Should the Mobile Researcher Use?","title-short":"Mendeley or Zotero","type":"article-journal","URL":"http://openurl.ingenta.com/content/xref?genre=article&issn=1525-4011&volume=14&issue=2&spage=5","volume":"14"},{"id":"RobustControlMicrovibrations","accessed":{"date-parts":[["2024",8,30]]},"citation-key":"RobustControlMicrovibrations","DOI":"10.1243/095440605X16929","language":"en","title":"Robust control of microvibrations with experimental verification","type":"webpage","URL":"https://journals.sagepub.com/doi/epdf/10.1243/095440605X16929"},{"id":"rocchettoCPDYExtendingDolevYao2016","abstract":"We propose extensions to the Dolev-Yao attacker model to make it suitable for arguments about security of Cyber-Physical Systems. The Dolev-Yao attacker model uses a set of rules to define potential actions by an attacker with respect to messages (i.e. information) exchanged between parties during a protocol execution. As the traditional Dolev-Yao model considers only information (exchanged over a channel controlled by the attacker), the model cannot directly be used to argue about the security of cyber-physical systems where physicallayer interactions are possible. Our Dolev-Yao extension, called CyberPhysical Dolev-Yao (CPDY), allows additional orthogonal interaction channels between the parties. In particular, such orthogonal channels can be used to model physical-layer mechanical, chemical, or electrical interactions between components. In addition, we discuss the inclusion of physical properties such as location or distance in the rule set. We present an example set of additional rules for the Dolev-Yao attacker, using those we are able to formally discover physical attacks that previously could only be found by empirical methods or detailed physical process models.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Rocchetto","given":"Marco"},{"family":"Tippenhauer","given":"Nils Ole"}],"citation-key":"rocchettoCPDYExtendingDolevYao2016","container-title":"Formal Methods and Software Engineering","DOI":"10.1007/978-3-319-47846-3_12","editor":[{"family":"Ogata","given":"Kazuhiro"},{"family":"Lawford","given":"Mark"},{"family":"Liu","given":"Shaoying"}],"event-place":"Cham","ISBN":"978-3-319-47845-6 978-3-319-47846-3","issued":{"date-parts":[["2016"]]},"language":"en","page":"175-192","publisher":"Springer International Publishing","publisher-place":"Cham","source":"DOI.org (Crossref)","title":"CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions","title-short":"CPDY","type":"chapter","URL":"http://link.springer.com/10.1007/978-3-319-47846-3_12","volume":"10009"},{"id":"rocchettoFormalSecurityAnalysis2017","abstract":"We discuss the use of formal modeling to discover potential attacks on Cyber-Physical systems, in particular Industrial Control Systems. We propose a general approach to achieve that goal considering physical-layer interactions, time and state discretization of the physical process and logic, and the use of suitable attacker profiles. We then apply the approach to model a real-world water treatment testbed using ASLan++ and analyze the resulting transition system using CL-AtSe, identifying four attack classes.","accessed":{"date-parts":[["2023",10,10]]},"author":[{"family":"Rocchetto","given":"Marco"},{"family":"Tippenhauer","given":"Nils Ole"}],"citation-key":"rocchettoFormalSecurityAnalysis2017","container-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","DOI":"10.1145/3052973.3053024","event-place":"Abu Dhabi United Arab Emirates","event-title":"ASIA CCS '17: ACM Asia Conference on Computer and Communications Security","ISBN":"978-1-4503-4944-4","issued":{"date-parts":[["2017",4,2]]},"language":"en","page":"114-126","publisher":"ACM","publisher-place":"Abu Dhabi United Arab Emirates","source":"DOI.org (Crossref)","title":"Towards Formal Security Analysis of Industrial Control Systems","type":"paper-conference","URL":"https://dl.acm.org/doi/10.1145/3052973.3053024"},{"id":"rojasTutorialIntroductionLambda","abstract":"This paper is a short and painless introduction to the λ calculus. Originally developed in order to study some mathematical properties of effectively computable functions, this formalism has provided a strong theoretical foundation for the family of functional programming languages. We show how to perform some arithmetical computations using the λ calculus and how to define recursive functions, even though functions in λ calculus are not given names and thus cannot refer explicitly to themselves.","author":[{"family":"Rojas","given":"Raul"}],"citation-key":"rojasTutorialIntroductionLambda","language":"en","source":"Zotero","title":"A Tutorial Introduction to the Lambda Calculus","type":"article-journal"},{"id":"rokkachhetriSideChannelsCyberPhysical2017","abstract":"As 3-D printers are becoming increasingly relevant in various domains, including critical infrastructure, cyber-security questions naturally arise. This article investigates how to leverage analog emissions (vibration, acoustic, magnetic, and power) of 3-D printers in order to identify the printed object and compromise confidentiality.","accessed":{"date-parts":[["2023",9,27]]},"author":[{"family":"Rokka Chhetri","given":"Sujit"},{"family":"Al Faruque","given":"Mohammad Abdullah"}],"citation-key":"rokkachhetriSideChannelsCyberPhysical2017","container-title":"IEEE Design & Test","DOI":"10.1109/MDAT.2017.2682225","ISSN":"2168-2364","issue":"4","issued":{"date-parts":[["2017",8]]},"page":"18-25","source":"IEEE Xplore","title":"Side Channels of Cyber-Physical Systems: Case Study in Additive Manufacturing","title-short":"Side Channels of Cyber-Physical Systems","type":"article-journal","URL":"https://ieeexplore.ieee.org/abstract/document/7878599?casa_token=KQXDZEp-sRgAAAAA:I48bww9EmRuRNHG8q3L4XF3DW5OVSkWLjoSS59nTGAH1OXvSw_8Wg1r7nD7ziKTRGEyIo5it4A","volume":"34"},{"id":"rombachHighResolutionImageSynthesis2022","abstract":"By decomposing the image formation process into a sequential application of denoising autoencoders, diffusion models (DMs) achieve state-of-the-art synthesis results on image data and beyond. Additionally, their formulation allows for a guiding mechanism to control the image generation process without retraining. However, since these models typically operate directly in pixel space, optimization of powerful DMs often consumes hundreds of GPU days and inference is expensive due to sequential evaluations. To enable DM training on limited computational resources while retaining their quality and flexibility, we apply them in the latent space of powerful pretrained autoencoders. In contrast to previous work, training diffusion models on such a representation allows for the first time to reach a near-optimal point between complexity reduction and detail preservation, greatly boosting visual fidelity. By introducing cross-attention layers into the model architecture, we turn diffusion models into powerful and flexible generators for general conditioning inputs such as text or bounding boxes and high-resolution synthesis becomes possible in a convolutional manner. Our latent diffusion models (LDMs) achieve a new state of the art for image inpainting and highly competitive performance on various tasks, including unconditional image generation, semantic scene synthesis, and super-resolution, while significantly reducing computational requirements compared to pixel-based DMs. Code is available at https://github.com/CompVis/latent-diffusion .","accessed":{"date-parts":[["2023",10,5]]},"author":[{"family":"Rombach","given":"Robin"},{"family":"Blattmann","given":"Andreas"},{"family":"Lorenz","given":"Dominik"},{"family":"Esser","given":"Patrick"},{"family":"Ommer","given":"Björn"}],"citation-key":"rombachHighResolutionImageSynthesis2022","DOI":"10.48550/arXiv.2112.10752","issued":{"date-parts":[["2022",4,13]]},"number":"arXiv:2112.10752","publisher":"arXiv","source":"arXiv.org","title":"High-Resolution Image Synthesis with Latent Diffusion Models","type":"article","URL":"http://arxiv.org/abs/2112.10752"},{"id":"rouhlingFormalisationToolsClassical2019","abstract":"In this thesis, we put a library for analysis in the Coq proof assistant to the test through a case study in control theory. We formalise a proof of stability for the inverted pendulum, a standard example in control theory. Controlling the inverted pendulum is challenging because of its non-linearity, so that this system is often used as a benchmark for new control techniques. Through this case study, we identify issues in the tools that are currently available for the formalisation of classical analysis and we develop new ones in order to achieve our formalisation goal. In particular, we try to imitate the pen-and-paper proof style thanks to new notations and inference mechanisms. This is an essential step to make formal proofs more accessible to mathematicians. We then develop a new library for classical analysis in Coq that integrates these new tools and tries to palliate the limitations of the library we tested, especially in the domain of asymptotic reasoning. We also experiment with this new library on the same formal proof and draw lessons on its strengths and weaknesses. Finally, we sketch a new methodology in order to address the limitations of our library in the particular domain of computation. We exploit a technique called refinement to refactor the methodology of proof by reflection, a technique that automates proofs through computation and also reduces the size of proof terms. We implement this methodology on the example of arithmetic reasoning in rings and discuss how this work could be used to generalise existing tools.","accessed":{"date-parts":[["2024",1,22]]},"author":[{"family":"Rouhling","given":"Damien"}],"citation-key":"rouhlingFormalisationToolsClassical2019","genre":"phdthesis","issued":{"date-parts":[["2019",9,30]]},"language":"en","publisher":"Université Côte d'Azur","source":"theses.hal.science","title":"Formalisation tools for classical analysis : a case study in control theory","title-short":"Formalisation tools for classical analysis","type":"thesis","URL":"https://theses.hal.science/tel-02333396"},{"id":"rouhlingFormalProofCoq2018","abstract":"Control theory provides techniques to design controllers, or control functions, for dynamical systems with inputs, so as to grant a particular behaviour of such a system. The inverted pendulum is a classic system in control theory: it is used as a benchmark for nonlinear control techniques and is a model for several other systems with various applications. We formalized in the Coq proof assistant the proof of soundness of a control function for the inverted pendulum. This is a first step towards the formal verification of more complex systems for which safety may be critical.","accessed":{"date-parts":[["2022",6,20]]},"author":[{"family":"Rouhling","given":"Damien"}],"citation-key":"rouhlingFormalProofCoq2018","collection-title":"CPP 2018","container-title":"Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs","DOI":"10.1145/3167101","event-place":"New York, NY, USA","ISBN":"978-1-4503-5586-5","issued":{"date-parts":[["2018",1,8]]},"page":"28–41","publisher":"Association for Computing Machinery","publisher-place":"New York, NY, USA","source":"ACM Digital Library","title":"A formal proof in Coq of a control function for the inverted pendulum","type":"paper-conference","URL":"https://doi.org/10.1145/3167101"},{"id":"rouhlingFormalProofsControl","author":[{"family":"Rouhling","given":"Damien"}],"citation-key":"rouhlingFormalProofsControl","language":"en","source":"Zotero","title":"Formal Proofs for Control Theory and Robotics: A Case Study","type":"article-journal"},{"id":"roustantDiceKrigingDiceOptimTwo2012","abstract":"We present two recently released R packages, DiceKriging and DiceOptim, for the approximation and the optimization of expensive-to-evaluate deterministic functions. Following a self-contained mini tutorial on Kriging-based approximation and optimization, the functionalities of both packages are detailed and demonstrated in two distinct sections. In particular, the versatility of DiceKriging with respect to trend and noise specifications, covariance parameter estimation, as well as conditional and unconditional simulations are illustrated on the basis of several reproducible numerical experiments. We then put to the fore the implementation of sequential and parallel optimization strategies relying on the expected improvement criterion on the occasion of DiceOptim’s presentation. An appendix is dedicated to complementary mathematical and computational details.","accessed":{"date-parts":[["2022",4,21]]},"author":[{"family":"Roustant","given":"Olivier"},{"family":"Ginsbourger","given":"David"},{"family":"Deville","given":"Yves"}],"citation-key":"roustantDiceKrigingDiceOptimTwo2012","container-title":"Journal of Statistical Software","container-title-short":"J. Stat. Soft.","DOI":"10.18637/jss.v051.i01","ISSN":"1548-7660","issue":"1","issued":{"date-parts":[["2012"]]},"language":"en","source":"DOI.org (Crossref)","title":"DiceKriging, DiceOptim: Two R Packages for the Analysis of Computer Experiments by Kriging-Based Metamodeling and Optimization","title-short":"