R "Zettelkasten/Literature Notes/.archive/CH4System_Representation_S2020pdf2254.md" -> ".archive/Literature Notes/.archive/CH4System_Representation_S2020pdf2254.md" R "Zettelkasten/Literature Notes/.archive/IntroductionDiffusionModels2022.md" -> ".archive/Literature Notes/.archive/IntroductionDiffusionModels2022.md" R "Zettelkasten/Literature Notes/.archive/Kry10TechnicalOverview.md" -> ".archive/Literature Notes/.archive/Kry10TechnicalOverview.md" R "Zettelkasten/Literature Notes/.archive/ME2046_Sampled_Data_Analysis_Reading_Chapter_2pdf2254ME.md" -> ".archive/Literature Notes/.archive/ME2046_Sampled_Data_Analysis_Reading_Chapter_2pdf2254ME.md" R "Zettelkasten/Literature Notes/.archive/ME2046_The_z_transform_Chapter_3pdf2254ME.md" -> ".archive/Literature Notes/.archive/ME2046_The_z_transform_Chapter_3pdf2254ME.md" R "Zettelkasten/Literature Notes/.archive/My Library.bib" -> ".archive/Literature Notes/.archive/My Library.bib" R "Zettelkasten/Literature Notes/.archive/aModeladoNucleoAnalisis2023.md" -> ".archive/Literature Notes/.archive/aModeladoNucleoAnalisis2023.md" R "Zettelkasten/Literature Notes/.archive/atsumiModifiedBodePlots2012.md" -> ".archive/Literature Notes/.archive/atsumiModifiedBodePlots2012.md"
1.4 KiB
| authors | citekey | alias | publish_date | location | last_import | ||
|---|---|---|---|---|---|---|---|
|
taylorEnhancingCyberPhysicalSystem2025 | taylorEnhancingCyberPhysicalSystem2025 | 2025-06-23 | Naples, Italy | 2025-07-30 |
Enhancing Cyber-Physical System Dependability via Synthesis: Challenges and Future Directions
Indexing Information
Published: 2025-06
#InFirstPass
[!seealso] Related Papers
Annotations ### Notes ![[Zettelkasten/Literature
Notes/Notes on Papers/Enhancing Cyber-Physical System Dependability via Synthesis- Challenges and Future Directions-notes.md]]
Highlights From Zotero
[!done] Important By formally designing safety and liveness requirements and synthesizing software that adheres to these specifications, unsafe behaviors can be prevented from the very beginning of system development. 2025-05-06 4:37 pm
[!warning] Dubious Preventing unsafe behaviors is achievable by meticulously engineering control software to prevent such behaviors. However, software often contains bugs that adversaries can exploit. Preventing bugs involves specifying the correct behavior of the system and proving that the software implementation adheres to the specification. However, these program verification-based approaches are challenging to apply [5], [9], [24]. 2025-05-06 4:44 pm
*Bugs r bad. Basically the main point.
These citations don't really support the claim that they're attached to.*