Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Heber Herencia-Zapana"'
Autor:
Baoluo Meng, Daniel Larraz, Kit Siu, Abha Moitra, John Interrante, William Smith, Saswata Paul, Daniel Prince, Heber Herencia-Zapana, M. Fareed Arif, Moosa Yahyazadeh, Vidhya Tekken Valapil, Michael Durling, Cesare Tinelli, Omar Chowdhury
Publikováno v:
Systems, Vol 9, Iss 1, p 18 (2021)
The ever-increasing complexity of cyber-physical systems is driving the need for assurance of critical infrastructure and embedded systems. However, traditional methods to secure cyber-physical systems—e.g., using cyber best practices, adapting mec
Externí odkaz:
https://doaj.org/article/6825ed7474254a9d9534394cae950d01
Publikováno v:
2023 Annual Reliability and Maintainability Symposium (RAMS).
Autor:
Joachim Karl Ulf Hochwarth, Ritchie Lee, Heber Herencia-Zapana, Robert J. Moss, Vidhya Tekken Valapil, Mike Meiners, Nicholas Visser, Michael Richard Durling, Baoluo Meng
Publikováno v:
2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC).
Adaptive Stress Testing (AST) has shown promise in identifying errant corner cases in complex software used in aerospace applications including Flight Management Systems (FMS). The strength of AST is performing test-based validation and verification
Autor:
Vidhya Tekken Valapil, Szabolcs Andras Borgyos, Heber Herencia-Zapana, Michael Richard Durling, Abha Moitra, Saswata Paul, William James Premerlani, Kristen Armstrong
Publikováno v:
2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC).
Operational Risk Assessment (ORA) is a process used to demonstrate and verify that the resultant risk of a planned operation meets certain required safety standards. Subject matter experts (SME) from different domains often use different approaches a
Autor:
Saswata Paul, Kit Siu, Baoluo Meng, Daniel Prince, Michael Richard Durling, Heber Herencia-Zapana, Andrew Crapo, Abha Moitra
Publikováno v:
2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC).
The ever-increasing complexity of cyber physical systems drives the need for assurance of critical infrastructure and embedded systems. Building assurance cases is a way to increase confidence in systems. In general, the construction of assurance cas
Autor:
Baoluo Meng, James Gerard Lopez, Cameron D. Patterson, Heber Herencia-Zapana, Lakshman Maalolan, Glen Gallagher
Publikováno v:
2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC).
The expected proliferation of UAS in the NAS requires technologies that ensure safe operation. There is significant interest from industry and civil aviation authorities to have a standard practice to enable flight operations for UAS containing fligh
Publikováno v:
SAE International Journal of Transportation Cybersecurity and Privacy. 3
Publikováno v:
2020 Annual Reliability and Maintainability Symposium (RAMS).
We introduce a compositional, model-based framework for modeling, visualizing and analyzing the security of system architectures. This work extends the framework we developed previously for analyzing safety [1]. With this extension, our framework can
Autor:
Meng Li, Michael Richard Durling, Daniel Larraz, Kit Siu, John Interrante, Omar Chowdhury, M. Fareed Arif, Cesare Tinelli, Baoluo Meng, Daniel Prince, Abha Moitra, Moosa Yahyazadeh, Heber Herencia-Zapana
Publikováno v:
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC).
The asymmetric nature and ever-increasing degree of sophistication of cyber threats drive the need for assurance of critical infrastructure and systems. Current approaches that can help counter these cyber threats include the application of tools wit
Autor:
Daniel Prince, John Interrante, Vidhya Tekken Valapil, Saswata Paul, Abha Moitra, Moosa Yahyazadeh, William David Smith, Omar Chowdhury, Heber Herencia-Zapana, M. Fareed Arif, Baoluo Meng, Michael Richard Durling, Daniel Larraz, Cesare Tinelli, Kit Siu
Publikováno v:
Systems, Vol 9, Iss 18, p 18 (2021)
Systems
Volume 9
Issue 1
Systems
Volume 9
Issue 1
The ever-increasing complexity of cyber-physical systems is driving the need for assurance of critical infrastructure and embedded systems. However, traditional methods to secure cyber-physical systems—e.g., using cyber best practices, adapting mec