Zobrazeno 1 - 10
of 120
pro vyhledávání: '"Shrobe, Howard"'
Autor:
Falco, Gregory, Cornish, Paul, Creese, Sadie, Carr, Madeline, Cavelty, Myriam Dunn, Eckert, Claudia, Lin, Herbert, Goto, Gen, Saunders, Jamie, Grotto, Andrew, Shrobe, Howard, Kanuck, Sean, Susskind, Lawrence, Parthasarathi, Arvind
Spending on cybersecurity products and services is expected to top 123 billion U.S. dollars for 2020, more than double the 55 billion U.S. dollars spent in 2011.1 In that same period, cyber breaches quadrupled. Organizations globally face increasing
Externí odkaz:
http://arxiv.org/abs/2107.14065
Autor:
Topcu, Ufuk, Bliss, Nadya, Cooke, Nancy, Cummings, Missy, Llorens, Ashley, Shrobe, Howard, Zuck, Lenore
The challenge of establishing assurance in autonomy is rapidly attracting increasing interest in the industry, government, and academia. Autonomy is a broad and expansive capability that enables systems to behave without direct control by a human ope
Externí odkaz:
http://arxiv.org/abs/2010.14443
Autor:
Laddaga, Robert, Robertson, Paul, Shrobe, Howard, Cerys, Dan, Manghwani, Prakash, Meijer, Patrik
Today's cyber physical systems (CPS) are not well protected against cyber attacks. Protected CPS often have holes in their defense, due to the manual nature of today's cyber security design process. It is necessary to automate or semi-automate the de
Externí odkaz:
http://arxiv.org/abs/1901.01867
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification). W
Externí odkaz:
http://arxiv.org/abs/1601.04263
The purpose of this work is two fold: on one hand we want to formalize the behavior of critical components of the self generating and adapting cognitive middleware AWDRAT such that the formalism not only helps to understand the semantics and technica
Externí odkaz:
http://arxiv.org/abs/1412.3588
We present our ongoing work and initial results towards the (behavioral) correctness analysis of the cognitive middleware AWDRAT. Since, the (provable) behavioral correctness of a software system is a fundamental pre-requisite of the system's securit
Externí odkaz:
http://arxiv.org/abs/1412.2328
We are building a new communication model and discoverysystem which will allow agent-based intelligent spacesto interact with one another. This new infrastructure layer,called Hyperglue, coordinates agent actions at a higher levelthan most agent comm
Externí odkaz:
http://hdl.handle.net/1721.1/31223
The goal of human-centered, pervasive computing should be to hide the details of the computing environment, allowing users to concentrate on their goals, rather than on the direct management of devices. This paper describes a system that operates at
Externí odkaz:
http://hdl.handle.net/1721.1/31222
We introduce Simultaneous Localization and Tracking (SLAT), the problem of tracking a target in a sensor network while simultaneously localizing and calibrating the nodes of the network. Our proposed solution, LaSLAT, is a Bayesian filter providing o
Externí odkaz:
http://hdl.handle.net/1721.1/30541
Autor:
Shrobe, Howard, Laddaga, Robert
Traditionally, we've focussed on the question of how to make a system easy to code the first time, or perhaps on how to ease the system's continued evolution. But if we look at life cycle costs, then we must conclude that the important question is ho
Externí odkaz:
http://hdl.handle.net/1721.1/7286