Skip to main content

Horizontal Menu

  • Research
    • Areas
    • Projects
    • Publications
    • NSA Center of Academic Excellence
  • Education
    • Prospective Students
    • Summer Program Info
  • Team
  • Sponsors
  • Contact
  • Opportunities

Hamburger Menu

  • Home
  • ISIS Calendar
    • Research Projects
    • Research Areas
    • Publications
    • Internship Program
    • Prospective Students
  • Team
  • Sponsors
  • Contact
  • Opportunities

Breadcrumb

  • Home /
  • Publications
Search by title, author, keywords, etc.

2016

publication

Vulnerability of fixed-time control of signalized intersections to cyber-tampering

Authored by Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, and Xenofon Koutsoukos
publication

Performance Evaluation of Secure Industrial Control System Design: A Railway Control System Case Study

Industrial control systems (ICS) are composed of sensors, actuators, control processing units, and communication devices all interconnected to provide monitoring and control capabilities. Due to the integral role of the networking infrastructure, such systems are vulnerable to cyber attacks. In-depth consideration of security and resilience and their effects to system performance are very important. This paper focuses on railway control systems (RCS), an important and potentially vulnerable class of ICS, and presents a simulation integration platform that enables (1) Modeling and simulation including realistic models of cyber and physical components and their interactions, as well as operational scenarios that can be used or evaluations of cybersecurity risks and mitigation measures and (2) Evaluation of performance impact and security assessment of mitigation mechanisms focusing on authentication mechanisms and firewalls. The approach is demonstrated using simulation results from a realistic RCS case study.
Authored by Xenofon Kousoukos, Himanshu Neema, Goncalo Martins, Sajal Bhatia, Sztipanovits Janos, Keith Stouffer, CheeYee Tang, and Richard Candell
publication

Cache-Related Preemption Delay Analysis for Multi-Level Inclusive Caches

Authored by Zhenkai Zhang and Xenofon Kousoukos
publication

An application of data driven anomaly identification to spacecraft telemetry data

In this paper, we propose a mixed method for analyzing telemetry data from a robotic space mission. The idea is to first apply unsupervised learning methods to the telemetry data divided into temporal segments. The large clusters that ensue typically represent the nominal operations of the spacecraft and are not of interest from an anomaly detection viewpoint. However, the smaller clusters and outliers that result from this analysis may represent specialized modes of operation, e.g., conduct of a specialized experiment on board the spacecraft, or they may represent true anomalous or unexpected behaviors. To differentiate between specialized modes and anomalies, we employ a supervised method of consulting human mission experts in the approach presented in this paper. Our longer term goal is to develop more automated methods for detecting anomalies in time series data, and once anomalies are identified, use feature selection methods to build online detectors that can be used in future missions, thus contributing to making operations more effective and improving overall safety of the mission.
Authored by Gautam Biswas, hamed khorasgani, gerald stanje, Abhishek Dubey, somnath deb, and sudipto ghoshal
publication

A Testbed for Evaluating and Measuring Security and Resilience in CPS (Poster)

Authored by Bradley Potteiger, William Emfinger, Gabor Karsai, and Xenofon Koutsoukos
publication

A Preliminary Study of Hand Hygiene Compliance Characteristics with Machine Learning Methods

Authored by Peng Zhang, Jules White, Douglas Schmidt, and Tom Dennis

2015

publication

Transitioning the META Toolchain

Authored by Ted Bapty, Sandeep Neema, and Jason Scott
publication

Towards a Publish/Subscribe-based Open Policy Framework for Proactive Overlay Software Defined Networking

Authored by Akram Hakiri, Pascal Berthou, Prithviraj Patil, and Aniruddha Gokhale
publication

A Testbed to Simulate and Analyze Resilient Cyber-Physical Systems

Authored by Pranav Kumar, William Emfinger, and Gabor Karsai
publication

Systematic design of medical capsule robots

Authored by Marco Beccani, Hakan Tunc, Addisu Taddese, Ekawahyu Susilo, P Volgyesi, Akos Ledeczi, and Pietro Valdastri
publication

Structural health monitoring of bridges with piezoelectric AE sensors

Authored by O Yapar, P Basu, Peter Volgyesi, and Akos Ledeczi
publication

Structural Design and Analysis in the META Toolchain (status: review pending)

Authored by Robert Owens, Sandor Nyako, Robert Boyles, Fred Eisele, Joseph Hite, Michael Myers, Jason Scott, Ted Bapty, and Sandeep Neema
publication

Software Design and Implementation in the META Toolchain

Authored by Sandeep Neema, Ted Bapty, and Daniel Balasubramanian
publication

A simulation as a service cloud middleware

Many seemingly simple questions that individual users face in their daily lives may actually require substantial number of computing resources to identify the right answers. For example, a user may want to determine the right thermostat settings for different rooms of a house based on a tolerance range such that the energy consumption and costs can be maximally reduced while still offering comfortable temperatures in the house. Such answers can be determined through simulations. However, some simulation models as in this example are stochastic, which require the execution of a large number of simulation tasks and aggregation of results to ascertain if the outcomes lie within specified confidence intervals. Some other simulation models, such as the study of traffic conditions using simulations may need multiple instances to be executed for a number of different parameters. Cloud computing has opened up new avenues for individuals and organizations with limited resources to obtain answers to problems that hitherto required expensive and computationally-intensive resources. This paper presents SIMaaS, which is a cloud-based Simulation-as-a-Service to address these challenges. We demonstrate how lightweight solutions using Linux containers (e.g., Docker) are better suited to support such services instead of heavyweight hypervisor-based solutions, which are shown to incur substantial overhead in provisioning virtual machines on-demand. Empirical results validating our claims are presented in the context of two case studies.
Authored by Shashank Shekhar, Hamzah Abdel-Aziz, Michael Walker, Faruk Caglar, Aniruddha Gokhale, and Xenofon Koutsoukos
publication

ROSMOD: A Toolsuite for Modeling, Generating, Deploying, and Managing Distributed Real-time Component-based Software using ROS

Authored by Pranav Kumar, William Emfinger, Amogh Kulkarni, Gabor Karsai, Dexter Watkins, Benjamin Gasser, Cameron Ridgewell, and Amrutur Anilkumar
publication

Resilient Wireless Sensor Networks for Cyber-Physical Systems

Authored by Waseem Abbas, Aron Laszka, and Xenofon Koutsoukos
publication

Overview of the META Toolchain in the Adaptive Vehicle Make Progam (status: review pending)

Authored by Ted Bapty, Sandeep Neema, and Jason Scott
publication

Modular and Highly Configurable Computation Mobility Framework for Internet of Things

Authored by Prithviraj Patil, Aniruddha Gokhale, and Akram Hakiri
publication

The META Toolchain: Accomplishments and Open Challenges

Authored by Janos Sztipanovits, Ted Bapty, Sandeep Neema, Xenofon Koutsoukos, and Jason Scott
publication

META Toolchain Interface to Manufacturing

Authored by Jason Scott, Ted Bapty, and Robert Boyles
publication

Formal Verification and Reliability in the META Toolchain (status: review pending)

Authored by Xenofon Koutsoukos, Ted Bapty, and Sandeep Neema
publication

CyPhyML Language in the META Toolchain

Authored by Sandeep Neema, Jason Scott, and Ted Bapty
publication

A component-based approach for modeling failure propagations in power systems

Resiliency and reliability is of paramount impor- tance for energy cyber physical systems. Electrical protection systems including detection elements such as Distance Relays and actuation elements such as Breakers are designed to protect the system from abnormal operations and arrest failure propagation by rapidly isolating the faulty components. However, failure in the protection devices themselves can and do lead to major system events and fault cascades, often leading to blackouts. This paper augments our past work on Temporal Causal Diagrams (TCD), a modeling formalism designed to help reason about the failure progressions by (a) describing a way to generate the TCD model from the system specification, and (b) understand the system failure dynamics for TCD reasoners by configuring simulation models.
Authored by Ajay Chhokra, Abhishek Dubey, Nagahbhushan Mahadevan, and Gabor Karsai
publication

Case Studies and Use Cases in the META Toolchain (status: review pending)

Authored by Theodore Bapty, Sandeep Neema, Jason Scott, and Scott Eisele
publication

Case Studies and Use Cases in the META Toolchain (status: review pending)

Authored by Ted Bapty, Sandeep Neema, Jason Scott, and Scott Eisele

Pagination

  • First page « First
  • Previous page ‹‹
  • …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Current page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • …
  • Next page ››
  • Last page Last »
Download CSV

Footer Links A

  • About Us
  • Contact
  • LinkedIn

Footer Links B

  • Work at the Institute
  • Summer Program Info

1025 16th Avenue South

Nashville, Tennessee 37212

Phone: (615) 343-7472

Email: contact.isis at vanderbilt dot edu