Journal: TCPS

Volume 7, Issue 4

0 -- 0Francis Tiausas, Keiichi Yasumoto, Jose Paolo Talusan, Hayato Yamana, Hirozumi Yamaguchi, Shameek Bhattacharjee, Abhishek Dubey, Sajal K. Das 0001. HPRoP: Hierarchical Privacy-preserving Route Planning for Smart Cities
0 -- 0Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Chadi Assi. Investigating the Security of EV Charging Mobile Applications as an Attack Surface
0 -- 0Ertem Esiner, Utku Tefek, Daisuke Mashima, Binbin Chen 0001, Zbigniew Kalbarczyk, David M. Nicol. Message Authentication and Provenance Verification for Industrial Control Systems
0 -- 0Mohammad H. Mamduhi, Ehsan Hashemi. Event-Triggered Control with Intermittent Communications over Erasure Channels for Leader-Follower Problems with the Combined-Slip Effect
0 -- 0Xueli Fan, Qixin Wang, Jie Liu 0001. A Reliable Wireless Protocol for Highway and Metered-Ramp CAV Collaborative Merging with Constant-Time-Headway Safety Guarantee
0 -- 0Hassan Mousavi, Ali Ebnenasir, Elham Mahmoudzadeh. Formal Specification, Verification and Repair of Contiki's Scheduler
0 -- 0Anqi Fu, Sijia Chen, Junfei Qiao 0001, Chengpu Yu. Periodic Event-Triggered CACC and Communication Co-design for Vehicle Platooning
0 -- 0Tommaso Zoppi, Innocenzo Mungiello, Andrea Ceccarelli, Alberto Cirillo, Lorenzo Sarti, Lorenzo Esposito, Giuseppe Scaglione, Sergio Repetto, Andrea Bondavalli. Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard

Volume 7, Issue 3

0 -- 0Adnan Mahmood, Quan Z. Sheng, Wei Emma Zhang, Yan Wang 0002, Subhash Sagar. Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles
0 -- 0Naomi Stricker, Yingzhao Lian, Yuning Jiang, Colin N. Jones, Lothar Thiele. Self-triggered Control with Energy Harvesting Sensor Nodes
0 -- 0Yi-Ting Hsieh, Tzu-Tao Chang, Chen-Jun Tsai, Shih-Lun Wu, Ching-Yuan Bai, Kai-Chieh Chang, Chung-Wei Lin, Eunsuk Kang, Chao Huang 0015, Qi Zhu 0002. System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints
0 -- 0Théo Serru, Nga Nguyen 0001, Michel Batteux, Antoine Rauzy. Minimal Critical Sequences in Model-based Safety and Security Analyses: Commonalities and Differences
0 -- 0Abdullah Al Maruf, Luyao Niu, Andrew Clark 0001, J. Sukarno Mertoguno, Radha Poovendran. A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint
0 -- 0Sandeep Banik, Thiagarajan Ramachandran, Arnab Bhattacharya 0005, Shaunak D. Bopardikar. Automated Adversary-in-the-Loop Cyber-Physical Defense Planning

Volume 7, Issue 2

0 -- 0Eugene Vinitsky, Nathan Lichtlé, Kanaad Parvate, Alexandre M. Bayen. Optimizing Mixed Autonomy Traffic Flow with Decentralized Autonomous Vehicles and Multi-Agent Reinforcement Learning
0 -- 0Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, Pete Burnap. Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective
0 -- 0Anas Alsoliman, Giulio Rigoni, Davide Callegaro, Marco Levorato, Cristina M. Pinotti, Mauro Conti. Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics
0 -- 0Daniel Markert, Alejandro Masrur. A Two-Speed Synchronous Traffic Protocol for Intelligent Intersections: From Single-Vehicle to Platoon Crossing
0 -- 0Abdulrahman Fahim, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Amit K. Roy Chowdhury, Lance M. Kaplan, Tarek F. Abdelzaher. AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning
0 -- 0Handi Yu, Xin Li. Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving
0 -- 0Nitasha Sahani, Ruoxi Zhu, Jin-Hee Cho, Chen-Ching Liu. Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey

Volume 7, Issue 1

0 -- 0Yanbing Mao, Yuliang Gu, Naira Hovakimyan, Lui Sha, Petros G. Voulgaris. 1-Simplex: Safe Velocity Regulation of Self-Driving Vehicles in Dynamic and Unforeseen Environments
0 -- 0Mazen Mohamad, Rodi Jolak, Örjan Askerdal, Jan-Philipp Steghöfer, Riccardo Scandariato. CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems
0 -- 0Jarul Mehta, Guillaume Richard, Loren Lugosch, Derek Yu, Brett H. Meyer. DT-DS: CAN Intrusion Detection with Decision Tree Ensembles
0 -- 0Jiyang Chen, Tomasz Kloda, Rohan Tabish, Ayoosh Bansal, Chien-Ying Chen, Bo Liu 0044, Sibin Mohan, Marco Caccamo, Lui Sha. SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors
0 -- 0Yuri Gil Dantas, Vivek Nigam. Automating Safety and Security Co-design through Semantically Rich Architecture Patterns
0 -- 0Samarjit Chakraborty, Somesh Jha, Soheil Samii, Philipp Mundhenk. Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1
0 -- 0Daniel Angermeier, Hannah Wester, Kristian Beilke, Gerhard Hansch, Jörn Eichler. Security Risk Assessments: Modeling and Risk Level Propagation
0 -- 0Ipsita Koley, Soumyajit Dey, Debdeep Mukhopadhyay, Sachin Kumar Singh, Lavanya Lokesh, Shantaram Vishwanath Ghotgalkar. CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software