Runtime verification or runtime monitoring equips safety-critical
cyber-...
Systems modeling practice lacks security analysis tools that can interfa...
Applying security as a lifecycle practice is becoming increasingly impor...
Cyber-physical systems (CPS) are composed of various embedded subsystems...
Today, there is a plethora of software security tools employing
visualiz...
Currently, perimeter-based approaches are the mainstay of cybersecurity....
Evaluating the security of cyber-physical systems throughout their life ...