In today\u27s highly interconnected and technology-reliant environment, cybersecurity is no longer limited to traditional computer systems and IT networks, as a number of highly publicized attacks have occurred against complex cyber-physical systems such as automobiles and airplanes. While numerous vulnerability analysis and architecture analysis approaches are in use, these approaches are often focused on realized systems with limited solution space. A more effective approach for understanding security and resiliency requirements early in the system development is needed. One such approach, systemtheoretic process analysis for security (STPA-Sec), addresses the cyber-physical security problem from a systems viewpoint at the conceptual stag...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many industries in the...
System security assurance provides the confidence that security features, practices, procedures, and...
In today’s highly interconnected and technology reliant environment, systems security is rapidly gro...
Safety-critical Cyber-physical Systems (CPS) in vehicles are becoming more and more complex and inte...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
This Paper presents an approach to requirement generation for complex and highly integrated aircraft...
The fundamental challenge facing security professionals is preventing losses, be they operational, f...
The increasing prevalence of cyber-attacks highlights the need for improved systems security analysi...
Many safety‐related systems are evolving into cyber‐physical systems (CPSs), integrating information...
The increased connectivity of critical maritime infrastructure (CMI) systems to digital networks hav...
Security is always a priority in the implementation of information technology solutions. The necessi...
Since 9/11, preventing similar terrorist disasters has been the predominant goal of aviation securit...
Cyber-physical systems represent an engineering challenge due to their safety and security concerns,...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many industries in the...
System security assurance provides the confidence that security features, practices, procedures, and...
In today’s highly interconnected and technology reliant environment, systems security is rapidly gro...
Safety-critical Cyber-physical Systems (CPS) in vehicles are becoming more and more complex and inte...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
This Paper presents an approach to requirement generation for complex and highly integrated aircraft...
The fundamental challenge facing security professionals is preventing losses, be they operational, f...
The increasing prevalence of cyber-attacks highlights the need for improved systems security analysi...
Many safety‐related systems are evolving into cyber‐physical systems (CPSs), integrating information...
The increased connectivity of critical maritime infrastructure (CMI) systems to digital networks hav...
Security is always a priority in the implementation of information technology solutions. The necessi...
Since 9/11, preventing similar terrorist disasters has been the predominant goal of aviation securit...
Cyber-physical systems represent an engineering challenge due to their safety and security concerns,...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many industries in the...
System security assurance provides the confidence that security features, practices, procedures, and...