| Towards Formally Verified Deep Neural Networks |
|
| Perspectives on Applying the Safety Case Approach for the Assurance of Complex Heterogeneous Systems |
|
| Case Study: Verifying Safety of a UUV Heading PID Controller |
|
| VeriCores: Cyber-Instrumenting Devices Built from Verified Components |
|
| High-Assurance Blockchains: Applications and Verification |
|
| Model-based System Certification – A Vision |
|
| Data-driven Safe Control for Nonlinear Systems |
|
| Resilient and Trustworthy Transactive Platform for Smart and Connected Communities |
|
| Intrusion and Anomaly Detection in Autonomous Vehicle Systems |
|
| Using Formal Methods to Reason About Neural Network Based Autonomous Systems |
|
| The KeYmaera X Theorem Prover: Hybrid Systems Verification and Verified Runtime Validation |
|
| Principles of Layered Attestation |
|
| Safe Pointers and Verifiable Automatic Heap Management without Garbage Collection |
|
| Architecture-Driven Assurance for Model-Based Systems Engineering |
|
| Keynote Presentation: Sandeep Neema |
|
| The Future of Cyber-autonomy |
|
| Keynote Presentation: Peter Feiler |
|
| Applying Symbolic Execution to Blockchain Applications |
|
| Keynote Presentation: Emin Gün Sirer |
|
| HACSAW: A Trusted Framework for Cyber Situational Awareness |
|
| HCSS Travel Reimbursement Form |
|
| Security at the Speed of DevOps: An application security framework for a Lean/Agile/DevOps environment |
|
| An Access Control Perspective on the Science of Security |
|
| A Ransomware Research Framework |
|
| Exploring the Raspberry Pi for Data Summarization in Wireless Sensor Networks |
|