<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cyber-Physical Systems</title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cyber-Physical Systems</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/cyber-physical-systems/atom/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 20 Apr 2022 00:00:00 -0400</lastBuildDate><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>Accelerating Safety Assurance</title><link>https://www.sei.cmu.edu/blog/accelerating-safety-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Systems in which software components closely interact with physical processes are known as cyber-physical systems. This post describes promising results in assuring the safety of cyber-physical systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dionisio de Niz</dc:creator><pubDate>Mon, 07 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/accelerating-safety-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Safety-Related Requirements</category><category>Cyber-Physical Systems</category></item><item><title>KalKi: Solution for High Assurance Software-Defined IoT Security</title><link>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Commercial Internet of things (IoT) devices are evolving rapidly, providing new and potentially useful capabilities. These devices can be a valuable source of data....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sebastián Echeverría</dc:creator><pubDate>Mon, 15 Jun 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category><category>Internet of Things</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Scope vs. Frequency in Defining a Minimum Viable Capability Roadmap: Part 2 of 3</title><link>https://www.sei.cmu.edu/blog/scope-vs-frequency-in-defining-a-minimum-viable-capability-roadmap-part-2-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In the first post in this series, I introduced the concept of the Minimum Viable Capability (MVC). While the intent of the Minimum Viable Product (MVP) strategy is to focus on rapidly developing and validating only essential product features....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Binder</dc:creator><pubDate>Mon, 17 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/scope-vs-frequency-in-defining-a-minimum-viable-capability-roadmap-part-2-of-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category><category>Mission Assurance</category></item><item><title>Introducing the Minimum Viable Capability Strategy</title><link>https://www.sei.cmu.edu/blog/introducing-the-minimum-viable-capability-strategy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It's common for large-scale cyber-physical systems (CPS) projects to burn huge amounts of time and money with little to show for it....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Binder</dc:creator><pubDate>Mon, 06 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/introducing-the-minimum-viable-capability-strategy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category><category>Mission Assurance</category></item><item><title>Verifying Distributed Adaptive Real-Time Systems</title><link>https://www.sei.cmu.edu/blog/verifying-distributed-adaptive-real-time-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores high-assurance software in DART systems, and outlines the SEI's approach to meet safety requirements in dynamic environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">James Edmondson, Sagar Chaki</dc:creator><pubDate>Mon, 10 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/verifying-distributed-adaptive-real-time-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Artificial Intelligence Engineering</category><category>Model Checking</category><category>Verification</category><category>Autonomy and Counter-Autonomy</category><category>Real-Time Scheduling</category><category>Artificial Intelligence</category><category>Cyber-Physical Systems</category></item><item><title>Cyber Intelligence and Critical Thinking</title><link>https://www.sei.cmu.edu/blog/cyber-intelligence-and-critical-thinking/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post on cyber intelligence emphasizes critical thinking and presents a 3-step approach to a holistic view of cyber threats.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jay McAllister</dc:creator><pubDate>Mon, 15 Feb 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cyber-intelligence-and-critical-thinking/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category></item><item><title>A Five-Year Technical Strategic Plan for the SEI</title><link>https://www.sei.cmu.edu/blog/a-five-year-technical-strategic-plan-for-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog outlines a 5-year strategic plan for addressing government software and cybersecurity challenges with the best methods and technologies.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Fall</dc:creator><pubDate>Mon, 16 Feb 2015 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/a-five-year-technical-strategic-plan-for-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>High-Performance Computing</category><category>Cyber-Physical Systems</category><category>Big Data</category></item><item><title>The SEI Blog: A Two-Year Retrospective</title><link>https://www.sei.cmu.edu/blog/the-sei-blog-a-two-year-retrospective/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>After 114 posts, and 72,608 visits from readers of our blog, this post reflects on some highlights from the last two years and gives our readers a preview of posts to come.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 01 Apr 2013 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-sei-blog-a-two-year-retrospective/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Cyber-Physical Systems</category><category>Software Sustainment</category><category>Agile</category></item><item><title>Looking Ahead: The SEI Technical Strategic Plan</title><link>https://www.sei.cmu.edu/blog/looking-ahead-the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post discusses the remaining elements of the SEI strategic plan: designed-in security, critical component capabilities, and cybersecurity tradecraft.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bill Scherlis</dc:creator><pubDate>Mon, 07 Jan 2013 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/looking-ahead-the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Ultra-Large-Scale Systems</category><category>Acquisition Transformation</category><category>Agile</category><category>Software Architecture</category><category>Cyber-Physical Systems</category></item><item><title>Assessing the State of the Practice of Cyber Intelligence</title><link>https://www.sei.cmu.edu/blog/assessing-the-state-of-the-practice-of-cyber-intelligence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the state of cyber intelligence practices in the industry and offers insights on assessing, enhancing, and measuring maturity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Troy Townsend</dc:creator><pubDate>Mon, 17 Dec 2012 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/assessing-the-state-of-the-practice-of-cyber-intelligence/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category></item><item><title>Real-Time Scheduling on Heterogenous Multicore Processors</title><link>https://www.sei.cmu.edu/blog/real-time-scheduling-on-heterogenous-multicore-processors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore challenges and techniques for achieving real-time scheduling on heterogeneous multicore processors in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bjorn Andersson</dc:creator><pubDate>Mon, 12 Mar 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/real-time-scheduling-on-heterogenous-multicore-processors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Multicore Processors</category><category>Real-Time Scheduling</category><category>Cyber-Physical Systems</category></item><item><title>Bridging the "Valley of Disappointment" for DoD Software Research with SPRUCE</title><link>https://www.sei.cmu.edu/blog/bridging-the-valley-of-disappointment-for-dod-software-research-with-spruce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the SPRUCE initiative's efforts to bridge the "valley of disappointment" in DoD software research in this informative SEI Blog.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 07 Nov 2011 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/bridging-the-valley-of-disappointment-for-dod-software-research-with-spruce/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Tactical Systems</category><category>Cyber-Physical Systems</category></item><item><title>Toward Safe Optimization of Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/toward-safe-optimization-of-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the SEI's latest research on supporting mixed-criticality operations through increased CPU function time in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dionisio de Niz</dc:creator><pubDate>Mon, 31 Oct 2011 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/toward-safe-optimization-of-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category></item><item><title>Ensuring Safety in Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/ensuring-safety-in-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover research currently conducted at the SEI to optimize the performance of cyber-physical systems without compromising their safety.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dionisio de Niz</dc:creator><pubDate>Mon, 25 Apr 2011 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ensuring-safety-in-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category></item></channel></rss>