<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Cyber-Physical Systems</title><link href="http://www.sei.cmu.edu/feeds/topic/cyber-physical-systems/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/topic/cyber-physical-systems/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/topic/cyber-physical-systems/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2025-10-20T00:00:00-04:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Cyber-Physical Systems</subtitle><entry><title>Radio-Frequency Attacks: Securing the OSI Stack</title><link href="https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-10-20T00:00:00-04:00</published><updated>2025-10-20T00:00:00-04:00</updated><author><name>Joseph McIlvenny</name></author><id>https://www.sei.cmu.edu/blog/radio-frequency-attacks-securing-the-osi-stack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post reviews common radio frequency attacks and investigates how software and cybersecurity play key roles in these exploitations.</summary></entry><entry><title>Radio Frequency 101: Can You Really Hack a Radio Signal?</title><link href="https://www.sei.cmu.edu/blog/radio-frequency-101-can-you-really-hack-a-radio-signal/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-06-16T00:00:00-04:00</published><updated>2025-06-16T00:00:00-04:00</updated><author><name>Roxxanne White, Michael Bragg</name></author><id>https://www.sei.cmu.edu/blog/radio-frequency-101-can-you-really-hack-a-radio-signal/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Recent reports indicate the DoD is susceptible to radio frequency (RF) attacks. This post discusses common RF tools and ways malicious actors can attack systems.</summary><category term="Cybersecurity"/><category term="Internet of Things"/></entry><entry><title>Cybersecurity of Logistics Decision Models</title><link href="https://www.sei.cmu.edu/blog/cybersecurity-of-logistics-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-03-20T00:00:00-04:00</published><updated>2025-03-20T00:00:00-04:00</updated><author><name>Clarence Worrell, Lauren Hoge</name></author><id>https://www.sei.cmu.edu/blog/cybersecurity-of-logistics-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Goods, services, and people simply cannot get to where they are needed without effective logistics. In this blog post we will focus on cyber attacks to logistics decision models.</summary></entry><entry><title>Cyber-Physical Sensing to Extend the National Intelligence, Surveillance, and Reconnaissance Mesh</title><link href="https://www.sei.cmu.edu/blog/cyber-physical-sensing-to-extend-the-national-intelligence-surveillance-and-reconnaissance-mesh/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-11-25T00:00:00-05:00</published><updated>2024-11-25T00:00:00-05:00</updated><author><name>Matt Walsh, David Schulker, Dominic Ross, Devin Cortese</name></author><id>https://www.sei.cmu.edu/blog/cyber-physical-sensing-to-extend-the-national-intelligence-surveillance-and-reconnaissance-mesh/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">With the growing importance of improved sensing for national security, leveraging sensors in consumer products or embedded in devices can be economical, flexible, and timely.</summary><category term="Tactical Systems"/><category term="Edge-Enabled Systems"/><category term="Edge Computing"/></entry><entry><title>Don’t Wait for ROI on Model-Based Analysis for Embedded Computing Resources</title><link href="https://www.sei.cmu.edu/blog/dont-wait-for-roi-on-model-based-analysis-for-embedded-computing-resources/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-11-27T00:00:00-05:00</published><updated>2023-11-27T00:00:00-05:00</updated><author><name>Alfred Schenker, Jerome Hugues</name></author><id>https://www.sei.cmu.edu/blog/dont-wait-for-roi-on-model-based-analysis-for-embedded-computing-resources/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post examines the design and implementation of embedded computing resources for CPS and the complexities that drive the need for model building.</summary><category term="Model Checking"/></entry><entry><title>Assuring Cyber-Physical Systems in an Age of Rising Autonomy</title><link href="https://www.sei.cmu.edu/blog/assuring-cyber-physical-systems-in-an-age-of-rising-autonomy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-10-16T00:00:00-04:00</published><updated>2023-10-16T00:00:00-04:00</updated><author><name>Jerome Hugues</name></author><id>https://www.sei.cmu.edu/blog/assuring-cyber-physical-systems-in-an-age-of-rising-autonomy/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post discusses research by the SEI and Georgia Tech to address a number of challenges related to the rising volume of sensor data in autonomous cyber-physical systems.</summary><category term="Verification"/></entry><entry><title>Systems Engineering and Software Engineering: Collaborating for the Smart Systems of the Future</title><link href="https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-09-20T00:00:00-04:00</published><updated>2021-09-20T00:00:00-04:00</updated><author><name>Paul Nielsen</name></author><id>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Convergence between systems engineering and software engineering is forging new practices for engineering the smart systems of the future.</summary><category term="Software Architecture"/><category term="Artificial Intelligence Engineering"/><category term="Machine Learning"/><category term="Artificial Intelligence"/><category term="Systems Engineering"/><category term="Devops"/><category term="Data Modeling and Analytics"/><category term="Digital Engineering"/><category term="Model-Based Systems Engineering"/><category term="Continuous Deployment of Capability"/></entry><entry><title>Safety Assurance Does Not Provide Software Assurance</title><link href="https://www.sei.cmu.edu/blog/safety-assurance-does-not-provide-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-08-02T00:00:00-04:00</published><updated>2021-08-02T00:00:00-04:00</updated><author><name>Mark Sherman</name></author><id>https://www.sei.cmu.edu/blog/safety-assurance-does-not-provide-software-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog on cybersecurity in cyber-physical systems (CPS), shows how safety evaluations fail to protect against cyber threats.</summary><category term="Software Assurance"/></entry><entry><title>Accelerating Safety Assurance</title><link href="https://www.sei.cmu.edu/blog/accelerating-safety-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-06-07T00:00:00-04:00</published><updated>2021-06-07T00:00:00-04:00</updated><author><name>Dionisio de Niz</name></author><id>https://www.sei.cmu.edu/blog/accelerating-safety-assurance/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Systems in which software components closely interact with physical processes are known as cyber-physical systems. This post describes promising results in assuring the safety of cyber-physical systems.</summary><category term="Safety-Related Requirements"/><category term="Cyber-Physical Systems"/></entry></feed>