default search action
Steven Drager 0001
Person information
- affiliation: Air Force Research Laboratory, AFRL/RITA, Trusted and Resilient Systems Branch, Information Directorate, Rome, NY
Other persons with the same name
- Steven Drager — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Weizhe Xu, Mengyu Liu, Steven Drager, Matthew Anderson, Fanxin Kong:
Poster Abstract: Assuring LLM-Enabled Cyber-Physical Systems. ICCPS 2024: 287-288 - [c17]Lin Zhang, Luis Burbano, Xin Chen, Alvaro A. Cárdenas, Steven Drager, Matthew Anderson, Fanxin Kong:
Fast Attack Recovery for Stochastic Cyber-Physical Systems. RTAS 2024: 280-293 - 2023
- [j8]Sina Yari-Karin, Hakan Aydin, Dakai Zhu, Steven Drager, Matthew Anderson:
Impact of priority assignment on schedule-based attacks in real-time embedded systems. J. Syst. Archit. 145: 103021 (2023) - [j7]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Muneeba Asif, Alvi Ataur Khalil, Hisham A. Kholidy, Matthew Anderson, Steven Drager:
Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives. IEEE Trans. Netw. Serv. Manag. 20(1): 138-151 (2023) - [c16]Ioannis Nearchou, Lance Rafalko, Ryan Phillips, Matthew Anderson, Wuwei Shen, Steven Drager:
An Assurance Case Driven Development Paradigm for Autonomous Vehicles: An F1TENTH Racing Car Case Study. SERA 2023: 156-161 - 2022
- [c15]Dakai Zhu, Steven Drager, Matthew Anderson, Hakan Aydin:
Work-in-Progress: Victim-Aware Scheduling for Robust Operations in Safety-Critical Systems. RTSS 2022: 487-490 - 2020
- [c14]Mohammad Ashiqur Rahman, Rahat Masum, Matthew Anderson, Steven L. Drager:
Formal Synthesis of Trajectories for Unmanned Aerial Vehicles to Perform Resilient Surveillance of Critical Power Transmission Lines. ICECCS 2020: 103-112 - [i3]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Matthew Anderson, Steven Drager:
Automated Trajectory Synthesis for UAV Swarms Based on Resilient Data Collection Objectives. CoRR abs/2008.10782 (2020)
2010 – 2019
- 2019
- [i2]Mohammad Ashiqur Rahman, Rahat Masum, Matthew Anderson, Steven L. Drager:
Trajectory Synthesis for a UAV Swarm to Perform Resilient Requirement-Aware Surveillance: A Smart Grid-based Study. CoRR abs/1911.02512 (2019) - 2018
- [j6]Luan Viet Nguyen, Khaza Anuarul Hoque, Stanley Bak, Steven Drager, Taylor T. Johnson:
Cyber-Physical Specification Mismatches. ACM Trans. Cyber Phys. Syst. 2(4): 23:1-23:26 (2018) - [c13]Chung-Ling Lin, Wuwei Shen, Steven Drager, Betty H. C. Cheng:
Measure confidence of assurance cases in safety-critical domains. ICSE (NIER) 2018: 13-16 - [c12]Alvaro Velasquez, K. Subramani, Steven L. Drager:
Finding Minimum Stopping and Trapping Sets: An Integer Linear Programming Approach. ISCO 2018: 402-415 - [i1]Luan Viet Nguyen, Khaza Anuarul Hoque, Stanley Bak, Steven Drager, Taylor T. Johnson:
Cyber-Physical Specification Mismatches. CoRR abs/1806.09224 (2018) - 2017
- [c11]Steven Drager, Janusz Zalewski:
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems. MMM-ACNS 2017: 327-338 - 2016
- [j5]Janusz Zalewski, Ingrid A. Buckley, Bogdan D. Czejdo, Steven Drager, Andrew J. Kornecki, Nary Subramanian:
A Framework for Measuring Security as a System Property in Cyberphysical Systems. Inf. 7(2): 33 (2016) - [c10]Chung-Ling Lin, Wuwei Shen, Steven Drager:
A Framework to Support Generation and Maintenance of an Assurance Case. ISSRE Workshops 2016: 21-24 - [c9]Alvaro Velasquez, Piotr Wojciechowski, K. Subramani, Steven L. Drager, Sumit Kumar Jha:
The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networks. NCA 2016: 126-130 - 2015
- [j4]Yujian Fu, Steven Drager:
Reconfiguration of Autonomous Robotics. Int. J. Robotics Appl. Technol. 3(1): 41-58 (2015) - [c8]Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki, Bogdan D. Czejdo:
Modeling Resiliency and Its Essential Components for Cyberphysical Systems. FedCSIS (Position Papers) 2015: 107-114 - [c7]Taylor T. Johnson, Stanley Bak, Steven Drager:
Cyber-physical specification mismatch identification with dynamic analysis. ICCPS 2015: 208-217 - 2014
- [j3]Nary Subramanian, Steven Drager, William McKeever:
Recovering Software Design from Interviews Using the NFR Approach: An Experience Report. Adv. Softw. Eng. 2014: 124701:1-124701:14 (2014) - [c6]Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki:
Measuring Security: A Challenge for the Generation. FedCSIS (Position Papers) 2014: 131-140 - [c5]Yujian Fu, Steven Drager:
Modeling and Verification of Humanoid Robot Task Coordination. HASE 2014: 73-80 - 2013
- [c4]Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki:
Threat modeling for security assessment in cyberphysical systems. CSIIRW 2013: 10 - 2012
- [j2]Yujian Fu, Jeffery Kulick, Lok K. Yan, Steven Drager:
Formal Modeling and Verification of Security Property in Handel C Program. Int. J. Secur. Softw. Eng. 3(3): 50-65 (2012) - [c3]Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki:
Towards Experimental Assessment of Security Threats in Protecting the Critical Infrastructure. ENASE 2012: 207-212 - 2011
- [c2]Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki:
Can we measure security and how? CSIIRW 2011: 46 - 2010
- [j1]Aniruddha S. Gokhale, Mark P. McDonald, Steven Drager, William McKeever:
A Cyber Physical Systems Perspective on the Real-time and Reliable Dissemination of Information in Intelligent Transportation Systems. Netw. Protoc. Algorithms 2(3): 116-136 (2010)
2000 – 2009
- 2009
- [c1]Patrick J. Lardieri, Rick Buskens, Srini Srinivasan, William McKeever, Steven Drager:
SPRUCE: A web portal for the collaborative engineering of Software Intensive Systems Producibility challenge problems and solutions. CTS 2009: 276-283
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint