Stars
This is a small AGV based project that I did in webots platform
This is the UVM environment for UART-APB IP core. This environment contains full UVM components. It is only used for studing and invetigating the UVM env.
🤖 Simulation of BARRET, a construction material-transporting robot, coded in C using Webots
My unimelb Capstone project, playing around sensor attacker & security solution
security of cyber physical systems
Collection of hybrid automaton models. This library of stateflow models is used to train algorithms for the identification of cyber-physical systems.
A simulation of a DDoS attack written in Python
Bayesian Inference and Structure Learning for Bayesian Attack Graph for Cyber Physical Systems.
A functional model of an elevator written in python used to conduct research about Cyber Attacks/Effects on CPS
A tool that converts a finite-state automaton to a regular expression using a domain-specific language created for the purpose.
Functional programming, logic programming and regular expressions exercises. Deterministic and Non-Deterministic Finite Automaton đź’ implementations.
Software to generate/manipulate automaton, formal grammar and regular expressions
Generator of state machines that accept the same language of a given regular expression using derivatives method.
Attack-Resilient Supervisory Control of Discrete Event Systems
Multi-robot systems that interact with non-deterministic environments, in addition to cooperating to achieve global objectives efficiently, each robot must be able to react safely and without block…
A python class to represent and execute a supervisor synthesized by Ramadge–Wonham Supervisor Control Theory (SCT)
Introduction to Cyber Attack
Attack Traffic Generation(ATG) tool enable users to explore automotive CAN bus cyber-security rapidly
This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.
Modern water distribution systems rely on computers, sensors and actuators for both monitoring and operational purposes. This combination of physical processes and embedded systems—cyber-physical s…
Attacks and detection technique using matlab simulink in CPS.