8000 qjd1217 / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View qjd1217's full-sized avatar

Block or report qjd1217

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Learn IC Verification the hard way

HTML 1 Updated Feb 10, 2023

This is a small AGV based project that I did in webots platform

8 Updated May 15, 2021
SystemVerilog 10 2 Updated May 8, 2022

This is the UVM environment for UART-APB IP core. This environment contains full UVM components. It is only used for studing and invetigating the UVM env.

SystemVerilog 24 5 Updated Nov 24, 2019

🤖 Simulation of BARRET, a construction material-transporting robot, coded in C using Webots

C 1 Updated Mar 30, 2021

My unimelb Capstone project, playing around sensor attacker & security solution

MATLAB 3 Updated Sep 1, 2018

security of cyber physical systems

Python 3 Updated May 19, 2022

Collection of hybrid automaton models. This library of stateflow models is used to train algorithms for the identification of cyber-physical systems.

MATLAB 2 Updated Apr 26, 2022
Python 3 Updated Aug 5, 2021

A simulation of a DDoS attack written in Python

JavaScript 1 Updated Dec 6, 2021
Python 1 Updated Mar 18, 2021

Bayesian Inference and Structure Learning for Bayesian Attack Graph for Cyber Physical Systems.

Jupyter Notebook 5 2 Updated Jun 26, 2023

A functional model of an elevator written in python used to conduct research about Cyber Attacks/Effects on CPS

Python 1 4 Updated May 13, 2018

A tool that converts a finite-state automaton to a regular expression using a domain-specific language created for the purpose.

Java 1 Updated May 16, 2018

Functional programming, logic programming and regular expressions exercises. Deterministic and Non-Deterministic Finite Automaton đź’­ implementations.

Python 1 Updated Dec 13, 2021

Software to generate/manipulate automaton, formal grammar and regular expressions

Python 2 Updated May 12, 2016

Generator of state machines that accept the same language of a given regular expression using derivatives method.

Python 5 1 Updated Dec 28, 2013

Attack-Resilient Supervisory Control of Discrete Event Systems

Jupyter Notebook 6 Updated May 25, 2025

Multi-robot systems that interact with non-deterministic environments, in addition to cooperating to achieve global objectives efficiently, each robot must be able to react safely and without block…

MATLAB 2 Updated Feb 5, 2021

A python class to represent and execute a supervisor synthesized by Ramadge–Wonham Supervisor Control Theory (SCT)

Python 2 Updated Jan 24, 2023
Python 2 Updated Feb 17, 2020

Introduction to Cyber Attack

4 2 Updated Jan 20, 2019

Attack Traffic Generation(ATG) tool enable users to explore automotive CAN bus cyber-security rapidly

Python 18 13 Updated Jun 26, 2018

This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.

Python 28 8 Updated Apr 15, 2021

Modern water distribution systems rely on computers, sensors and actuators for both monitoring and operational purposes. This combination of physical processes and embedded systems—cyber-physical s…

Jupyter Notebook 21 11 Updated Jan 2, 2019

Attacks and detection technique using matlab simulink in CPS.

MATLAB 16 5 Updated Jun 22, 2020
Next
0