default search action
Georgios Bakirtzis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Georgios Bakirtzis, Manolis Chiou, Andreas Theodorou:
Negotiating Control: Neurosymbolic Variable Autonomy. CCIA 2024: 178-181 - [c10]Georgios Bakirtzis, Michail Savvas, Ruihan Zhao, Sandeep Chinchali, Ufuk Topcu:
Reduce, Reuse, Recycle: Categories for Compositional Reinforcement Learning. ECAI 2024: 2653-2660 - [i25]Georgios Bakirtzis, Manolis Chiou, Andreas Theodorou:
Negotiating Control: Neurosymbolic Variable Autonomy. CoRR abs/2407.16254 (2024) - [i24]Georgios Bakirtzis, Michail Savvas, Ruihan Zhao, Sandeep Chinchali, Ufuk Topcu:
Reduce, Reuse, Recycle: Categories for Compositional Reinforcement Learning. CoRR abs/2408.13376 (2024) - [i23]Georgios Bakirtzis, Andrea Aler Tubella, Andreas Theodorou, David Danks, Ufuk Topcu:
Navigating the sociotechnical labyrinth: Dynamic certification for responsible embodied AI. CoRR abs/2409.00015 (2024) - 2023
- [j10]Georgios Bakirtzis, Steven Carr, David Danks, Ufuk Topcu:
Dynamic Certification for Autonomous Systems. Commun. ACM 66(9): 64-72 (2023) - [j9]Tichakorn Wongpiromsarn, Mahsa Ghasemi, Murat Cubuktepe, Georgios Bakirtzis, Steven Carr, Mustafa O. Karabag, Cyrus Neary, Parham Gohari, Ufuk Topcu:
Formal Methods for Autonomous Systems. Found. Trends Syst. Control. 10(3-4): 180-407 (2023) - [c9]Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu:
Memoryless Adversaries in Imperfect Information Games. AAMAS 2023: 2379-2381 - [i22]Tichakorn Wongpiromsarn, Mahsa Ghasemi, Murat Cubuktepe, Georgios Bakirtzis, Steven Carr, Mustafa O. Karabag, Cyrus Neary, Parham Gohari, Ufuk Topcu:
Formal Methods for Autonomous Systems. CoRR abs/2311.01258 (2023) - [i21]Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu:
On the complexity of sabotage games for network security. CoRR abs/2312.13132 (2023) - 2022
- [j8]Georgios Bakirtzis, Tim Sherburne, Stephen C. Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming:
An ontological metamodel for cyber-physical system safety, security, and resilience coengineering. Softw. Syst. Model. 21(1): 113-137 (2022) - [j7]Georgios Bakirtzis, Fabrizio Genovese, Cody H. Fleming:
Yoneda Hacking: The Algebra of Attacker Actions. ACM Trans. Cyber Phys. Syst. 6(3): 25:1-25:27 (2022) - [c8]Georgios Bakirtzis, Ufuk Topcu:
AlgebraicSystems: Compositional Verification for Autonomous System Design. ICCPS 2022: 308-309 - [c7]Smitha Gautham, Georgios Bakirtzis, Alexander Will, Athira Varma Jayakumar, Carl R. Elks:
STPA-Driven Multilevel Runtime Monitoring for In-Time Hazard Detection. SAFECOMP 2022: 158-172 - [i20]Georgios Bakirtzis, Steven Carr, David Danks, Ufuk Topcu:
Dynamic Certification for Autonomous Systems. CoRR abs/2203.10950 (2022) - [i19]Georgios Bakirtzis, Ufuk Topcu:
AlgebraicSystems: Compositional Verification for Autonomous System Design. CoRR abs/2203.16343 (2022) - [i18]Smitha Gautham, Georgios Bakirtzis, Alexander Will, Athira V. Jayakumar, Carl R. Elks:
STPA-driven Multilevel Runtime Monitoring for In-time Hazard Detection. CoRR abs/2204.08999 (2022) - [i17]Georgios Bakirtzis, Michail Savvas, Ufuk Topcu:
Categorical semantics of compositional reinforcement learning. CoRR abs/2208.13687 (2022) - [i16]Minghui Sun, Zhaoyang Chen, Georgios Bakirtzis, Hassan Jafarzadeh, Cody H. Fleming:
A formal process of hierarchical functional requirements development for Set-Based Design. CoRR abs/2210.14434 (2022) - [i15]Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu:
Sensor Placement for Online Fault Diagnosis. CoRR abs/2211.11741 (2022) - 2021
- [j6]Cody H. Fleming, Carl R. Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan T. Carter, Peter A. Beling, Barry M. Horowitz:
Cyberphysical Security Through Resiliency: A Systems-Centric Approach. Computer 54(6): 36-45 (2021) - [j5]Georgios Bakirtzis, Eswaran Subrahmanian, Cody H. Fleming:
Compositional Thinking in Cyberphysical Systems Theory. Computer 54(12): 50-59 (2021) - [j4]Georgios Bakirtzis, Cody H. Fleming, Christina Vasilakopoulou:
Categorical Semantics of Cyber-Physical Systems Theory. ACM Trans. Cyber Phys. Syst. 5(3): 32:1-32:32 (2021) - [i14]Georgios Bakirtzis, Fabrizio Genovese, Cody H. Fleming:
Yoneda Hacking: The Algebra of Attacker Actions. CoRR abs/2103.00044 (2021) - [i13]Georgios Bakirtzis, Eswaran Subrahmanian, Cody H. Fleming:
Compositional Thinking in Cyber-Physical Systems Theory. CoRR abs/2105.12911 (2021) - [i12]Georgios Bakirtzis:
Compositional Cyber-Physical Systems Theory. CoRR abs/2109.04858 (2021) - 2020
- [j3]Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody Harrison Fleming, Carl R. Elks:
Data-Driven Vulnerability Exploration for Design Phase System Analysis. IEEE Syst. J. 14(4): 4864-4873 (2020) - [c6]Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming:
Fundamental Challenges of Cyber-Physical Systems Security Modeling. DSN (Supplements) 2020: 33-36 - [c5]Georgios Bakirtzis, Christina Vasilakopoulou, Cody H. Fleming:
Compositional Cyber-Physical Systems Modeling. ACT 2020: 125-138 - [i11]Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming:
Fundamental Challenges of Cyber-Physical Systems Security Modeling. CoRR abs/2005.00043 (2020) - [i10]Georgios Bakirtzis, Tim Sherburne, Stephen C. Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming:
An Ontological Metamodel for Cyber-Physical System Safety, Security, and Resilience Coengineering. CoRR abs/2006.05304 (2020) - [i9]Georgios Bakirtzis, Cody H. Fleming, Christina Vasilakopoulou:
Categorical Semantics of Cyber-Physical Systems Theory. CoRR abs/2010.08003 (2020) - [i8]Cody H. Fleming, Carl R. Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan T. Carter, Peter A. Beling, Barry M. Horowitz:
Cyber-Physical Security Through Resiliency: A Systems-centric Approach. CoRR abs/2011.14469 (2020)
2010 – 2019
- 2019
- [j2]Bryan T. Carter, Georgios Bakirtzis, Carl R. Elks, Cody H. Fleming:
Systems-theoretic security requirements modeling for cyber-physical systems. Syst. Eng. 22(5): 411-421 (2019) - [j1]Bryan T. Carter, Stephen C. Adams, Georgios Bakirtzis, Tim Sherburne, Peter A. Beling, Barry M. Horowitz, Cody H. Fleming:
A Preliminary Design-Phase Security Methodology for Cyber-Physical Systems. Syst. 7(2): 21 (2019) - [c4]Smitha Gautham, Georgios Bakirtzis, Matthew T. Leccadito, Robert H. Klenke, Carl R. Elks:
A multilevel cybersecurity and safety monitor for embedded cyber-physical systems: WIP abstract. ICCPS 2019: 320-321 - [i7]Minghui Sun, Georgios Bakirtzis, Hassan Jafarzadeh, Cody H. Fleming:
Correct-by-construction: a contract-based semi-automated requirement decomposition process. CoRR abs/1909.02070 (2019) - [i6]Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody H. Fleming, Carl R. Elks:
Data Driven Vulnerability Exploration for Design Phase System Analysis. CoRR abs/1909.02923 (2019) - 2018
- [c3]Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming:
A model-based approach to security analysis for cyber-physical systems. SysCon 2018: 1-8 - [c2]Bryan T. Carter, Georgios Bakirtzis, Carl R. Elks, Cody H. Fleming:
A systems approach for eliciting mission-centric security requirements. SysCon 2018: 1-8 - [c1]Georgios Bakirtzis, Brandon J. Simon, Cody H. Fleming, Carl R. Elks:
Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis. VizSEC 2018: 1-8 - [i5]Georgios Bakirtzis, Brandon J. Simon, Cody H. Fleming, Carl R. Elks:
Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis. CoRR abs/1808.08081 (2018) - [i4]Smitha Gautham, Georgios Bakirtzis, Matthew T. Leccadito, Robert H. Klenke, Carl R. Elks:
A Multilevel Cybersecurity and Safety Monitor for Embedded Cyber-Physical Systems. CoRR abs/1812.03377 (2018) - 2017
- [i3]Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming:
A Model-Based Approach to Security Analysis for Cyber-Physical Systems. CoRR abs/1710.11442 (2017) - [i2]Bryan T. Carter, Georgios Bakirtzis, Carl R. Elks, Cody H. Fleming:
A Systems Approach for Eliciting Mission-Centric Security Requirements. CoRR abs/1711.00838 (2017) - [i1]Georgios Bakirtzis, Bryan T. Carter, Cody H. Fleming, Carl R. Elks:
MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis. CoRR abs/1712.01448 (2017)
Coauthor Index
aka: Cody Harrison Fleming
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint