30 September 2024

Link Team Supervisory Control and Monitoring 24/25

Using the following link https://teams.microsoft.com/l/team/19%3AlbPYjcnMaJyUypY6elaez0UnEwFDv8i6w8yRj3aJKcc1%40thread.tacv2/conversations?groupId=d550f658-f801-400a-832c-732781c96c41&tenantId=6bfa74cc-fe34-4d57-97d3-97fd6e0edee1 it is possible to join the team where I will upload all the material of the course and will post all the news.  Carla Seatzu

30 September 2024

Link Team Analisi dei Sistemi 24/25

Tramite il seguente link https://teams.microsoft.com/l/team/19%3AIx8Y8FnvE8AWwBeCMvXhHQeSKTAPN7Mz0r68oJiSexU1%40thread.tacv2/conversations?groupId=aa8dafda-d253-4121-912a-38bf7ba44182&tenantId=6bfa74cc-fe34-4d57-97d3-97fd6e0edee1 è possibile accedere al Team di Analisi dei Sistemi dove verrà postato il materiale didattico del corso e verranno messi eventuali avvisi. Carla Seatzu

27 May 2024

Course "Finite-State Dynamical Systems" by Prof. Kuize ZHANG

The course contains basic knowledge on two classes of finite-state dynamical systems --- finite automata and weighted automata. For the former, basic tools --- concurrent composition and observer will be introduced, how to use them to verify basic inference-based properties and concealment-based properties in discrete-event systems modelled by finite automata will be introduced as well. For the latter, only basic definitions will be introduced and compared over semirings and monoids. Students will acquire basic knowledge in control theory and computer science based on these two classes of systems, and will also catch a glimpse of similarities and differences between them.

14 May 2024

Short course on "Secret Protection in Discrete Event Systems" by Ziyue Ma, Xidian University, China

Security issues of cyber-physical systems have drawn much attention in recent years. A system usually contains some secrets that are not expected to be exposed or hacked by unauthorized external intruders. In this 4-hour lectures, we introduce to students a general framework to secret protection in discrete-event systems. Our aim is to design an event-protecting policy such that any user, either legal or unauthorized, who visits a secret state must successfully executes/hacks a number of protected events to have an authorization satisfying the safety requirement. Two criteria of optimality (disruptiveness and cost) of designing protecting policies will be considered.

Agenda

December 2024

No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled
No event scheduled

Teaching materials

Questionnaire and social

Share on:
Impostazioni cookie