Abstract: Cybersecurity is gaining a high position in the IT sector. Connecting more devices to the internet smooths the way for hackers. It is hard for signature-based security tools to detect new ...
Abstract: This letter presents a novel approach for reachability analysis of using constrained polynomial logical zonotopes. We perform reachability analysis to compute the set of reachable states ...