Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resilience
biblio
Detection of Composite Insulators Inner Defects Based on Flash Thermography
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
mathematical analysis
transmission line
thermal diffusion
Temperature measurement
Surface treatment
Surface contamination
Resiliency
resilience
pubcrawl
power transmission lines
Pollution measurement
Pollution
non-destructive testing
Metrics
mathematical analysis model
air defects
Insulators
infrared imaging
Human Factors
Human behavior
Heating systems
heat loss
heat diffusion
flash thermography
composite insulators
composite insulator inner defect detection
composite insulator
composability
Air gaps
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
biblio
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
Air gaps
Alloy
composability
Control Theory
cyber physical systems
device interaction modeling
Human behavior
Human Factors
Internet of Things
Metrics
privacy
pubcrawl
resilience
Resiliency
security and privacy
biblio
From Secure Business Process Modeling to Design-Level Security Verification
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
socio-technical systems
pubcrawl
resilience
Resiliency
SecBPMN2
security
security engineering framework
security of data
security requirements
procedural system descriptions
Stakeholders
system design
system developers
Systems architecture
UML
UMLsec policies
Unified modeling language
Air gaps
organizational aspects
organisational aspects
modeling
Model transformation
Metrics
Human Factors
Human behavior
formal verification
Formal Specification
design-level security verification
composability
business process modeling security
business data processing
BPMN
air traffic management system
biblio
Application of Deep Learning Technique for Automatic Data Exchange with Air-Gapped Systems and Its Security Concerns
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
DHT11 sensor
security
Resiliency
resilience
pubcrawl
Metrics
Internet of Things
Humidity
Human Factors
Human behavior
Air gaps
DH-HEMTs
deep learning
data exchange
Conferences
computer security
composability
Arduino board
Air-Gapped Systems
biblio
Implementation of industrial cloud applications as controlled local systems (CLS) in a smart grid context
Submitted by grigby1 on Wed, 02/21/2018 - 1:54pm
power engineering computing
wide area networks
smart power grids
smart meters
smart metering infrastructure
Smart Grids
Smart Grid Privacy
smart grid context
security
Scalability
Resiliency
resilience
remotely controlled devices
pubcrawl
Cloud Computing
Meters
Logic gates
industrial machines
Industrial Cloud Applications match
Human Factors
Human behavior
Germany
energy devices
data privacy
Controllable Local Systems
control systems
collected measurement data
CLS devices
biblio
Secure power scheduling auction for smart grids using homomorphic encryption
Submitted by grigby1 on Wed, 02/21/2018 - 1:54pm
encryption
Homomorphic encryption
Human behavior
Human Factors
paillier cryptosystem
Power Scheduling Auction
pubcrawl
resilience
Resiliency
resource management
Scalability
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
biblio
Towards a secure smart grid storage communications gateway
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
internetworking
telecommunication security
standards
smart power grids
Smart Grids
Smart Grid Privacy
security requirements
secure smart energy communications devices
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy issues
machine-to-machine communication
Logic gates
authentication
ICT system
Human Factors
Human behavior
HORIZON 2020 project STORY
hands-on configuration advice
Energy storage
Energy Efficiency
electric storage technologies
data storage
cyber-physical systems
cyber security measures
Cryptography
communications gateway
communication line security
backend M2M communications protocols
biblio
Quantum approach to the information privacy in Smart Grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
pubcrawl
smart power grids
Smart Grids
Smart Grid Privacy
Smart Grid
Schedules
Scalability
Resiliency
resilience
Quantum Key Distribution
quantum cryptography
Communication networks
Protocols
power system security
information privacy
Human Factors
Human behavior
encoding
data privacy
Cryptography
complex grid system
biblio
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Scalability
Human behavior
Human Factors
power engineering computing
privacy
Privacy-preserving
privacy-preserving smart metering system
pubcrawl
resilience
Resiliency
Gaussian processes
Smart Grid Privacy
Smart Metering
smart meters
smart power grids
Transformation
wavelet perturbation algorithm
wavelet transformation
wavelet transforms
WPA
distributed processing
Aggregates
Australia
Cryptography
data aggregation
data privacy
DDP
differential privacy techniques
Distributed databases
distributed differential privacy
aggregate data queries
distributed smart meter data aggregation
ElGamal encryption mechanism
encryption
Fourier perturbation algorithm
Fourier transformation
Fourier transforms
FPA
Gaussian principles
« first
‹ previous
…
662
663
664
665
666
667
668
669
670
…
next ›
last »