Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Attacks on Digital Watermarks for Deep Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 1:54pm
deep learning models
watermark
statistical distribution
model prediction
Mobile app
intellectual property theft
fast response times.
Digital Watermarks
deep neural networks training
Deep Neural Network
At-tack
ip protection
copy protection
Watermarking
learning (artificial intelligence)
detection algorithms
neural nets
composability
standards
Computational modeling
industrial property
Mathematical model
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
Training
biblio
CPS Optimal Control for Interconnected Power Grid Based on Model Predictive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
power generation control
Trajectory
statistical methods
statistical analysis
standards
simulations
Resiliency
resilience
pubcrawl
Predictive models
predictive control
power system interconnection
power system control
power grids
AGC control strategy
optimal control
model predictive control
Metrics
interconnected power systems
interconnected power grid
frequency control
CPS optimal control
CPS modeling
CPS
control behavior
composability
automatic generation control
biblio
A gateway to easily integrate simulation platforms for co-simulation of cyber-physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
pubcrawl
Java
Large-scale systems
Libraries
Logic gates
Metrics
National Institute of Standards and Technology co-simulation platform
NIST co-simulation platform
Object oriented modeling
interacting physical components
Research Infrastructure
resilience
Resiliency
simulations
Software Architecture
standards
Universal CPS Environment
CPS modeling
high-level architecture standard
high level architecture
functional mock-up interface
distributed simulation
distributed processing
digital simulation
cyber-physical systems
CPS conceptual design
computer architecture
Computational modeling
composability
communication libraries
co-simulation expertise
co-simulation
simulation
biblio
Decentralized Identification and Certification System
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
flexible management
web of trust
web-of-trust concept
user identificators
integrity and authenticity
individual IoT sensor
identification and certification
decentralized system
decentralized public key infrastructure
decentralized identification
decentralized environment
current public key infrastructure
certification system
certification
Servers
public key infrastructure
computer science
authenticity
blockchain technology
public key cryptography
Public key
standards
composability
pubcrawl
Resiliency
History
Cryptographic Protocols
Internet of Things
biblio
Online Anomaly Detection of Time Series at Scale
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
real-time requirements
cyber situation awareness
data analysis techniques
financial stability
network stream monitoring
non-parametric methods
nonparametric techniques
online anomaly detection
parametric methods
cyber breaches
reputation damage
stock values
Streaming platforms
targeted corporations
time-series analysis methods
time-series anomaly detection
time-series data analysis
Damage Assessment
Anomaly Detection
Monitoring
Cloud Computing
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
standards
Business
security of data
Data mining
business operations
microsoft windows
time series
Time series analysis
automatic network-stream monitoring
cloud computing environments
cloud platforms
biblio
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Compositionality
Cyber Dependencies
Weisfeiler-Lehman graph kernel
System dependency graph
streamspot
simHash
online system dependency graph anomaly detection
multitasking systems
multiprogramming
modern operating systems
locality-sensitive hashing
graph similarity
extended Weisfeiler-Lehman kernel
embedding and clustering of heterogeneous graphs
dependency graph
clustering analysis
Intrusion Detection
Human Factors
pattern clustering
Forensics
Anomaly Detection
Clustering algorithms
standards
Metrics
graph theory
pubcrawl
Resiliency
Kernel
Task Analysis
Scalability
security of data
biblio
Modified AES using Dynamic S-Box and DNA Cryptography
Submitted by aekwall on Mon, 06/22/2020 - 11:27am
AES key generation
technological transformations
symmetric algorithms
secured algorithms
secret number generation
modified AES
fast processing
dynamic S-boxes
dynamic S-box
DNA cryptography
Diffie-Hellman key exchange
Diffie-Hellman
attack resistant algorithm
asymmetric algorithms
Cryptography
data exchange
AES
advanced encryption standard
Predictive Metrics
Heuristic algorithms
DNA
privacy
standards
pubcrawl
Human behavior
Resiliency
Conferences
encryption
biblio
Poster: rQUIC - integrating FEC with QUIC for robust wireless communications
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
secure transport protocol
pubcrawl
QUIC
quick UDP Internet connections
radio networks
resilience
Resiliency
robust wireless communications
rQUIC
Propagation losses
security standards
Servers
standards
telecommunication traffic
transport layer
transport protocols
Wireless communication
composability
multiplexed transport protocol
Metrics
Internet traffic
internet
HTTP based applications
forward error correction
FEC
experimental transport protocol
European Tier1-ISP
Error analysis
delays
default end-to-end encryption
Cryptography
connection establishment reduction
computer network security
biblio
Multi-Mediated Semi-Quantum Key Distribution
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
Protocols
telecommunication security
standards
shared secret key
Servers
semiquantum users
semiquantum key distribution protocol
security
Scalability
Resiliency
resilience
quantum noise
quantum cryptography
public key cryptography
pubcrawl
adversarial quantum server
private key cryptography
policy-based governance
multimediated SQKD protocol
multimediated semiquantum key distribution
Metrics
information theoretic security analysis
information theoretic security
Human Factors
Human behavior
Gain measurement
fully-quantum
Cryptographic Protocols
Companies
arbitrary MM-SQKD protocols
biblio
MidSecThings: Assurance Solution for Security Smart Homes in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
pubcrawl
telecommunication security
standards
Smart homes
Smart Home
Servers
security-based solutions
security smart homes
security of data
security approach
security
Resiliency
resilience
Remote Patterns
authentication
privacy
policy-based governance
MidSecThings
middleware security
middleware
IoT middleware
IoT devices
IoT
Internet of Things
home automation
distributed security mechanisms
data privacy
composability
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »