Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
An Algorithm of Optimal Penetration Path Generation under Unknown Attacks of Electric Power WEB System Based on Knowledge Graph
Submitted by aekwall on Mon, 01/10/2022 - 11:51am
power systems
pubcrawl
Resiliency
composability
Knowledge engineering
computer security
Complexity theory
network security
Predictive Metrics
attack graph
knowledge graph
Ontologies
ontology desig
optimal penetration path
power WEB system
attack graphs
biblio
Network Information Security Pipeline Based on Grey Relational Cluster and Neural Networks
Submitted by grigby1 on Mon, 01/10/2022 - 11:31am
information science
Resiliency
resilience
pubcrawl
policy-based governance
Pipelines
Neural networks
Metrics
machine learning
Intrusion Detection
information security
Neural Network Security
information entropy
Grey Relational Cluster
Data mining
cyber physical systems
Computational modeling
Complexity theory
collaboration
Artificial Neural Networks
artificial neural network
biblio
XAI Models for Quality of Experience Prediction in Wireless Networks
Submitted by grigby1 on Wed, 12/22/2021 - 11:54am
Predictive models
xai
wireless networks
Scalability
Resiliency
resilience
Radio frequency
quality of experience
pubcrawl
6G
Fuzzy Decision Trees
explainable artificial intelligence
evolutionary computation
Decision trees
Complexity theory
B5G
Analytical models
biblio
Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust
Submitted by grigby1 on Tue, 12/21/2021 - 2:20pm
Power measurement
zero trust
Web and internet services
Smart Grids
security protection
Scalability
Resiliency
resilience
pubcrawl
power systems
Power Mobile Interconnection
Computing Theory
policy-based governance
Human Factors
Human behavior
dynamic access control
Couplings
Continuous Trust Evaluation
Complexity theory
complex networks
collaboration
trust
biblio
FastMove: Fast IP Switching Moving Target Defense to Mitigate DDOS Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 11:35am
denial-of-service attack
Switches
Servers
Resiliency
resilience
pubcrawl
moving target defense
Metrics
IP networks
IP address
Zero day attacks
DDoS
Computer crime
computer architecture
composability
Complexity theory
Cloud Computing
Bot
attack
defense
biblio
Time and Communication Complexity of Leader Election in Anonymous Networks
Submitted by grigby1 on Tue, 12/21/2021 - 9:16am
ad-hoc networks
anonymous messaging
anonymous networks
Complexity theory
Computational modeling
Conferences
distributed algorithms
Knowledge engineering
Leader Election
network topology
Protocols
pubcrawl
resilience
Resiliency
Scalability
voting
biblio
Method of Detecting FDI Attacks on Smart Grid
Submitted by grigby1 on Thu, 12/02/2021 - 2:20pm
pubcrawl
Spatiotemporal phenomena
Smart Grid Sensors
Smart Grids
Smart Grid
Sensor Systems
Resiliency
resilience
real-time systems
Complexity theory
Intelligent sensors
IDS
Human Factors
Human behavior
FDI
cyber-physical system
Correlation
Compositionality
biblio
Scaling Application-Level Dynamic Taint Analysis to Enterprise-Scale Distributed Systems
Submitted by grigby1 on Mon, 11/29/2021 - 1:27pm
Complexity theory
composability
distributed systems
dynamic taint analysis
faces
Metrics
new bugs
pubcrawl
Scalability
software engineering
software tools
static analysis
taint analysis
tools
biblio
Verifying cryptographic protocols by Tamarin Prover
Submitted by aekwall on Tue, 10/12/2021 - 2:08pm
security
Cryptography
Computational modeling
privacy
pubcrawl
composability
Complexity theory
Compositionality
policy-based governance
Cryptographic Protocols
formal specifications
Planing
Session key secrecy
Tamarin prover
Verification of cryptographic protocols
protocol verification
biblio
MAFIA: Multi-Layered Architecture For IoT-Based Authentication
Submitted by grigby1 on Thu, 09/30/2021 - 10:09am
multifactor authentication
Metrics
Internet-of-Things
Human Factors
Human behavior
face recognition
energy consumption
deployment
Complexity theory
authentication
usability
security
Resiliency
resilience
pubcrawl
privacy
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »