Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed system
biblio
Security Issues of a Decentralized Blockchain-Based Messaging System
Submitted by grigby1 on Tue, 12/21/2021 - 9:17am
anonymous messaging
blockchain
blockchain network
blockchains
Cryptography
Decentralized messaging
distributed system
Peer-to-peer computing
pubcrawl
public key cryptography
resilience
Resiliency
Scalability
user interfaces
biblio
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
risk management
miniature ICS
proactive security response
probabilistic multiattribute vulnerability criticality analysis model
production engineering computing
pubcrawl
quantitative evaluation
quantitative security metrics
resilience
Resiliency
Metrics
Scalability
Security Criticality Analysis
Security Impact Analysis
security of data
security risk assessment scheme
Vulnerability Analysis
vulnerability host components
vulnerability severities
vulnerability-based impact criticality estimation
Functional Dependency
Compositionality
control engineering computing
control uncertainties
Cyber Dependencies
cyber environments
cyber security risks
cyber threats
Cybersecurity
distributed system
attack probabilities
Human Factors
ICS networks
ICS security
impact estimation
industrial control
Industrial Control System (ICS)
Industrial Control Systems
MAVCA model
biblio
A Game Theoretic Analysis on Block Withholding Attacks Using the Zero-Determinant Strategy
Submitted by aekwall on Mon, 06/08/2020 - 10:25am
Predictive Metrics
Zero-Determinant strategy
ZD player
ZD adopter
open mining pools
mutual attacks
macroscopic utility
game theoretic analysis
conventional game theory
block withholding attacks
block withholding attack
Bitcoin's incentive system
game theoretic security
security of data
Human Factors
Games
security threats
delays
distributed system
Data mining
blockchain
bitcoin
pubcrawl
game theory
Scalability
biblio
DURS: A Distributed Method for k-Nearest Neighbor Search on Uncertain Graphs
Submitted by grigby1 on Fri, 05/22/2020 - 1:22pm
distributed system
nearest neighbor search
uncertain graphs
social networking (online)
scalable search
Scalability
Market research
k-nearest neighbor search
k-nearest neighbor queries
k-nearest neighbor
DURS
pubcrawl
biology
query processing
graph theory
probability
nearest neighbour methods
Measurement
Metrics
computer science
Indexes
Correlation
biblio
The Best of Both Worlds: Challenges in Linking Provenance and Explainability in Distributed Machine Learning
Submitted by aekwall on Mon, 03/30/2020 - 10:33am
end-to-end explainability
basic transformations
consistent data
data analysis pipeline
data pre-processing steps
data preparation
distributed file system
distributed machine learning
distributed setting
machine learning models
entire data set
explainable machine learning
explainable models
homogeneous data
linking provenance
machine learning experts
single data
Distributed databases
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Computational modeling
Metrics
machine learning
Data models
data analysis
Entropy
Provenance
distributed system
Decision trees
data provenance
distributed computing
biblio
Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach
Submitted by aekwall on Mon, 02/17/2020 - 1:16pm
security goals
power engineering computing
power system security
privacy
pubcrawl
RAMI 4.0
Reference Model of I Information Assurance and Security
risk analysis
RMIAS
Scalability
Metrics
security of data
security-by-design
Smart Grid evolution
smart grid security
Smart Grids
smart power grids
sophisticated engineering practices
standards
surplus energy
distributed energy resources
Resiliency
adequate security countermeasures
architecture
architecture-based approach
computer architecture
computer security
control infrastructure
critical infrastructure
critical infrastructures
Resilient Security Architectures
distributed power generation
distributed system
distribution system operators
Energy Distribution Grids
Enterprise Architecture
Europe
grid gatekeepers
methodology
biblio
A Distributed Autonomic Logistics System with Parallel-Computing Diagnostic Algorithm for Aircrafts
Submitted by grigby1 on Tue, 01/21/2020 - 10:59am
pubcrawl
Logistics
machine groups
maintenance decisions-making
maintenance engineering
parallel computing
presents repairment instructions
primary control system
production engineering computing
prognostics and health management
promoted diagnostic algorithm
large-scale aircraft control center
real-time failure monitoring
real-time flight conditions
remaining life assessment
resilience
Resiliency
scale aircraft control centers
single machines
telemetry
telemetry parameters
typical diagnostic algorithms
diagnostic health assessment platform
aircraft maintenance
autonomic logistic
autonomic logistic system
client-server systems
complex operating conditions
Compositionality
computing time complexity
conceptional system
condition monitoring
dependency matrix expansion
aircraft conditions
distributed ALS
distributed autonomic logistics system
distributed system
expandability
fault diagnosis
fault location
fault points
health management system
improved diagnostic algorithm
biblio
Vulnerability Assessment Method for Cyber Physical Power System Considering Node Heterogeneity
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
hierarchical system
Communication Network
complex network theory
cyber physical power system
different weighting factor
Dispatching
equilibrium
heterogeneity evaluation index system
hierarchical CPPS model
complex networks
island survivability
islanding survivability
network structure
node heterogeneity
short-term operation
vulnerability assessment method
power grid vulnerability analysis
Entropy
pubcrawl
Metrics
Resiliency
composability
Indexes
Communication networks
vulnerability assessment
power engineering computing
resilience
power system faults
Power system protection
network theory (graphs)
Power Grid
power grids
power flow
distributed system
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/01/2019 - 10:30am
security
lightweight monitoring system
malicious data-integrity attacks
malicious nodes
Metrics
Monitoring
network attacks
networked system
pubcrawl
resilience
Resiliency
IoT security
security of data
sensor correlations
Silicon
telecommunication security
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
WSNs
ECA rule-based wireless sensor networks
abnormal-node detection
abnormality thresholds
Correlation
data integrity
data integrity attack
data-integrity detection
dependability
dependable monitoring system
distributed system
abnormal nodes
ECA rules
embedded sensor devices
event-condition-action rule
failure handling
Fuzzy logic
heterogeneous sensor readings
hierarchical abnormal-node detection
hierarchical framework
Internet of Things
1
2
next ›
last »