Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
research target
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
modern computing
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
Cyber-physical attacks
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
advanced communication technologies
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
biblio
A Probability based Model for Big Data Security in Smart City
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
security of data
IoT
organisational data
Organizations
personal data
probability
probability based model
pubcrawl
resilience
Resiliency
security
highly sensitive data
sensitive data sharing
smart applications
smart cities
Smart City
smart city critical data
smart city data
smart technologies
smart traffic management system
transport data
Trusted Computing
Data Leakage Detection
Big Data
big data security
bigraph
Computational modeling
Computing Theory
crisis response
critical data security
data analysis
Data Analytics
data leakage
Analytical models
Data models
data objects
data privacy
disaster resilience
economic data
emergency management
energy data
environment data
graph theory
Guilt Model
biblio
Dependability Assessment of SOA-Based CPS With Contracts and Model-Based Fault Injection
Submitted by grigby1 on Mon, 10/05/2020 - 1:03pm
dependability
tools
Software Architecture
service-oriented architecture
service orientation (SOA)
service orientation
service behavior
pubcrawl
Model-based
Formal Specification
Fault injection
fault diagnosis
engineering complex distributed systems
Adaptation models
cyber-physical systems
cyber-physical
CPS model
contracts
Contract-based
contract specification help
constituent components
Computational modeling
Compositionality
automata
architectural designs
Analytical models
biblio
A Platform-Aware Model-Driven Embedded Software Engineering Process Based on Annotated Analysis Models
Submitted by grigby1 on Mon, 10/05/2020 - 1:02pm
Analytical models
Biological system modeling
Component-based Software Engineering
Compositionality
Computational modeling
embedded software
Measurement
Model-driven development
On-board Software
pubcrawl
schedulability analysis
tools
biblio
On Aggregation of Information in Timing Attacks
Submitted by grigby1 on Mon, 10/05/2020 - 12:48pm
Information Flow
timing attacks
timing
system vulnerability
Side-Channels
real-world attacks
real-world adversaries
pubcrawl
program diagnostics
program compositionality
multiple timing measurements
Mathematical model
information-flow analysis
Compositionality
information aggregation reasoning
high-profile timing attacks
divide-and-conquer method
divide and conquer methods
cryptosystems
Cryptography
Computational modeling
Analytical models
Aggregates
Computing Theory and Compositionality
Human Factors
Human behavior
biblio
Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation
Submitted by aekwall on Mon, 09/28/2020 - 10:54am
Incentive mechanism
Computing Theory and Privacy
user payoff
user collaboration incentive mechanism
trajectory privacy
Repeated game
rational users
game analysis
CTPP
continuous query users
collaborative user behaviour
collaborative trajectory privacy preservation
location based services
LBS
Scalability
Trajectory
user privacy
Games
collaboration
Analytical models
query processing
privacy
pubcrawl
Human behavior
Resiliency
game theory
data privacy
Servers
biblio
A Access Control Model of Associated Data Sets Based on Game Theory
Submitted by aekwall on Mon, 09/21/2020 - 2:48pm
cyber-physical systems
Control Theory and Privacy
sensitive information owner
sensitive information divulgence
privacy protection issue
privace protection
Nash equilbrium
Internet applications
associated data sets protection model
associated data sets
access control model
cyber physical systems
Games
Scalability
Analytical models
internet
privacy
pubcrawl
Human behavior
Resiliency
Data models
game theory
data privacy
Access Control
authorisation
biblio
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
early attack detection
regression analysis
network traffic data
false data injection attacks
Data Exfiltration
Informatics
cyber-attack detection
data diodes
data-driven monitoring
defense-in-depth
cyber attack
host system data
Industrial Control System (ICS)
intrusion detection results
motivated attackers
multiple-layer data-driven cyber-attack detection system
physical system
physically impactful cyber attacks
command injection attacks
integrated circuits
cyber-physical systems
pubcrawl
resilience
Resiliency
computer network security
Analytical models
Data models
industrial control
Monitoring
Industrial Control Systems
network data
composability
DoS attacks
computer security
malware
Metrics
cyber threats
biblio
On Security Capability of Cooperative Communications in Energy Scavenging Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
relay networks (telecommunication)
Cognitive Radio Security
precise closed-form formula
power division
noncognitive networks
message recovering time
Manganese
ESCRNs
energy scavenging time
energy scavenging cognitive radio networks
energy scavenging
cooperative communications
SOP
secrecy outage
security
secrecy outage probability
cognitive radio
energy harvesting
Interference
Relays
cooperative communication
telecommunication network reliability
telecommunication power management
Analytical models
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
Cognitive radio (CR) network
Cognitive Radio Security
yardstick based threshold allocation technique
Yardstick based Threshold Allocation (YTA)
X-graph
unlicensed secondary users
spectrum sensing
spectrum scarcity problem
spectrum access probability
Secondary User (SUs)
Primary User Emulation Attack (PUEA)
Primary User (PU)
ns2
free spectrum
dynamic cognitive radio networks
pubcrawl
radiofrequency interference
primary user emulation attack
emulation
licensed primary user
radio spectrum management
cognitive radio
STEM
resource management
sensors
estimation
Analytical models
telecommunication security
Resiliency
resilience
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »