Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Agent based simulation of a payment system for resilience assessments
Submitted by grigby1 on Mon, 12/03/2018 - 12:52pm
Metrics
Swedish payment system
supply chain risk assessment
Supply Chain
Scalability
Resiliency
resilience assessments
resilience
pubcrawl
Petroleum
payment system
Online banking
multi-agent systems
Agent based modeling
gaming simulation approach
gaming simulation
Games
fuel retailing
food retailing
financial data processing
digital simulation
computer games
computer based role playing game
Computational modeling
Analytical models
agent based simulation
biblio
A Competency Model to Help Selecting the Information Security Method for Platforms of Communication by Visible Light (VLC)
Submitted by grigby1 on Mon, 11/19/2018 - 11:34am
Metrics
VLC
Visible Light Communications Security
visible light communication
TOPSIS and The Game Theory
security of data
security information
security criteria
security
Scalability
right security problems
Resiliency
resilience
research project
pubcrawl
alternative methods
light emitting diodes
information security method
information security
Informatics
free-space optical communication
Decision Making
Data models
competency model
Communication by Visible Light (VLC)
business context
business communication
Bayesian Nets
Analytical models
biblio
Toward a Sensor Trustworthiness Measure for Grid-Connected IoT-Enabled Smart Cities
Submitted by grigby1 on Mon, 11/19/2018 - 11:31am
situational awareness
pubcrawl
resilience
Resiliency
security
Security Metrics
security of data
sensor trustworthiness measure
sensor verification
power systems
smart cities
Smart Grid Sensors
Smart Grids
smart power grids
Trusted Computing
trustworthy power generation
wireless sensor networks
Human behavior
bulk power systems
Compositionality
critical infrastructures
cyber physical systems
cyber-physical modeling
cyber-physical systems
grid-connected IoT-enabled smart cities
Hardware
Analytical models
Human Factors
Internet of Things
large-scale critical infrastructure systems security
malevolent IoT devices
Perturbation methods
power engineering computing
power system security
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by Katie Dey on Sun, 09/30/2018 - 11:22am
Hardware
physical system
actuation capability
cyber physical systems
Software
Computational modeling
Analytical models
computer architecture
computer security
physical components
hardware-in-the-loop
Model Integrated Computing
vulnerability assessment
resilience
cyber-physical system
Experimentation
testbed
HIL testbed
embedded systems
hardware-in-the loop simulation
security of data
software engineering
cyber-attack effect evaluation
hardware-in-the-loop simulation testbed
embedded computers
system functions
cyber-physical systems
simulation environment
cybersecurity design process
platform specific performance measurements
railway transportation system
CPS attack experiments
model based software development framework
cyber components
biblio
Modeling human-technology interaction as a sociotechnical system of systems
Submitted by grigby1 on Wed, 09/05/2018 - 9:42am
Fatigue
systems engineering
System-of-Systems
Sociotechnical System-of-Systems
sociotechnical system of systems
sociotechnical SoS
Sociotechnical
proof-of-concept
layered security
layered physical security system
Human-Technology Interaction
human technology interaction
Human Performance Factors
forward operating base
FOB
security
Detection Theory
Computing Theory
human computer interaction
modeling and simulation
Organizations
military computing
Metrics
Training
Computational modeling
Analytical models
security of data
Measurement
pubcrawl
Security Metrics
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 10:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis
Submitted by grigby1 on Thu, 08/23/2018 - 10:43am
intelligent data processing
taxonomy
software vulnerability analysis
Software Vulnerability
Software
security vulnerability
security patterns
security of data
security
pubcrawl
program analysis
Analytical models
intelligent data analysis
intelligent data
Industries
Databases
Data models
Cryptography
computational intelligence
Compositionality
composability
biblio
Heterogeneous Malware Spread Process in Star Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
Malware Analysis
Steady-state
steady state infection
star network
SIS model
simulation
Silicon
Resiliency
resilience
pubcrawl
privacy
network theory (graphs)
Metrics
meta-stable state fraction
malware spread process
Analytical models
infected nodes
Human behavior
heterogeneous virus spread
heterogeneous SIS model
heterogeneous malware spread process
graph theory
finite size graph
extended N-intertwined model
epidemic threshold
Curing
computer viruses
Computational modeling
Artificial Neural Networks
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
Detection of malicious nodes in NDN VANET for Interest Packet Popple Broadcast Diffusion Attack
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
packet popple broadcast diffusion attack
Vehicular Ad-hoc Network
vehicular ad hoc networks
telecommunication security
Scalability
Roads
Resiliency
resilience
pubcrawl
Predictive models
Ports (Computers)
PBDA
Analytical models
next generation networks
NDN VANET
named data networking
Named Data Network Security
Mitigation strategy
Markov processes
markov chain
internet
Interest Packet Popple Broadcast Diffusion Attack
Human behavior
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »