Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Verification and Validation of a Cyber-Physical System in the Automotive Domain
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
probability parameters
EAST-ADL
EAST-ADL constraints
EAST-ADL/Stateflow
energy constraints
extended ERT constraints
formal statistical analysis
functional quality assurance
mapping rules
modified EAST-ADL
nonfunctional quality assurance
parallel languages
probabilistic extension
domain specific architectural language
S/S models
safety-critical automotive embedded system design
semantics denotation
Simulink Design Verifier
Simulink/Stateflow integration
software packages
transformed energy-aware real-time behaviors
UPPAAL models
UPPAAL-SMC
verifiable UPPAAL- SMC models
Verification & Validation
Stochastic Computing Security
probability
security
cyber-physical systems
pubcrawl
Scalability
software quality
Analytical models
Wheels
delays
Stochastic processes
traffic engineering computing
Cameras
resilience
formal verification
CPS
embedded systems
Automotive engineering
Resiliency
quality assurance
power aware computing
software development
Stochastic computing
autonomous traffic sign recognition vehicle
cyber-physical system validation
cyber-physical system verification
biblio
CONVINCE: A cross-layer modeling, exploration and validation framework for next-generation connected vehicles
Submitted by el_wehby on Fri, 05/25/2018 - 3:23pm
next-generation semiautonomous vehicles
vehicular ad hoc networks
vehicles
vehicle-to-vehicle applications
vehicle-to-infrastructure applications
V2V communication network
V2I communication network
timing
Software
security
Analytical models
next-generation connected vehicle
next-generation autonomous vehicles
next generation networks
Mathematical model
holistic environment
cross-layer modeling exploration and validation framework
CONVINCE framework
Computational modeling
1553757
biblio
Vulnerability Analysis for Simultaneous Attack in Smart Grid Security
Submitted by grigby1 on Thu, 05/24/2018 - 11:30am
power grid vulnerability analysis
Vulnerability Analysis
total blackout
smart power grids
Smart Grids
smart grid security
Simultaneous attack
security
Resiliency
resilience
reduced calculation time
pubcrawl
power system stability
power system security
power system measurement
Analytical models
power grid system
power grid infrastructures
modified cascading failure simulator
Metrics
malware
Generators
generation power loss
general power system test cases
failure analysis
damage measurement matrix
Compositionality
composability
cascaded outage
cascaded failure simulator
biblio
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach
Submitted by grigby1 on Thu, 05/24/2018 - 11:22am
formal verification
secure messaging
pubcrawl
ProVerif
protocol verification
ProScript protocol code
privacy
policy-based collaboration
Policy
JavaScript programs
Java
Analytical models
end-to end secure messaging protocols
Domain-Specific Language
CryptoVerif proof
Cryptography
Cryptographic Protocols
cryptographic protocol code
Computer bugs
Computational modeling
Compositionality
automated verification
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 1:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Discovering and Mitigating New Attack Paths Using Graphical Security Models
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
resilience
zero-day vulnerabilities
Virtual private networks
UV-RAM
Universal Serial Bus
unified vulnerability risk analysis module
system components
Servers
security of data
Security analysis
security
risk analysis
Resiliency
Analytical models
pubcrawl
new attack path mitigation
new attack path discovery
network hardening
modern networked systems
mitigation strategies
Metrics
graphical security models
Databases
composability
attack graphs
biblio
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
integrated modelling language
UNIX operating systems
UNIX operating system
Unix
self-replicating malware
Resiliency
resilience
pwnPr3d modelling approach
pubcrawl
operating systems
Metrics
invasive software
Analytical models
ICT systems
hardware components
Hardware
cybersecurity analysis
computer security
computer architecture
composability
attack graphs
architectural cyber security analysis
Architectural Analysis
biblio
Verifying Attack Graphs through Simulation
Submitted by grigby1 on Mon, 04/02/2018 - 11:51am
Metrics
time-consuming process
Temperature sensors
simulation
simulated environment
security of data
security
Resiliency
resilience
pubcrawl
Predictive models
Nuclear Reactor
Analytical models
Inductors
hybrid attack graph
graph theory
Data models
cyber-physical systems
cyber physical system simulation
Cyber Physical System
control systems
composability
attack graphs
attack graph verification
biblio
An Adversary-Centric Behavior Modeling of DDoS Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:58pm
industrial mitigation operation
Scalability
Resiliency
resilience
pubcrawl
Predictive models
Monitoring
Metrics
malware
internet
Adversary Models
Human behavior
feature extraction
distributed denial of service attack
DDoS attack model
Data-driven approach
computer network security
Computer crime
Analytical models
adversary-centric behavior model
biblio
A Markov Game Theoritic Approach for Power Grid Security
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Metrics
user authentication information steal
two-player zero-sum Markov game theoretic approach
security of data
Scalability
Resiliency
resilience
pubcrawl
power system security
power grids
Power Grid Security
power engineering computing
advanced persistent threat
Markov processes
Markov game
information and communication technology
Human behavior
graph theory
Games
game theory
cyber-attack
Companies
Analytical models
advanced persistent threats
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
…
next ›
last »