Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
TV
biblio
Analyzing and Mitigating of Time Delay Attack (TDA) by using Fractional Filter based IMC-PID with Smith Predictor
Submitted by grigby1 on Fri, 06/09/2023 - 12:14pm
pubcrawl
resilience
process control
Robustness
Delay effects
simulation
Sensor Systems
robust control
Resiliency
TV
Cybersecurity Damage Assessment
biblio
Toward Among-Device AI from On-Device AI with Stream Pipelines
Submitted by grigby1 on Fri, 01/06/2023 - 3:10pm
AI
stream pipeline
on device AI
nnstreamer
among device AI
TV
Costs
Human Factors
Writing
Pipelines
pubcrawl
edge AI
Artificial Neural Networks
Linux
privacy
Scalability
Hardware
Resiliency
resilience
biblio
Self-adaptive Device Management for the IoT Using Constraint Solving
Submitted by grigby1 on Fri, 12/09/2022 - 5:17pm
Internet of Things
pubcrawl
resilience
Resiliency
performance evaluation
composability
computer science
Decision Making
Runtime
Autonomic Security
Constraint handling
TV
biblio
Trust Management in Smart Grid: A Markov Trust Model
Submitted by grigby1 on Tue, 11/30/2021 - 2:03pm
resilience
TV
trust model
smart grid security
Smart Grids
Smart Grid
security
Scalability
Resiliency
advanced metering infrastructure
pubcrawl
Numerical models
Metrics
Markov processes
Markov model
Cybersecurity
convergence
Computational modeling
biblio
Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing
Submitted by aekwall on Wed, 07/07/2021 - 3:56pm
Task Analysis
Reliability
surveillance
hashing
information sharing
Law
social networking (online)
Steganography
TV
video recording
Video Security
video surveillance
pubcrawl
Metrics
Resiliency
Human behavior
biblio
Image Classification using Convolution Neural Network Based Hash Encoding and Particle Swarm Optimization
Submitted by aekwall on Mon, 03/29/2021 - 11:08am
visualization
TRV
transfer values
marketing
inception model
Image analysis
high-performance image classifier models
hashing techniques
hash encoding
Intelligent vehicles
TV
hash algorithms
file organisation
sequential model
Compositionality
image retrieval
Classification algorithms
Predictive models
pubcrawl
convolution neural network
image classification
genetic algorithms
convolutional neural network
convolutional neural nets
Training
particle swarm optimization
particle swarm optimisation
deep learning
Resiliency
feature extraction
Data models
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 10:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 12:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
Cost sensitive moving target consensus
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
IDS signal
TV
Switches
state machine replication
software fault tolerance
security of data
Resiliency
pubcrawl
Protocols
network vulnerability
moving target defense
moving target consensus
intrusion tolerance
intrusion detection system signal
Analytical models
fault-tolerant service
Fault tolerant systems
fault tolerance
crash fault tolerant protocol
crash fault tolerance
Consensus
Computer crashes
composability
CFT protocol
Byzantine fault tolerant protocol
Byzantine Fault Tolerance
BFT protocol
1
2
next ›
last »