Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automata theory
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
Using timed automata and fuzzy logic for diagnosis of multiple faults in DES
Submitted by grigby1 on Thu, 02/15/2018 - 10:47am
identification phase
Valves
timed automata
temporal parameters
temporal evolution
sensors
Resiliency
resilience
pubcrawl
normal operation
multiple fault diagnosis
monitoring time operation
Monitoring
Metrics
Mathematical model
location
actuators
Human Factors
human factor
Human behavior
Fuzzy logic
filling system
faulty operation
fault diagnosis
failure diagnosis
discrete event systems
Diagnosis
DES
default
Clocks
automata theory
automata
biblio
Design Framework for Reliable Multiple Autonomic Loops in Smart Environments
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
middleware
transactional middleware LINC
transactional execution mechanism
Switches
Smart Environments
sensors
self-adjusting systems
Scalability
Resiliency
reliable self-adaptive systems
reliable multiple autonomic loops
Reliability engineering
Reliability
reactive language Heptagon/BZR
pubcrawl
Multiple loops
abstraction framework PUTUTU
Metrics
Mathematical model
loops composition
loops adaptation
control systems
control engineering computing
building management systems
Building automation
Autonomic Security
automata-based controller
automata theory
adaptive systems
actuators
Abstraction Layer
biblio
1-recall reinforcement learning leading to an optimal equilibrium in potential games with discrete and continuous actions
Submitted by grigby1 on Wed, 03/08/2017 - 12:55pm
Markov processes
strategic decision makers
Stochastic processes
stochastic approximation
pubcrawl170110
potential games
payoff-based learning
optimization
optimal equilibrium
Nash Equilibrium
Nash equilibria
multiagent systems
multi-agent systems
1-recall reinforcement learning
Linear programming
learning automata
learning (artificial intelligence)
Games
game theory
distributed optimization
discrete actions
Decision Making
convergence
continuous actions
automata theory
agent dynamics
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Thu, 04/30/2015 - 11:49am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
« first
‹ previous
1
2