Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
On the Impact of the Embedding Process on Network Resilience Quantification
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
critical infrastructure
pubcrawl
Metrics
Topology
network topology
Extraterrestrial measurements
reliability theory
data analysis
scientific computing
Security Metrics
Computing Theory
graph embedding
Computational Topology
network resilience
Wasserstein Distance
WEGL
biblio
A Novel Approach for the Detection of DDoS Attacks in SDN using Information Theory Metric
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
tools
security
pubcrawl
Metrics
internet
Topology
intrusion detection system
Entropy
Measurement
software-defined network
Security Metrics
denial-of-service attack
Computing Theory
DDoS attack detection
information theory metrics
Mininet
biblio
The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment
Submitted by grigby1 on Fri, 09/09/2022 - 4:00pm
Training
critical infrastructure
pubcrawl
Metrics
Topology
risk assessment
supply chains
Stakeholders
Particle measurements
cyber range
maritime
port
Seaports
supply chain risk assessment
biblio
Node Importance Evaluation Method for Cyberspace Security Risk Control
Submitted by grigby1 on Fri, 08/26/2022 - 3:07pm
Big Data
Node importance
Key nodes
cyber security knowledge graph
Cyber security data fusion
Control Theory
Cyberspace
education
Ontologies
security
Topology
Scalability
Correlation
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Edge Differential Privacy for Algebraic Connectivity of Graphs
Submitted by grigby1 on Fri, 08/26/2022 - 1:27pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
privacy
Topology
network topology
simulation
social networking (online)
differential privacy
consensus protocol
Control Theory
biblio
A Novel Vertically Oscillating Hydrokinetic Energy Harvester
Submitted by aekwall on Fri, 07/29/2022 - 4:32pm
emulation
oscillating behaviors
Vortex
Vertical Oscillator
synchronous generators
Power smoothing
PMSG
Hydrokinetic
Energy Harvester
Software
Generators
Voltage control
Topology
privacy
composability
Resiliency
Metrics
pubcrawl
biblio
Power Grid Nodal Vulnerability Analysis Combining Topology and State Information
Submitted by grigby1 on Fri, 07/29/2022 - 9:03am
Power system protection
power grid vulnerability analysis
power gird
cascading failure model
system integration
simulation
vulnerability index
power grids
Vulnerability Analysis
pubcrawl
Metrics
Topology
Scalability
Analytical models
Correlation
Resiliency
resilience
biblio
Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model
Submitted by grigby1 on Wed, 07/13/2022 - 1:17pm
Personnel
Training
Topology
security training
security
Scoring model
Scalability
Resiliency
resilience
pubcrawl
policy governance
collaboration
Organizations
Metrics
Human behavior
Gamification
Federated platforms
cybersecurity education
Cyber-range
Conferences
Computer crime
composability
biblio
Robustness Analysis of Cyber-Physical Power System Based on Adjacent Matrix Evolution
Submitted by grigby1 on Tue, 07/12/2022 - 3:38pm
Compositionality
Cyber Dependencies
reachable matrix
combinatorial matrix
adjacent matrix
Power system dynamics
Power system protection
cyber-physical power system
Robustness
Resistance
pubcrawl
Metrics
composability
Topology
Scalability
Analytical models
Indexes
Resiliency
resilience
Human behavior
biblio
Link Latency Attack in Software-Defined Networks
Submitted by aekwall on Fri, 07/01/2022 - 9:45am
Training
real-time systems
machine learning
Switches
pubcrawl
Scalability
Resiliency
Topology
wireless networks
network topology
fabrication
Link Fabrication Attack
Link Latency
Software-defined networking (SDN)
Topology Poisoning
Chained Attacks
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »