Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adaptation models
biblio
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
quality-of-service constraints
Yices SMT Solver
Trust Routing
SMT-LIB language
SMT-LIB
security
secure routing protocol
Scalability
Routing protocols
Routing Protocol
routing functions
Routing
Resiliency
resilience
requirement models
requirement constraints
Adaptation models
quality of service
QoS constraints
pubcrawl
network topology
mobile nodes
Mobile communication
Mobile Ad-Hoc Network (MANET)
mobile ad-hoc network
mobile ad hoc networks
MANET
formal verification
formal modelling
composability
adaptive routing protocol
biblio
Cyber-attack detection in the networked control system with faulty plant
Submitted by K_Hooper on Wed, 04/04/2018 - 9:52am
networked control systems
Underwater vehicles
Underwater Networks
Trajectory
tools
standards
security
Scalability
ROV
Resiliency
remotely operated underwater vehicle
pubcrawl
predictive control
Adaptation models
Networked Control System
Metrics
mathematical framework
intelligent generalized predictive controller
intelligent control
IGPC
faulty plant
fault-tolerant ability
fault tolerant control
fault accommodation technique
cyber-attack detection
autonomous underwater vehicles
biblio
The Effect of Buffer Management Strategies on 6LoWPAN's Response to Buffer Reservation Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
resilience
Internet of Things
IoT security
packet drop rate
packets tags
PDR
personal area networks
Protocols
pubcrawl
fragmentation-based buffer reservation DoS attacks
Resiliency
Scoring Systems
slotted buffer
Split Buffer
split buffer mechanism
TCP-IP model
vehicular networking applications
composability
6L0WPAN adaptation layer
6LoWPAN
Adaptation models
buffer circuits
buffer cleanups
buffer management strategies
Buffer Reservation
Buffer storage
6L0WPAN
Computer crime
computer network security
Current measurement
Cyber Physical Systems Security
defence strategies
Fragmentation Attacks
fragmentation-based buffer reservation denial of service attacks
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Assessing the Quality of Tabular State Machines through Metrics
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
quality of models
Variable speed drives
Unified modeling language
tabular state machines
software quality
software metrics
Software measurement
Software
security
Resiliency
resilience
Adaptation models
pubcrawl
Model metrics
Metrics
Cryptography
Compositionality
Complexity theory
coding theory
ASD models
analytical software design tooling
biblio
Network Attribute Selection, Classification and Accuracy (NASCA) Procedure for Intrusion Detection Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Metrics
Vulnerability
Vegetation
unwanted intrusion detection
statistical learning procedure
Scalability
Resiliency
resilience
pubcrawl
Protocols
network attribute selection classification and accuracy procedure
Network
NASCA procedure
NASCA
Adaptation models
Intrusion Detection
Human Factors
Human behavior
Hidden Markov models
four-stage intrusion detection method
Entropy
Data models
Cybersecurity
cyber security space
Cyber Dependencies
computer network security
Compositionality
biblio
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
SCADA network cyber-attacks
machine learning
Metrics
production engineering computing
pubcrawl
Resiliency
risk assessment
risk management
SCADA network
Logic gates
SCADA security risk assessment
SCADA systems
SCADA Systems Security
Scalability
security
security risk level
supervisory control and data acquisition
Damage Assessment
learning (artificial intelligence)
industrial systems
industrial facilities
incremental learning
Human behavior
cyber-security risk assessment model
Cyber-security
critical infrastructures
computer network security
Communications technology
belief networks
Bayesian network
Bayes methods
artificial intelligence security
Adaptation models
biblio
Topic Evolution Modeling in Social Media Short Texts Based on Recurrent Semantic Dependent CRP
Submitted by grigby1 on Tue, 02/06/2018 - 1:34pm
semantic dependent Chinese restaurant process
word co-occurrence modeling
Twitter dataset
topic modeling
tools
Text Mining
text analytics
text analysis
social networking (online)
Social network services
social media short texts
Social Media Analytics
short-text oriented topic evolution model
Semantics
semantic similarity information
Adaptation models
sdTEM
Scalability
rsdCRP
recurrent semantic dependent CRP
pubcrawl
Metrics
Media
LDA
Human Factors
Human behavior
HDP
Data models
composability
Analytical models
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »