Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Adaptation models
biblio
Dependability Assessment of SOA-Based CPS With Contracts and Model-Based Fault Injection
Submitted by grigby1 on Mon, 10/05/2020 - 2:03pm
dependability
tools
Software Architecture
service-oriented architecture
service orientation (SOA)
service orientation
service behavior
pubcrawl
Model-based
Formal Specification
Fault injection
fault diagnosis
engineering complex distributed systems
Adaptation models
cyber-physical systems
cyber-physical
CPS model
contracts
Contract-based
contract specification help
constituent components
Computational modeling
Compositionality
automata
architectural designs
Analytical models
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Fuzzy-GRA Trust Model for Cloud Risk Management
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
gray relational theory
Trusted Computing
trust model
Software
security vulnerabilities
security of data
security
risk management
pubcrawl
Peer-to-peer computing
Mathematical model
local trust model
grey systems
Adaptation models
gray relational analysis
global trust model
Fuzzy-GRA trust model
fuzzy set theory
fuzzy mathematics
Computer Theory and Trust
Computational modeling
Compositionality
composability
cloud safety
cloud risk management
Cloud Computing
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
Continuous and Adaptive Learning over Big Streaming Data for Network Security
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
learning setup
telecommunication traffic
Stream Machine Learning
security
Scalability
Resiliency
resilience
pubcrawl
off-the-shelf stream learning approaches
network traffic monitoring
network security
network attacks
microsoft windows
Metrics
machine learning algorithms
machine learning
Adaptation models
learning model
learning (artificial intelligence)
Dynamic Networks and Security
Data models
continual learning
computer network security
composability
big-data
big streaming data
big data security in the cloud
Big Data analytics platform
Big Data
analysis tasks
adaptive learning models
adaptive learning
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
biblio
Adaptive and Intelligible Prioritization for Network Security Incidents
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
risk management
static calculations
prioritization model management
network security incidents
incident prioritization
adaptive learning
adaptive incident prioritization
Communication networks
Automated Response Actions
Anomaly Detection
automation
security of data
tools
composability
pubcrawl
Resiliency
network security
cyber security
Adaptation models
Task Analysis
security
biblio
Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
resilience
inter-layer message transmission mechanism
message passing
Metrics
Nickel
node activity test mechanism
physical backup
pubcrawl
Redundancy
hierarchical model
Resiliency
resource allocation
safety-critical key infrastructures
simulation test
simulation testing
simulations
SPB-CPS simulation test efficiency
test resources
fault tolerance
adaptive allocation
collaborative simulation time sequence push strategy
composability
Computational modeling
Control Strategy
CPS modeling
Cyber Physical System
cyber-physical systems
Adaptation models
fault tolerance policies
fault tolerant computing
Fault tolerant systems
Fault-Tolerant CPS
fault-tolerant CPS simulation platform
Hardware
hardware redundancy technology physical backup
hierarchical adaptive policies
biblio
A Formal Modeling and Verification Framework for Service Oriented Intelligent Production Line Design
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
service-oriented architecture
performance constraints
production engineering computing
pubcrawl
quality of service
resilience
Resiliency
service oriented
service oriented intelligent production line design
model-centric way
simulations
Software Architecture
Task Analysis
tools
Unified modeling language
verification method
web services
formal verification
application requirements
complex application
composability
CPS modeling
existing modeling methods
formal modeling
formal simulation verification framework
Formal Specification
Adaptation models
independent equipment network integration
Intelligent production line
large scale high-performance system
Mathematical model
Metrics
model and verification
model-based service-oriented integration approach
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »