Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
graph theory
biblio
A Hypergraph-Based Key Management Scheme for Smart Charging Networking
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
key management scheme SCHKM
two-subnetwork model
telecommunication network management
smart charging network
Smart Charging
security requirements
security of data
SCHKM scheme
Scalability
Resiliency
resilience
pubcrawl
Metrics
Key storage
Cryptography
key management
key generation cost
hypergraph-based key management scheme
hypergraph theory
hypergraph structure
Human Factors
Human behavior
graph theory
electric vehicle users
electric vehicle charging
data security requirements
Data Security
biblio
An Improved Key Graph Based Key Management Scheme for Smart Grid AMI Systems
Submitted by grigby1 on Mon, 01/27/2020 - 12:25pm
security
Metrics
power engineering computing
Pricing
Protocols
pubcrawl
resilience
Resiliency
Scalability
scalable key management
key management scheme
Smart Grid
smart grid AMI systems
Smart Grids
smart meters
smart power grids
storage management
storage overhead
Unicast
VerSAMI key graph structure
computer network security
automatic meter reading
broadcast communication
broadcast key management performance
broadcast key management protocol
broadcast key management security
broadcast key update process
communication overhead
computer network management
computer network performance evaluation
advanced metering infrastructure
Conferences
Cryptography
graph theory
Human behavior
Human Factors
improved key graph
iVerSAMI
key graph based scheme
key management
biblio
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance
Submitted by grigby1 on Tue, 01/21/2020 - 11:32am
mission impact graph
security of data
security countermeasures
Scalability
Resiliency
resilience
ranking algorithm
pubcrawl
policy-based governance
network attacks
collaboration
mission impact assessment
Mission Assurance
Metrics
Information Assurance
Human behavior
graph theory
cyber space threat
Cyber Attacks
composability
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Realization of RSA Cryptographic Algorithm Based on Vector-Module Method of Modular Exponention
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
pubcrawl
Vectors
vector-module method
vector-modular method
Time complexity
temporal complexity
Scalability
RSA cryptosystem
RSA cryptographic algorithm
Resiliency
public key cryptography
computational complexity
Modular Multiplication
modular exponention
modular exponentiation
graph theory
exponentiation
encryption
Economics
Decoding
computer security
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
LevelTree: A New Scalable Data Center Networks Topology
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
shortest path
LevelTree
network topology
new scalable data center network topology
pubcrawl
resilience
Resiliency
Scalability
Servers
Jellyfish
telecommunication network routing
telecommunication network topology
topological properties
Topology
tree topology
Vegetation
VolvoxDC
Data Center Network(DCN)
Bisection Bandwidth
cloud based applications
computer centres
computer networks
Control Theory
critical topologies
Cyber Physical System
cyber physical systems
Bandwidth
data centers
DCN topology
Diameter of graph
Fattree
graph theory
high bisection bandwidth
Human behavior
biblio
Differential Privacy of Online Distributed Optimization under Adversarial Nodes
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
graph theory
sensitive data
Scalability
Resiliency
resilience
regular node
pubcrawl
privacy
preliminary attempt
optimization
online learning
online distributed optimization
network topology
learning (artificial intelligence)
important data information
Human behavior
adversarial
distributed optimization
distributed online learning algorithm
Distributed databases
differential privacy
different adversary models
data privacy
data analysis
cyber-physical systems
cyber physical systems
Cyber Physical System
Control Theory and Privacy
Control Theory
big data analysis methods
Big Data
adversarial nodes
biblio
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
psychology
Computing Theory and Trust
trust modeling
systems engineering processes
Systems architecture
System Engineering
requirements analysis
graph-based modeling methodology
graph-based algorithm
engineering trust
disparate system
Component architectures
complex multitiered system architectures
complex intersystem trust relationships
Compositionality
cognition
security of data
modeling
Risk
evaluation
Trust management
Measurement
trust
systems engineering
Vulnerability
Metrics
Computational modeling
graph theory
composability
pubcrawl
Trusted Computing
biblio
From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity
Submitted by aekwall on Mon, 10/28/2019 - 10:39am
provenance-based trust reasoning
data science
Data validity
data-intensive science and engineering
Knowledge engineering
knowledge provenance
malicious attacks
natural environmental changes
operations mistakes
cognitive systems
SCI failures
scientific computing integrity
scientific workflows
Variety
Veracity
Viewpoints
views
Scientific Computing Security
trust
Big Data
Conferences
data integrity
Trusted Computing
Resiliency
pubcrawl
graph theory
Computational modeling
security of data
provenance graphs
cognition
Semantics
inference mechanisms
Predictive Metrics
data provenance
scientific information systems
Compositionality
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »