Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Lead
biblio
Load Redistribution Attacks in Multi-Terminal DC Grids
Submitted by grigby1 on Thu, 05/11/2023 - 4:48pm
False Data Injection
voltage-sourced converter
multi-terminal dc grid
Systems operation
Lead
Resiliency
command injection attacks
cyber-physical system
cyber-attack
Voltage control
Cyber-security
cyberattack
power grids
Vulnerability Analysis
Reliability
composability
optimization
resilience
Metrics
pubcrawl
biblio
A Study on Various Intrusion Detection Models for Network Coding Enabled Mobile Small Cells
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
network security
Safe Coding
Small Cells
message authentication codes
Lead
5G networks
network coding
Urban areas
policy-based governance
security
Resiliency
Metrics
pubcrawl
Protocols
Intrusion Detection
5G mobile communication
Human Factors
biblio
An Efficient Key Agreement Protocol for Smart Grid communication
Submitted by grigby1 on Fri, 01/20/2023 - 4:59pm
pubcrawl
Metrics
Resiliency
privacy
Protocols
Smart Grid
smart meters
Smart Grids
energy consumption
Resists
key agreement
Elliptic curve cryptography
Lead
service provider
smart meter
Smart Grid Privacy
biblio
MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods
Submitted by grigby1 on Tue, 07/12/2022 - 3:10pm
feature extraction
machine learning algorithms
pubcrawl
Human behavior
Resiliency
malware
Metrics
Browsers
Syntactics
resilience
scientific computing
cryptojacking
Lead
biblio
FPGA Implementation of Computer Network Security Protection with Machine Learning
Submitted by grigby1 on Mon, 02/07/2022 - 4:44pm
machine learning
machine learning algorithms
pubcrawl
Metrics
resilience
Resiliency
composability
network security
Classification algorithms
network intrusion detection
Microelectronics
Lead
naive Bayes methods
Microelectronics Security
biblio
Impacts of System Transparency and System Failure on Driver Trust During Partially Automated Driving
Submitted by aekwall on Mon, 02/01/2021 - 11:38am
driver trust
trust ratings
trust change
system-malfunction led trust reduction
system-limit
system transparency
system failure influence
system failure
supervisory control
partially automated vehicle
partially automated driving
Lead
flawless automated driving
automobiles
driver intervention
Automated vehicle
Analysis of variance
human trust
driver information systems
Trust in automation
automation
pubcrawl
Human behavior
Task Analysis
road vehicles
road safety
biblio
Correct-by-Construction Adaptive Cruise Control: Two Approaches
Submitted by el_wehby on Sun, 05/27/2018 - 6:53pm
Acceleration
Adaptive cruise control (ACC)
automotive safety
Computational modeling
Correct-by-Construction
Cruise control
formal methods
Lead
Safety
Software
supervisory control.
vehicles
1552668
biblio
Describing Advanced Persistent Threats Using a Multi-Agent System Approach
Submitted by grigby1 on Mon, 03/19/2018 - 1:54pm
natural language
threat intelligence information
software security requirement analysis
Servers
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Organizations
advanced persistent threat attacks
multiagent system approach
multi-agent systems
Metrics
malware
Lead
Human behavior
attack trees
Analytical models
agent-oriented social modelling approaches
advanced persistent threats
biblio
Shadow detection and removal for traffic sequences
Submitted by grigby1 on Mon, 11/20/2017 - 12:04pm
object detection
video surveillance
video signal processing
video sequences
vehicles
traffic vision analysis
traffic sequences
texture features
Texture and color features
shadow-free foreground segmentation image
shadow removal method
shadow detection method
Shadow detection and removal
road traffic
Resiliency
pubcrawl
automatic shadow removal model
morphology reconstruction algorithm
Metrics
Lead
Intelligent Transportation System
image sequences
image segmentation
Image reconstruction
image denoising
image colour analysis
Human Factors
Human behavior
Histograms
histogram shape
color features
background subtraction
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Predilections
usage control theory
UCON
TPP
tinkering process
Tinker
theory-of-technology acceptance model
theory-of-perceived risk
TAM
South African lead-users
software packages
software package
security of data
quantitative approach
pubcrawl170108
pubcrawl170107
Banking
Mobile communication
mobile commerce
mobile banking services
Mobile banking
Lead-users
Lead
information security risks
information security risk
information security
Human Factors
Gauteng province
demand-side predilections
Data collection
data analysis
Context
1
2
next ›
last »