Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
expert systems
biblio
User behavior Pattern -Signature based Intrusion Detection
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
Intrusion Detection using Statistics
user suspicious behavior
user behavior Pattern -signature
user authentication
Statistical Based Intrusion Detection
security
Scalability
SBID model
Resiliency
resilience
pubcrawl
PIDE model
pattern recognized engine
Pattern Based Intrusion Detection
particular procedure
main concerned area
authentic user
intrusion detection system
Intrusion Detection
Human behavior
host-based IDS monitors user behavior
extensive system
expert systems
expert system
Engines
digital signatures
computer system
computer network security
Computer hacking
Computational modeling
biometrics (access control)
biometric applications
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
Toward a Network Intrusion Detection System for Geographic Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
network intrusion detection system
knowledge based systems
knowledge bases
known computer attack detection
MAS
Multi Agent System
multi-agent systems
multiagent paradigm
multiagent systems
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
time detection
unknown computer attack detection
distribution
autonomous agents
autonomy
Big Data
Big networks
DIDS
distributed file system
distributed intrusion detection system
distributed processing
Anomaly Detection
expert systems
geographic data security
geographic information systems
Geographical System
GIS.
Human behavior
IDS
biblio
Automatic Protection Implementation Considering Protection Assessment Method of DER Penetration for Smart Distribution Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:27pm
photovoltaic power systems
graphical user interfaces
Adaptive protection
adaptive rule-based method
automatic protection implementation
bidirectional power flow
DER application
DER penetration
distribution energy resources
Gorontalo sub-system network
graphical user interface
Indonesia
microhydro plant
GUI
plant location
power distribution protection
power distribution reliability
power quality
power system reliability
protection security assessment method
PSA
relay settings
smart distribution network
smart electrical system
solar photovoltaics
Load flow
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
distributed power generation
power engineering computing
power system security
Smart Grid
smart power grids
Reliability
adaptive systems
visualization
power supply quality
system reliability
Relays
power generation protection
expert systems
expert system
power generation reliability
hydroelectric power stations
smart grid systems
solar power stations
biblio
Early Combined Safety - Security Defense in Depth Assessment of Complex Systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:27pm
Large-scale systems
Unified modeling language
traditional security research
tools
system engineer
system design life-cycle phases
security design weaknesses
security defenses
security attributes
security assessments
security
Scalability
Safety
Resiliency
resilience
pubcrawl
additional system complexity
interdisciplinary system dependencies
inter-system dependencies
Human behavior
expert systems
early conceptual design
early assessment
dependency model
defense in depth
critical infrastructures
concurrent safety
computer security
complex systems
complex system
complex critical infrastructures
combined Safety - Security Defense in Depth Assessment
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
Expert System for Assessing the Efficiency of Information Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
information security efficiency assessment
technical measures
security of data
security
resilience
pubcrawl
protected information
personal data
Organizations
organizational measures
organizational and administrative documents
Monitoring
IP networks
informed decisions
information system
Security Audits
information security audit
information security
information protection system
expert systems
expert system
expert assessment method
Data protection
coefficient of significance
authorities
auditing
audit information security
Scalability
Resiliency
Human behavior
biblio
Human-centric Software Engineering for Next Generation Cloud- and Edge-based Smart Living Applications
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Smart homes
Intelligent sensors
Internet of Things
next generation cloud
next-generation applications
privacy
Privacy Requirements
pubcrawl
Scalability
smart cities
smart city-related data
human-centric software engineering
smart living systems
Software
software activities
software development
software engineering
software requirements engineering
user centred design
user interfaces
visualization
edge computing applications
Cloud Computing
data analysis
data analysis applications
data privacy
data visualisation
diverse software usability defects
diversity and inclusion
domain-specific visual models
edge computing
aging
edge-based smart living applications
edge-based software systems
end user emotions
expert systems
Formal Specification
human computer interaction
Human Factors
human usage patterns
human-centric security
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Designing Context-Sensitive Norm Inverse Reinforcement Learning Framework for Norm-Compliant Autonomous Agents
Submitted by grigby1 on Mon, 03/29/2021 - 1:15pm
Human Factors
social norm-compliant behavior
Scalability
pubcrawl
privacy norm
privacy
norm-compliant autonomous agents
multi-agent systems
Markov processes
learning (artificial intelligence)
IRL framework
autonomous agents interact
human behaviors
expert systems
expert demonstrations
ethical social norms
data privacy
context-sensitive RL
context-sensitive norm IRL
context-sensitive norm inverse reinforcement learning framework
context spaces
CNIRL
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »