Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
expert systems
biblio
Diagnostics and Assessment of the Industrial Network Security Expert System
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
LPτ-sequence
Vulnerability
Software
security
Scalability
Resiliency
resilience
pubcrawl
nodal points
network security
Monte Carlo numerical method
Monte Carlo methods
Mathematical model
Markov processes
markov chain
manufacturing
Algorithm design and analysis
information security
Industrial Safety
industrial network virtual model
industrial network security expert system
Industrial engineering
Human behavior
expert systems
expert assessment
diagnostic system
diagnostic assessment
cyber-attacks sets
cyber-attacks classification
cyber-attack
computer network security
classification
biblio
Analyst Intuition Based Hidden Markov Model on High Speed, Temporal Cyber Security Big Data
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
HMM state
Human behavior
IP addresses
malware
Multi-layer Perceptron (MLP)
network protocols
Principal Component Analysis (PCA)
probabilistic models
pubcrawl
resilience
High Velocity
Scalability
scoring system
security
security attacks
security of data
statistical data
temporal cyber security big data
time series
unsure attack
Virus
Data mining
attacker
Big Data
Clustering algorithms
computer security
cyber security
cyber security attack
cyber security data
cyber security expert
cyber security log
data analysis
Analyst Intuition
Data models
Expectation Regulated
expert systems
forecasting time series data
fuzzy k mean cluster
Fuzzy k-means (FKM)
fuzzy set theory
hidden Markov model
Hidden Markov Model (HMM)
Hidden Markov models
biblio
A Fault Diagnosis Expert System for Flight Control Software Based on SFMEA and SFTA
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
inference engine
software reliability analysis methods
software reliability
software fault tree analysis
software fault knowledge
software failure mode and effect analysis
Software
SFTA
SFMEA
security
Scalability
Resiliency
resilience
pubcrawl
Knowledge representation
inference mechanisms
aerospace applications
human-computer interaction interface
human computer interaction
Human behavior
flight control software
fault diagnosis expert system
fault diagnosis
expert systems
expert system
Engines
control engineering computing
CLIPS shell
CLIPS
airborne software engineering
aerospace control
aerospace computing
biblio
The Method of Expert Evaluation of Airports Aviation Security Using Perceptual Calculations
Submitted by grigby1 on Wed, 11/14/2018 - 1:20pm
restricted areas protection
Linguistics
perceptual calculations
perceptual computer
Personnel
proactive control
pubcrawl
resilience
Resiliency
intruders
Scalability
SCAUI elements
SCAUI state control
system of counteraction to acts of unlawful interference
technical systems
type-2 fuzzy sets
uncertainty
unlawful interference
AS employees
security
acts of unlawful interference
aircraft safety
airport
airport AS
airport security
Airports
airports aviation security
expert systems
Atmospheric modeling
aviation security
Computational modeling
expert evaluation
expert quality assessment
functional state
Fuzzy sets
Human behavior
biblio
A Design of Cyber-Physical Production System Prototype Based on an Ethereum Private Network
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
Human Factors
standards
smart contracts
Scalability
pubcrawl
Protocols
production engineering computing
Production
privacy
manufacturing systems
Internet of Things
identity verification services
contracts
expert systems
Ethereum private network
Ethereum private blockchain system
electronic money
data privacy
cyber-physical systems
cyber-physical production systems
cyber-physical production system prototype
Cryptography
cryptocurrency
CPPS backbone network
biblio
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
Mathematical model
topic modeling
system specific cybersecurity attack patterns
system
statistical distributions
security of data
security
Scalability
ranking method
pubcrawl
privacy
posterior distribution
pattern classification
natural language processing
attack topic distribution
KL divergence
Human Factors
expert systems
Databases
Data models
cybersecurity expert
cyber-physical systems
computer security
common attack pattern enumeration and classification database
common attack pattern enumeration
CAPEC database
capec
biblio
Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
human misbehavior
vulnerabilities
software defects
security pitfalls
security
Scalability
pubcrawl
privacy
PoW blockchain systems
PoW
PoS blockchain systems
PoS
nonfinancial applications
mathematical basis
bitcoin
Human Factors
Hacking
Governance
financial data processing
expert systems
electronic money
ecosystem issues
Cryptography
contracts
Companies
blockchain technology
blockchain
Bitcoin exchanges
biblio
Two-Phase Incentive-Based Secure Key System for Data Management in Internet of Things
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
Scalability
Internet of Things
key complexity
key cost
light-weight keys
low-level secure keys
multiphase security
network optimization
privacy
Privacy Policies
pubcrawl
Human Factors
security keys
self-trust incentive level
server-trust incentive level
Servers
service providers
TISK phase-I Generic Service Manager
TISK phase-II Dedicated Service Manager
TISK system
two-phase incentive-based secure key system
user nodes
data manager nodes
authentication
authorisation
authorized transactions
Certificate Generation
Complexity theory
computer network security
data aggregator nodes
data collector nodes
data expert nodes
data integrity
Aggregation
data privacy
data transactions
Database management in IoT
distributed data management
Distributed databases
distributed secure data management system
DSM-C module verifies
expert systems
GSM-C module
high-level secure keys
biblio
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
privacy protection
Servers
secure risk analysis method
secure multiparty computation
secret sharing
Scalability
risk analysis
Random access memory
pubcrawl
Prototypes
Protocols
Attack Tree Analysis
privacy preserved rule-based risk analysis
privacy
Ports (Computers)
Human Factors
expert systems
Engines
data privacy
Cryptography
confidential information leakage
confidential information abuse
biblio
Blockchain: Solving the Privacy and Research Availability Tradeoff for EHR Data: A New Disruptive Technology in Health Data Management
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
policy maker institutions
health system developers
Human Factors
law regulations
lifelong recorded patient health data
Medical services
multisignature data access
patient data
patient privacy
Health information ecosystem
policy makers
population health management
privacy
privacy data
protective principles
pubcrawl
Scalability
secure data storing
defensive data hiding attitude
blockchain
blockchain technology
Business
cryptographically secured data storage
Cryptography
data availability
data privacy
data structures
American HIPAA regulation
disruptive technology
EHR
EHR data
electronic health records
ethical problems
expert systems
health data management
Health data storage
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »