Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Redundancy
biblio
Evaluation of metrics of susceptibility to cascading blackouts
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
Computing Theory
Western interconnection
susceptibility metric evaluation
power system redundancy
Power system protection
Power system operation
power system interconnection
power system faults
LODF matrix
line outage distribution factor matrix
DFAX matrix
cascading blackouts
blackouts
Redundancy
Security Metrics
Stress
power system reliability
power system planning
Springs
Metrics
network theory (graphs)
Correlation
Monitoring
matrix algebra
power system security
Measurement
pubcrawl
biblio
Synergic Security for Smart Water Networks: Redundancy, Diversity, and Hardening
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
CPS Privacy
Computing Theory
Cyber-physical attacks
cyber-physical systems
Cybersecurity
diversity
Hardening
pubcrawl
Redundancy
resilience
smart water networks
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV
biblio
DNS configurations and its security analyzing via resource records of the top-level domains
Submitted by grigby1 on Mon, 06/11/2018 - 3:36pm
Redundancy
top-level domains
top-level domain
Servers
Semiconductor optical amplifiers
security of data
security
Scalability
resource record
Resiliency
resilience
Databases
pubcrawl
NS servers
network servers
Named Data Network Security
IP networks
internet
Human behavior
domain name system
DNS configuration
biblio
FailureSense: Detecting Sensor Failure Using Electrical Appliances in the Home
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
Monitoring
Training data
Training
telecommunication network reliability
Smart homes
sensor reliability
sensor placement
sensor firing
sensor failure detection
sensor deployment
Redundancy
Data collection
inexpensive sensors
home networks
home electrical appliances
Home appliances
fault diagnosis
failuresense
fail-stop failure
Electrical products
distributed sensors
1536086
biblio
Self-Healing Router Architecture for Reliable Network-on-Chips
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
Circuit faults
composability
computer architecture
Evolvable hardware
Fault Tolerant
Hardware
NoCs
Ports (Computers)
pubcrawl
Redundancy
resilience
Resiliency
Routing
self-healing
self-healing networks
biblio
Reliable Multipath Communication Approach for Internet-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
reliability gain maximization
multipath channels
Multipath communication
multipath transport protocols
Protocols
pubcrawl
RC4CPS dynamic MP selection
Redundancy
Reliability
Monitoring
reliability requirements
reliable multipath communication approach
resilience
Resiliency
Scalability
smart grid applications
transport protocols
Availability
Metrics
Internet-based cyber-physical systems
Internet-based CPS
internet
Human Factors
Human behavior
future communication network
estimation
e2e approach
diversity
cyber-physical systems
Cyber Dependencies
Correlation
computer network reliability
Compositionality
biblio
Differential mutual information forward search for multi-kernel discriminant-component selection with an application to privacy-preserving classification
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
privacy
Measurement
mKDCA feature-map
mobile computing
mobile sensing
multi-kernel learning
multikernel discriminant-component selection
multiple Kernel Discriminant Component Analysis feature-map
Mutual information
pattern classification
machine learning
privacy-aware classification
privacy-preserving classification
pubcrawl
Redundancy
resilience
Resiliency
Scalability
utility classification performance
Human behavior
Artificial Intelligence
Compressive Privacy
data privacy
Differential mutual information
Differential Mutual Information (DMI)
DMI forward search method
feature engineering
Fisher's discriminant analysis
high-quality predictor
AI
human factor
Human Factors
incremental forward search
Kernel
Kernel Discriminant Component Analysis (KDCA)
kernel selection
Kernels
learning (artificial intelligence)
biblio
Using TLA+ in the Development of a Safety-Critical Fault-Tolerant Middleware
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
safety-critical software
railway safety
railways
Redundancy
Resiliency
safety integrity level 4
safety-critical fault-tolerant middleware
safety-critical industries
safety-critical modules
railway control applications
Software Architecture
software fault tolerance
software quality
software quality metrics
TAS Control Platform
TLA+
trusted platform modules
formal methods
C code
C language
Code Generation
complex algorithms
composability
distributed algorithms
Fault tolerant systems
fault-tolerant distributed algorithms
Algorithm design and analysis
Formal Specification
formal verification
middleware
model checking
property-driven design
pubcrawl
rail traffic control
biblio
Towards Mitigating Uncertainty of Data Security Breaches and Collusion in Cloud Computing
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Scalability
modified threshold Asmuth-Bloom
optimistic system behavior
pessimistic system behavior
private key cryptography
pubcrawl
Redundancy
Redundant Residue Number System
Resiliency
Metrics
Secret key
secret sharing schemes
speed per price ratio
system behavior optimization
uncertainty
uncertainty mitigation
weighted Mignotte secret sharing scheme
approximate method
localization improvement
error correction accuracy
encryption data redundancy minimization
detection improvement
data security breaches
data collusion
data access speed
Cryptography
Collusion
cloud parameter uncertainty
Cloud Computing
cloud collusion
big data security in the cloud
Big Data
balanced system behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »