Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data visualisation
biblio
Human-centric Software Engineering for Next Generation Cloud- and Edge-based Smart Living Applications
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Smart homes
Intelligent sensors
Internet of Things
next generation cloud
next-generation applications
privacy
Privacy Requirements
pubcrawl
Scalability
smart cities
smart city-related data
human-centric software engineering
smart living systems
Software
software activities
software development
software engineering
software requirements engineering
user centred design
user interfaces
visualization
edge computing applications
Cloud Computing
data analysis
data analysis applications
data privacy
data visualisation
diverse software usability defects
diversity and inclusion
domain-specific visual models
edge computing
aging
edge-based smart living applications
edge-based software systems
end user emotions
expert systems
Formal Specification
human computer interaction
Human Factors
human usage patterns
human-centric security
biblio
Exploiting Symmetry in Dependency Graphs for Model Reduction in Supervisor Synthesis
Submitted by aekwall on Mon, 02/08/2021 - 1:39pm
cyber-physical system
tunnels
system components
synthesis problem
supervisory controller
supervisor synthesis
required computational time
reduced order systems
model reduction steps
lengthy synthesis procedures
even unsolvable synthesis procedures
dependency graphs
Cyber Dependencies
Discrete-Event Systems
Scalability
discrete event systems
actuators
Compositionality
Human Factors
data visualisation
automata
sensors
cyber-physical systems
Analytical models
Metrics
graph theory
pubcrawl
Resiliency
biblio
ARtect, an augmented reality educational prototype for architectural design
Submitted by grigby1 on Wed, 02/03/2021 - 1:11pm
resilience
digital instrument
education
educational interactive tool
exterior environments
Human behavior
Human Factors
immersive tool
privacy
pubcrawl
rendering (computer graphics)
design proposal
Solid modeling
solid modelling
Three-dimensional displays
tools
Two dimensional displays
Unity 3D
user interfaces
user-friendly interface
virtual reality
visualization
augmented reality
2d graphic
2D graphic visualisation
3D carton models
3d models
application
architectural design process
architectural project
architecture
ARtect
artists
immersive systems
augmented reality educational prototype
CAD
composability
computer aided instruction
computer architecture
custom-made 3D model visualisation
cyber physical systems
data visualisation
design
biblio
Exploring Immersive and Non-Immersive Techniques for Geographic Data Visualization
Submitted by grigby1 on Wed, 02/03/2021 - 1:09pm
geospatial model visualization
resilience
pubcrawl
privacy
nonimmersive visualizations
nonimmersive technique
immersive technique
Human Factors
Human behavior
immersive systems
geospatial data visualization
geographic information systems
geographic data visualization
data visualisation
data analysis
cyber physical systems
composability
biblio
Magnetic Resonance Imaging Visualization in Fully Immersive Virtual Reality
Submitted by grigby1 on Wed, 02/03/2021 - 1:08pm
immersive learning tool
virtual reality
Two dimensional displays
Three-dimensional displays
resilience
pubcrawl
privacy
possible orientations
neurophysiology
neuroimaging
multidimensional neuroimaging data
MRI scan
MRI
medical image processing
Magnetic Resonance Imaging visualization
magnetic resonance imaging
immersive systems
Human Factors
Human behavior
Headphones
Head
fully immersive learning environment
different slices
desired slice
Data visualization
data visualisation
cyber physical systems
composability
commercial fully immersive virtual reality systems
brain
biomedical MRI
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
biblio
Security Visualization and Active Querying for OT Network
Submitted by grigby1 on Mon, 01/25/2021 - 11:28am
physical objects
intrusion prevention system
Metrics
Monitoring
network behavior
network inclusion
network security
operational technology network
OT Network
intrusion detection system
pubcrawl
real-time systems
resilience
Resiliency
security
Security Visualization
visualization
Workstations
cyber-attacks
Air gaps
air-gap
business network
comma separated value format
common event format
composability
computer network security
computer networks
active querying
Data collection
data visualisation
Data visualization
firewalls
Human behavior
Human Factors
internet
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
data visualisation
word embedding
unsupervised clustering
persistent attacks detection
IP2Vec
IP address
Graph Models
feature embeddings
event feature embeddings
community detection
alert graphs
advanced persistent threats
security analysts
coordinated attacks
security of data
graph model
IDS
APT
advanced persistent threat
network security
Scalability
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Intrusion Detection Systems
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 12:22pm
deep Web visualization
visualization
unknown dark channels
Tors encryption client
security
search engines
pubcrawl
Java
internet
Human Factors
Human behavior
Google
drugs
analysis
deep web
Databases
Data visualization
data visualisation
dark web
Cryptography
Crime Trace
crime monitoring
crime management
crime information visual system
Computer crime
1
2
3
4
5
next ›
last »