Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
System recovery
biblio
Functionality and Security Co-Design Environment for Embedded Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
recovery
Hardware
hardware development
intelligence surveillance and reconnaissance sensors
Lincoln asymmetric multicore processing architecture
Mission Assurance
mission functions
Multicore processing
multiprocessing systems
pubcrawl
functionality
resilience
resilient embedded system
Secure Processing
security
software development
Sophisticated Attacks
surveillance
System recovery
testbed
computer network security
Resiliency
adversarial cyber effects
anomalies detection
asymmetric multicore processing
Availability
co-design
co-design environment
command and control systems
Complexity theory
Resilient Security Architectures
critical missions
Cryptography
deliberate attacks
department of defense mission systems
DoD
electronic signal intelligence systems
electronic warfare
embedded systems
biblio
Reliability Assessment of Distribution Network Considering Cyber Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
power distribution faults
System recovery
Switches
smart power grids
Smart Grid
SCADA systems
Resiliency
resilience
reliability assessment
Reliability
pubcrawl
power system stability
power system security
power system reliability
power engineering computing
power distribution reliability
Circuit faults
power distribution control
physical networks
lED
Intelligent sensors
intelligent electronic devices
IEEE-33-bus distribution system
fault recovery process
distribution network
distribution main station
cyberattack
cyber-physical systems
cyber networks
Cyber Attacks
computer network security
biblio
Secure Scan Architecture Using Clock and Data Recovery Technique
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
fault coverage
Voltage control
System recovery
security threats
security of data
secure scan architecture
Scan Architecture
Resiliency
resilience
pubcrawl
Observability
Hardware Security
fault diagnosis
authentication
encoding
DLL
DfT technique
DfT
design for testability
delays
Controllability
computer architecture
Clocks
clock-data recovery technique
CDR
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
biblio
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
cross-site scripting
expert systems
pubcrawl
resilience
Resiliency
Secure File Sharing
security
security patterns
Software Architecture
System recovery
Vulnerability
biblio
Fast Unloading Transient Recovery of Buck Converters Using Series-Inductor Auxiliary Circuit Based Sequence Switching Control
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
System recovery
sequence switching control scheme
series inductor auxiliary circuit based sequence switching control
series-inductor auxiliary circuit
SSC control scheme
Steady-state
Switching circuits
switching systems (control)
switching time sequence
sequence switching control (SSC)
time-optimal control scheme
Transient analysis
transient response
unloading transient response
variable inductance circuit
voltage 12 V to 3.3 V
voltage overshoot
Inductors
Buck converters
capacitor-charge balance principle
control systems
equivalent inductance
fast transient regulation
fast unloading transient event
fast unloading transient recovery
Inductance
buck converter
load transient response
low-voltage high-current synchronous buck converter
output current ripple reduction
power convertors
pubcrawl
resilience
Resiliency
biblio
One Quantifiable Security Evaluation Model for Cloud Computing Platform
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
public cloud
visualization
visual graphs
visual display module
System recovery
Security Visualization
security view
security situation
security scanning engine
security recovery engine
security of data
security
Resiliency
resilience
quantifiable security evaluation model
quantifiable evaluation
API
pubcrawl
private cloud
multiple clouds
mixed cloud
maintenance engineering
graph theory
G-Cloud platform
Engines
dynamic security scanning score
Computational modeling
cloud resources
cloud computing platform
Cloud Computing
application security
application program interfaces
biblio
Email-Based Password Recovery - Risking or Rescuing Users?
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
resilience
Web sites
web services
user instructions
user authentication
usability
Unsolicited electronic mail
telecommunication security
System recovery
shared secret
security problem
secret passwords
secret link
Resiliency
authentication
pubcrawl
password recovery email
password recovery
password
message authentication
entire user-website relationship
English language websites
email-based password recovery
email content
Electronic mail
content issues
content and design of email-based password recovery
authorisation
biblio
An Automated System Recovery Using BlockChain
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
duplicated file integrity
System recovery
Servers
security of data
Resiliency
resilience
Registers
recovery performance evaluation
pubcrawl
performance evaluation
automated system recovery
DR system
disaster recovery system
disaster recoevry
data integrity
Cloning
blockchain
block-chain
back-up procedures
biblio
RockFS: Cloud-Backed File System Resilience to Client-Side Attacks
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
cloud
Cloud Computing
File systems
Intrusion Recovery
Metrics
privacy
pubcrawl
resilience
Resiliency
Scalability
Secure File Sharing
System recovery
user privacy
user privacy in the cloud
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »