Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Object oriented modeling
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 1:36pm
program testing
web services
vulnerable methods
vulnerable code
vulnerability prediction models
Vulnerability
vulnerabilities
software security
software quality
software metrics
Software
security of data
security
pubcrawl
Complexity theory
Predictive models
Object oriented modeling
nanopatterns
nano-pattern
metrics testing
Metrics
method-level traceable patterns
method-level software metrics
Measurement
learning (artificial intelligence)
Java
internet
biblio
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 1:35pm
object-oriented methods
vulnerable source code
source code (software)
software vulnerabilities
software security
software quality metrics
software quality
software metrics
Software
security of data
Security Metrics
security
secure software
pubcrawl
PHP security
object-oriented PHP application
Availability Score
Object oriented modeling
national vulnerability database
metrics testing
Metrics
Measurement
Integrity Score
CVSS
Couplings
Correlation
Confidentiality Score
Complexity theory
code metrics
Code Characteristics
CIA Model
biblio
Applying Probabilistic Programming to Affective Computing
Submitted by grigby1 on Mon, 10/05/2020 - 1:50pm
Compositionality
Human behavior
Human Factors
Computing Theory and Compositionality
affective computing
Artificial Intelligence
cognition
Computational modeling
Emotion Theory
Modeling Human Emotion
Object oriented modeling
Probabilistic logic
programming
psychology
pubcrawl
biblio
A gateway to easily integrate simulation platforms for co-simulation of cyber-physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
pubcrawl
Java
Large-scale systems
Libraries
Logic gates
Metrics
National Institute of Standards and Technology co-simulation platform
NIST co-simulation platform
Object oriented modeling
interacting physical components
Research Infrastructure
resilience
Resiliency
simulations
Software Architecture
standards
Universal CPS Environment
CPS modeling
high-level architecture standard
high level architecture
functional mock-up interface
distributed simulation
distributed processing
digital simulation
cyber-physical systems
CPS conceptual design
computer architecture
Computational modeling
composability
communication libraries
co-simulation expertise
co-simulation
simulation
biblio
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
OPC UA
unified data model
unified communication architecture
standards
Security Requirements Modeling
security requirement communication
security of data
security
SCADA Security
Resiliency
resilience
pubcrawl
production engineering computing
Production
open platform communications
OPC UA server
composability
object oriented security
Object oriented modeling
Metrics
machine-readable data model
Internet of Things
Industries
industrial IoT security requirements
industrial infrastructures
Industrial Control Systems
industrial control system security
industrial control
Germany
fourth industrial revolution
Data models
biblio
Performance Evaluation for Secure Internet Group Management Protocol and Group Security Association Management Protocol
Submitted by grigby1 on Fri, 04/24/2020 - 4:21pm
multicast communication
Unicast
telecommunication security
security
secure Internet Group Management Protocol
Resiliency
resilience
pubcrawl
Protocols
object oriented security
Object oriented modeling
multicast protocols
multicast distribution
authorisation
Metrics
media streaming
IPTV
IP networks
IP multicast technology
Internet service providers
Internet protocol television
internet
Group Security Association Management Protocol
data delivery
composability
biblio
Modeling Cloud Based Cyber Physical Systems Based on AADL
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
modeling languages
wireless sensor networks
vehicle
Unified modeling language
UML
Software Architecture
Software
security of data
Resiliency
resilience
quality of service
QoS
pubcrawl
object-oriented methods
object oriented security
Object oriented modeling
AADL
modeling
Metrics
Intelligent Transportation Systems
distributed sensors
distributed sensor networks
Data models
cyber-physical systems
CPS
Computational modeling
composability
cloud-based cyber-physical systems
cloud platforms
Cloud Computing
cloud
biblio
Research on the Simulation Algorithm of Object-Oriented Language
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented languages
write-back cache
visualization
system analysis and design
static protection
simulation algorithm
security model
safety-critical software
Resiliency
resilience
pure object oriented language
pubcrawl
process language
object-oriented programming
cache storage
Object-Oriented Language
object oriented security
Object oriented modeling
mixed object oriented language
Metrics
low-energy independence complexity theory
Local area networks
inheritance
GUT
Extraterrestrial measurements
dynamic protection
composability
Complexity theory
biblio
A Robust Malware Detection System Using Deep Learning on API Calls
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
cuckoo sandbox
robust malware detection system
redundant API
Object oriented modeling
neural nets
massive malware
massive datasets
malware detection
computer security
component
BLSTM
API sequences
API calls
API
Logic gates
application program interfaces
sandboxing
invasive software
malware
composability
policy-based governance
pubcrawl
Neural networks
feature extraction
collaboration
learning (artificial intelligence)
deep learning
« first
‹ previous
1
2
3
4
next ›
last »