Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Degradation
biblio
Trust-Aware Emergency Response for A Resilient Human-Swarm Cooperative System
Submitted by grigby1 on Thu, 02/03/2022 - 4:18pm
human trust
cooperative systems
Degradation
emergency services
Human Factors
Inspection
pubcrawl
resilience
Resiliency
Robot motion
Robot Trust
Teamwork
tracking
biblio
Visual Authentication Scheme Based on Reversible Degradation and QR Code
Submitted by grigby1 on Tue, 08/31/2021 - 12:57pm
2D Barcode
authentication
Cryptography
Decoding
Degradation
image authentication
Meaningless Reversible Degradation
pubcrawl
QR codes
Redundancy
Reed-Solomon codes
resilience
Resiliency
Visual Authentication
visualization
biblio
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud
Submitted by grigby1 on Mon, 08/02/2021 - 3:11pm
Cloud Computing
pubcrawl
Metrics
Conferences
network security
Scalability
Access Control
Linux
Containers
moving target defense
Degradation
container
High performance computing
cloud computing security
biblio
Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense
Submitted by grigby1 on Mon, 08/02/2021 - 3:08pm
security
IP networks
pubcrawl
Metrics
Scalability
quality of service
software-defined networking
Measurement
moving target defense
Degradation
Web servers
Apache Web server
Performance Measure
biblio
A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
Submitted by grigby1 on Wed, 06/30/2021 - 3:21pm
Human Factors
Virtualization
Throughput
security
Resiliency
resilience
pubcrawl
modeling
Markov processes
Analytical models
Human behavior
False Data Detection
Degradation
cyber physical systems
composability
Cloud Computing
Anomaly Detection
biblio
Adversarial Attacks on GMM I-Vector Based Speaker Verification Systems
Submitted by grigby1 on Thu, 05/13/2021 - 12:22pm
Degradation
x-vector
speaker verification
GMM i-vector
Gaussian mixture model
adversarial attack
measurement uncertainty
speech processing
Attack vectors
signal processing
Error analysis
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Training
biblio
Quantifying the impact of network congestion on application performance and network metrics
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
Degradation
work factor metrics
packet transmission statistics
network counters
modern high-performance computing systems
intensive MPI operations
HPC network architecture
dragonfly topology
Aries network
application performance
network congestion
network metrics
network architecture
message passing
Scalability
HPC
Processor scheduling
telecommunication network topology
parallel processing
Topology
computer networks
Measurement
telecommunication network routing
Correlation
pubcrawl
Resiliency
Conferences
biblio
A Small Sample DDoS Attack Detection Method Based on Deep Transfer Learning
Submitted by grigby1 on Tue, 02/16/2021 - 12:57pm
neural nets
DDoS attack detection
small-sample DDoS attack detection
small sample DDoS attack
deep transfer learning
deep learning detection technique
8LANN network
transfer learning
denial-of-service attack
Degradation
Performance analysis
Measurement
deep learning
composability
Communication networks
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Neural networks
learning (artificial intelligence)
biblio
Aging Attacks against Electro-Mechanical Actuators from Control Signal Manipulation
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
electro-mechanical actuators
aging
aging attacks
carrier frequency
control signal manipulation
corrupted controller
digital control
Digital controller
digital controller technologies
Cavity resonators
electromechanical actuators
EMA's aging
Harmonic analysis
ICS's physical system
nonlegitimate pulse width modulation control signal
Pulse width modulation
remotely-accessibility capacity
cybersecurity threats
partial discharges
Degradation
actuator security
actuators
control engineering computing
industrial control
Cybersecurity
Metrics
composability
pubcrawl
Human behavior
Resiliency
Industrial Control Systems
security
security of data
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 2:39pm
synchronisation
PTP time synchronisation networks
PTP infrastructure components
PTP
programmable Man-in-the-Middle
programmable injector device
precision time protocol
IEEE 1588
computer clocks
advanced persistent threats
Clocks
Degradation
Synchronization
cyber-attacks
security of data
APT
advanced persistent threat
malware
delays
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
Cyber-security
« first
‹ previous
1
2
3
4
5
next ›
last »