Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication networks
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
Metrics
Strategic Agents
social surplus maximizing mechanism
social surplus maximization
Silicon
security management
Resiliency
resilience
pubcrawl
Probability distribution
private information
network theory (graphs)
network security
network coordinator
multi-agent systems
Social Agents
interdependent valuations
interconnected multiagent networked systems
inter-temporal correlations
incentive compatibility
dynamic networks
dynamic mechanism design problem
dynamic mechanism design
Cost accounting
computer security
computer networks
computer network security
composability
Communication networks
agents security state
biblio
Enhanced Image Edge Detection Methods for Crab Species Identification
Submitted by grigby1 on Mon, 02/08/2021 - 1:01pm
resilience
Image Segmentation Methods
Industrial applications demand Image
Laplace equations
Laplacian of Gaussian
Metrics
morphological operations
Object recognition
Otsu Segmentation
Prewitt Operator
pubcrawl
image segmentation
Resiliency
Robert Operator
Robert operators
sample images
Scalability
security
Sobel operator
Sobel operators
spurious edges
Thresholding (Imaging)
edge detection
automatic image analysis
automatic object recognition
biological applications demand Image
Canny edge detection
Communication networks
composability
conducted analysis
crab images
crab species identification
digital image processing application
aspiring research areas
edge detection operators
Enhanced Image edge detection methods
enhanced prewitt operator
enhanced robert operator
feature extraction
image classification
image data
Image edge detection
image enhancement
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
power information
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
coupling model
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
computer network reliability
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
Bayes methods
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
Synthesizing Energy Consumption Data Using a Mixture Density Network Integrated with Long Short Term Memory
Submitted by grigby1 on Fri, 11/20/2020 - 1:06pm
residential consumer energy consumption
mixture density network
multiple critical infrastructures
policy-based governance
power engineering computing
Power Grid
Predictive models
privacy
privacy concerns
Probability density function
pubcrawl
Metrics
residential smart meters
resilience
Resiliency
Scalability
security
smart cities
smart grid consumer privacy
smart meters
smart power grids
standards
energy consumption
collaboration
commercial consumer energy consumption
Communication networks
composability
data analysis
data dissemination
Data models
data privacy
data storage
data synthesis
centralized data analytics
fully synthetic energy consumption data
Human behavior
human behavioral impacts
information dissemination
load patterns
Logic gates
long short-term memory network
LSTM
MDN
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
attack graph
Resilient Security Architectures
Unity software
system resiliency
security property
Resiliency
resilience level assessment
program visualisation
possible attack instances
JKind model checker integrated tool
generated network models
generated attack sequences
generated attack scenarios
cyber-physical-systems
architecture analysis-&-design language
AADL
security of data
faults
attack graphs
stability
Local area networks
Stability analysis
program verification
resilience
Communication networks
cyber-attacks
Analytical models
tools
graph theory
pubcrawl
security
biblio
Research on Vulnerability Ontology Model
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
inference mechanisms
Information Reuse and Security
weakness class
vulnerability class
security vulnerability ontology model
public information systems
knowledge inference
information security public databases
Inference Rules
industry public standards
CWE
capec
CVE
Compositionality
security of data
Communication networks
Ontology
ontologies (artificial intelligence)
finance
Economics
Vulnerability
Databases
standards
pubcrawl
Resiliency
security
Ontologies
biblio
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning
Submitted by grigby1 on Wed, 11/04/2020 - 12:44pm
groupware
team working
teaching methods
teaching
student-centered education
soft skills
pubcrawl
professional skills
privacy
Logic gates
IPsec
guided inquiry collaborative learning materials
Guided inquiry
collaborative learning
Firewalls (computing)
firewalls
firewall
education
cybersecurity teaching
cybersecurity education
cyber physical systems
computer science education
computer aided instruction
Communication networks
Collaborative Work
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »