Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bridges
biblio
Work-in-Progress: Measuring Security Protection in Real-time Embedded Firmware
Submitted by grigby1 on Thu, 07/13/2023 - 2:32pm
security
pubcrawl
Metrics
resilience
embedded systems
Ecosystems
composability
real-time systems
cyber-physical systems
Bridges
Scheduling algorithms
Resiliency
biblio
Research on the Application of Computer Big Data Technology in the Health Monitoring of the Bridge Body of Cross-river Bridge
Submitted by grigby1 on Fri, 06/16/2023 - 2:57pm
Analytical models
Big Data
bridge body health monitoring system
Bridges
Computational modeling
computer
cross-river bridge
data deletion
Distributed databases
Ports (Computers)
pubcrawl
real-time systems
Scalability
biblio
Star-Bridge: a topological multidimensional subgraph analysis to detect fraudulent nodes and rings in telecom networks
Submitted by grigby1 on Fri, 03/31/2023 - 10:20am
Shape
Stars
Network Control
Fraud Type
Fraud Networks
Fraud Enabler
Bridging Centrality
Resiliency
big data security metrics
pubcrawl
Bridges
Measurement
network topology
Big Data
Industries
Scalability
resilience
biblio
A Lightweight Scalable Blockchain Architecture for IoT Devices
Submitted by grigby1 on Fri, 02/17/2023 - 4:17pm
Data Security
off-chain scaling
microtransaction
Behavioral sciences
scalable verification
blockchains
Bridges
Couplings
Compositionality
Internet of Things
blockchain
maintenance engineering
Scalability
Conferences
Resiliency
resilience
Metrics
pubcrawl
biblio
A Named Entity Recognition Based Approach for Privacy Requirements Engineering
Submitted by grigby1 on Tue, 09/20/2022 - 12:27pm
machine learning
pubcrawl
Human behavior
Conferences
Scalability
privacy
Agile development
named entity recognition
Bridges
requirements engineering
Knowledge engineering
expert systems
Data protection
Human Factors
privacy requirements engineering
user stories
biblio
Bitcoin-Compatible Virtual Channels
Submitted by aekwall on Fri, 08/12/2022 - 2:54pm
privacy
smart contracts
Virtual machining
Buildings
Bridges
bitcoin
blockchains
pubcrawl
Blockchain-scalability
Off-chain
Virtual-Channels
composability
biblio
Recommendation Method of Honeynet Trapping Component Based on LSTM
Submitted by grigby1 on Fri, 07/15/2022 - 11:59am
data privacy
Pervasive Computing Security
honeynet
Hacker's interests
attention mechanism
LSTM
Bridges
Metrics
network security
Big Data
Computer hacking
Scalability
Analytical models
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Predictive models
biblio
Pyramid: A Layered Sharding Blockchain System
Submitted by aekwall on Tue, 04/19/2022 - 10:19am
collaboration
Scalability
Conferences
Resiliency
composability
Throughput
Prototypes
Bridges
pubcrawl
Atomic layer deposition
Cross Layer Security
biblio
Automated nets extraction for digital logic physical failure analysis on IP-secure products
Submitted by grigby1 on Wed, 08/11/2021 - 2:27pm
Layout
User-Defined Online Search (UDOS)
tools
Tool Command Language (TCL)
Scan Diagnosis
Resiliency
resilience
pubcrawl
policy-based governance
Open Artwork System Interchange Standard (OASIS)
Metallization
multiple fault diagnosis
KTMask Command (Program to send commands to the Synopsys Avalon MaskView tool)
KDB (Conversion of GDSII information in to Synopsys Avalon Database)
ip protection
Inspection
Graphic Database System (GDSII)
failure analysis
composability
collaboration
Circuit faults
Bridges
biblio
Client-side Security Assessment and Security Protection Scheme for Smart TV Network
Submitted by grigby1 on Mon, 03/15/2021 - 12:11pm
Logic gates
Web and internet services
TV network
smart TV
security protection
security assessment
security
resilience
pubcrawl
Metrics
Networked Control Systems Security
intelligent data
debugging
command injection attacks
client-side
Cable TV
Bridges
Predictive Metrics
composability
Resiliency
1
2
3
next ›
last »