Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Workstations
biblio
Artificial Intelligence and Internet of Things for Robotic Disaster Response
Submitted by aekwall on Mon, 12/14/2020 - 12:38pm
Mobile Robot
deep learning model training
Disaster Response
disaster site
disaster-straining robots
environmental Big Data
field workstation
Fukushima nuclear disaster
ground robots
intelligent Internet of Things
AIoT
model verification
natural man-made disasters
on-site continuing objects classification
robotic disaster response
surface robots
underwater swarm robots
Unmanned underwater vehicles
Wenchuan earthquake
image classification
Internet of Things
learning (artificial intelligence)
pubcrawl
composability
mobile robots
Swarm Intelligence
neural nets
Workstations
Big Data
Artificial Intelligence
control engineering computing
Robot sensing systems
Compositionality
government agencies
emergency management
disasters
Service robots
biblio
Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
criticality metric
Resilient Security Architectures
secure cyber infrastructure
resilient cyber infrastructure
model attacker
metric measure
lateral propagation
information flow dependency
host criticality
graph spectral matrices
EDS cyber infrastructure
defense-in-depth architecture
Cyber Resiliency
security of data
Resiliency
Energy Delivery Systems
system design
Firewalls (computing)
resilience
Indexes
Measurement
Workstations
Mathematical model
graph theory
pubcrawl
Servers
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
Dynamic Traffic Control System Using Edge Detection Algorithm
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
Traffic congestion
road traffic control
road vehicles
Roads
Scalability
security
smart city-smart travel
smart phone applications
smart phones
Resiliency
traffic engineering computing
Traffic light
traffic monitoring
traffic signal lights
transport network
vehicles
vehicular queuing
Workstations
Image edge detection
Communication networks
composability
congestion frequency detection
digital image processing techniques
dynamic traffic control system
edge detection
edge detection algorithm
electronic sensors
Cameras
Image Processing
image sequence
image sequences
magnetic coils
Metrics
pubcrawl
queueing theory
resilience
biblio
A Decision Matrix Model to Identify and Evaluate APT Vulnerabilities at the User Plane
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
Mobile handsets
Workstations
user plane
threat vectors
threat attributes
threat
Spear Phishing
security
pubcrawl
privacy
Phishing
Organizations
organizational user
organizational information systems
multiple APT threat vector scenarios
advanced persistent threat vectors
Metrics
malware prevention
malicious APT vector
invasive software
genuine communication
fraudulent communication
Email
Electronic mail
cyber-security defensive mechanisms
Computer crime
APT vulnerabilities
APT threat vector
APT decision matrix model
APT
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
biblio
Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and Uniformly
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
scratchpad volatile memory
client workstation
client-server systems
Educational institutions
large number of clients
open source
Open Source solution
operating system
public domain software
client computer
security privacy constraints
University of Texas
user workstation security
virtualized computing
Windows clients
workstation configuration
Workstations
Windows Operating System Security
Servers
security
pubcrawl
Metrics
Resiliency
composability
Streaming media
Protocols
computer network security
data privacy
Linux
applications on-demand
Blades
block level streaming
campus computing
campus setting
Central Processing Unit
biblio
Reducing Energy Waste for Computers by Human-in-the-Loop Control
Submitted by el_wehby on Fri, 05/25/2018 - 3:51pm
energy saving
Workstations
workstation
waste management
power aware computing
multilevel sensing strategy
IP networks
human-in-the-loop control
human-in-the-loop
Human Factors
human behavior understanding
energy waste reduction
energy waste
adaptive timeout interval strategy
energy management
energy conservation
distraction detection
distraction
cyber physical systems
CPS
Computer workstations
computer workstation
computer usage
computer
addressing background processing strategy
1536086
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
« first
‹ previous
1
2
3
next ›
last »