Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
process control
biblio
Formal Verification Technology for Asynchronous Communication Protocol
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
policy-based governance
verification work efficiency
UART communication
traditional simulation method
Software
pubcrawl
PSL
Protocols
protocol verification
property
product design quality
Product design
process control
privacy
aerospace FPGA software products
formal verification technology
formal verification
field programmable gate arrays
Compositionality
composability
complete verification process
collaboration
Clocks
blind spots
asynchronous communication protocol
asynchronous communication
assert
biblio
Determining a Security Roadmap for the Microelectronics Industry
Submitted by grigby1 on Wed, 09/11/2019 - 2:43pm
security
Microelectronics
microelectronics manufacturing industry
Microelectronics Security
microfabrication
process control
production engineering computing
pubcrawl
resilience
Resiliency
Metrics
security maintenance
security of data
security technology roadmap
smart manufacturing
standards
Supply Chain
supply chain management
technological forecasting
industrial property
Big Data
big data explosion
Cloud Computing
cloud-based solutions
composability
data sharing
data systems
electronic equipment manufacture
electronics industry
advanced process control efforts
Industry 4.0
industry-wide standards
information security
International Roadmap for Devices and System Factory Integration International Focus Team
IP networks
IP security
IRDS FI IFT
manufacturing
biblio
Trust-Based Framework for Resilience to Sensor-Targeted Attacks in Cyber-Physical Systems
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
sensor-targeted attacks
Observers
policy-based governance
primary sensor
process control
process state
pubcrawl
resilience
Resiliency
Safety
Scalability
security
networked control systems
sensors
Silicon
stability
standard protocols
state estimates
state estimation
trust-based framework
Trusted Computing
weighted consensus
wireless sensor networks
false trust
closed loop systems
closed-loop control
collaboration
communication infrastructure
compromised sensors
computer network security
cyber-physical plants
cyber-physical systems
entire plant
false data injections
CPS resilience
far-flung locations
feedback
feedback signal
interconnected processes
local data
local process
malicious agents
Measurement
Monitoring
multisensor networked physical experiment
biblio
The Urgency of the Threats of Attacks on Interfaces and Field-Layer Protocols in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
integrated circuits
sensors
security of data
scalable
Scalability
Resiliency
resilience
pubcrawl
Protocols
process control
Current loop
information security systems
Industrial Control Systems
industrial control system information security
industrial control system field layer
industrial control system
industrial control
HART-protocol
Current measurement
biblio
Network Security Situation Awareness for Industrial Control System Under Integrity Attacks
Submitted by grigby1 on Thu, 05/09/2019 - 10:45am
novel security situation awareness framework
telecommunication security
system state estimation
state estimation
situation prediction algorithm
Situation Awareness
Sensor Systems
scalable
Scalability
Resiliency
resilience
pubcrawl
process control
Prediction algorithms
particle filtering (numerical methods)
particle filtering
Networked Control Systems Security
nonlinear systems
network security situation awareness
malicious attacks
local estimator
integrity attacks
integrated circuits
Industrial Control Systems
industrial control system network
industrial control system
industrial control
hazard situation detection
control systems
computer network security
Communication networks
biblio
Security system based on microcontrollers
Submitted by aekwall on Mon, 03/25/2019 - 9:57am
security system
Local area networks
magnetic contact
Magnetic field measurement
magnetic sensors
microcontroller
microsensors
movement detection measurement
process control
level measurement
sensor modules
single-chip microcontrollers
Smart Home
Temperature measurement
unauthorized entrance detection
Web server implementation
Web servers
sensor security
microcontrollers
Monitoring
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Temperature sensors
security
carbon monoxide level measurement
computerised instrumentation
development board Arduino
Ethernet interface
file servers
humidity measurement
Intelligent sensors
biblio
LUCON: Data Flow Control for Message-Based IoT Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
message-based IoT systems
usage control mechanisms
usage control
Temperature measurement
taint analysis
sensors
Semantics
Runtime
real-world IoT middleware
pubcrawl
process control
private data
policy enforcement
personal information
middleware
Metrics
Access Control
message routes
LUCON policies
IoT applications
Internet of Things
information leaks
Information Flow Control
Industrial Internet of Things
distributed systems
data-centric security policy framework
data privacy
data flows
data flow control
computer network security
composability
authorisation
biblio
Towards trustworthy data in networked control systems: A hardware-based approach
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
malfunctioning systems
trustworthy data
transferred data needs
telecommunication security
smart factories
security
Scalability
Resiliency
pubcrawl
process control
networked control systems
Networked Control System
NCS
captured sensor data
Loss measurement
hardware-based approach
forward error correction
encryption
encrypted data
denial-of-service attacks
delays
Cryptography
correct functionality
controlled process
Communication channels
biblio
Towards scalable and adaptable security monitoring
Submitted by grigby1 on Fri, 09/28/2018 - 4:15pm
Monitoring
security of data
security
scalable security monitoring
Scalability
Resiliency
resilience
pubcrawl
Protocols
proprietary technology
process control
physical- cyber domain
physical isolation
adaptable security monitoring
Metrics
intrusions
integrated circuits
Industrial Control Systems
industrial control
Image edge detection
edge detection
data reduction approaches
data reduction
cyber-physical systems
control system security
composability
biblio
The fuzzy control of trust establishment
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
model
unnecessary negotiation failure
Trusted Computing
trust establishment
trust
traditional ATN
strange entities
Servers
pubcrawl
process control
open network environment
negotiation strategy need
negotiation process
mutual trust
Access Control
Libraries
Human Factors
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy negotiation process
fuzzy control
Fuzzy
digital credentials
computer theory
Automated Trust Negotiation
authorisation
attribute certificate
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »