Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software algorithms
biblio
Research on Intelligent Network Operation Management System Based on Anomaly Detection and Time Series Forecasting Algorithms
Submitted by grigby1 on Wed, 08/23/2023 - 2:35pm
Anomaly Detection
pubcrawl
Scalability
network security
Prediction algorithms
operating systems
Software algorithms
Time series analysis
Time Series Prediction
Telecommunications
network operation
i-o systems security
Software Architecture
Intelligent networks
biblio
Rewrite Rules for Automated Depth Reduction of Encrypted Control Expressions with Somewhat Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 10:31am
Nonlinear dynamical systems
torque control
Manipulator dynamics
expression simplification
Resiliency
Software
Scalability
Cryptography
Cybersecurity
Software algorithms
resilience
Homomorphic encryption
Arithmetic circuits
Associative rewrite
depth
encrypted control
pubcrawl
Human behavior
Human Factors
Metrics
biblio
Library of Fully Homomorphic Encryption on a Microcontroller
Submitted by grigby1 on Fri, 08/11/2023 - 10:30am
Libraries
Metrics
resilience
Resiliency
pubcrawl
Human behavior
Human Factors
Scalability
Cryptography
library
C++ languages
Software algorithms
microcontrollers
Memory
fully homomorphic encryption
Homomorphic encryption
ESP 32 microcontroller
biblio
CySec Game: A Framework and Tool for Cyber Risk Assessment and Security Investment Optimization in Critical Infrastructures
Submitted by grigby1 on Fri, 08/04/2023 - 10:15am
Smart Grids
remote monitoring
attack-defense tree
game theoretic security
game theory
software tools
risk assessment
Software algorithms
Games
critical infrastructure
Cybersecurity
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
CPS
risk management
biblio
Security Authentication Scheme for Low Earth Orbit Satellites Based on Spatial Channel Characteristics
Submitted by grigby1 on Fri, 07/14/2023 - 9:49am
pubcrawl
Metrics
resilience
authentication
Software Defined Network
Compositionality
Resistance
Software algorithms
Force
simulation
security authentication
Satellites
Resiliency
channel characteristics
Low earth orbit satellites
encryption audits
biblio
DNA-based Secret Sharing and Hiding in Dispersed Computing
Submitted by grigby1 on Wed, 07/12/2023 - 12:35pm
pubcrawl
Human behavior
Metrics
resilience
Conferences
privacy
Software algorithms
software reliability
Distributed databases
DNA
Steganography
dispersed computing
DNA cryptography
Resiliency
nitrogen
Secret division
biblio
Towards a secure Software Defined Network with Adaptive Mitigation of DDoS attacks by Machine Learning Approaches
Submitted by grigby1 on Thu, 06/22/2023 - 1:17pm
DDoS Attacks
Attack modelling
Matching pursuit algorithms
mathematical models
Resiliency
software defined networking
denial-of-service attack
Dictionaries
Software algorithms
DDoS attack mitigation
machine learning
composability
telecommunication traffic
resilience
Metrics
Human behavior
pubcrawl
Intrusion Detection Systems
machine learning algorithms
biblio
Discovery of AI/ML Supply Chain Vulnerabilities within Automotive Cyber-Physical Systems
Submitted by grigby1 on Fri, 06/09/2023 - 1:19pm
composability
Autonomous Vulnerability Discovery
Cyber Dependencies
Supply Chain
autonomous vehicles
Resiliency
supply chains
software reliability
Software algorithms
Compositionality
cyber-physical systems
machine learning algorithms
Artificial Intelligence
Scalability
Safety
Software
resilience
Metrics
Human Factors
Human behavior
pubcrawl
machine learning
biblio
Uplink Capacity Optimization for High Throughput Satellites using SDN and Multi-Orbital Dual Connectivity
Submitted by grigby1 on Fri, 05/19/2023 - 1:29pm
Conferences
coupled congestion control
Dynamic scheduling
Heuristic algorithms
pubcrawl
resilience
Resiliency
Satellites
Scalability
security
Software algorithms
System performance
Throughput
biblio
Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology
Submitted by grigby1 on Fri, 03/03/2023 - 8:23am
Compositionality
Shodan Eye
Linux Operating System Security
Vulnerability Analysis
Kali Linux
Reconnaissance
Software algorithms
operating systems
resilience
Organizations
Linux
network security
composability
Industries
privacy
Resiliency
Metrics
pubcrawl
1
2
3
4
5
6
7
8
9
next ›
last »