Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
natural disasters
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by aekwall on Mon, 07/06/2020 - 9:18am
automated damage assessment
Damage Assessment
sUAS
small unmanned aircraft systems
post-disaster response
optical radar
online mapping technique
natural disasters
lidar
Laser radar
Infrastructure Inspection
Homeland Security
Inspection
—sUAS
disasters
Aircraft
Bridges
National security
autonomous aerial vehicles
Three-dimensional displays
Cameras
pubcrawl
Resiliency
critical infrastructure
biblio
Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
soft failures
optimization
Power Grid
power grids
power system faults
pubcrawl
recovery schedule
rescue missions
resilience
Resiliency
network recovery
software defined networking
Software Defined Networks
software-defined networking
System recovery
telecommunication network reliability
telecommunication network routing
telecommunication scheduling
telecommunication security
uncertainty
large-scale failures
communication infrastructure
Communication Network
Communication networks
congested links
disruptive routing framework
failure locations
failure recovery
interdependent networks
Knowledge engineering
Cascading Failures
maintenance engineering
Massive Disruption
massive failures
Monitoring
multiple interconnected networks
multistage recovery approach
natural disasters
Network Monitoring
network monitoring techniques
biblio
Ship-to-Grid Integration: Environmental Mitigation and Critical Infrastructure Resilience
Submitted by grigby1 on Wed, 02/26/2020 - 3:44pm
reverse cold ironing
marine power systems
Metrics
natural disasters
offshore installations
pollutant mitigation
Port of Kyllini
pubcrawl
resilience
Resiliency
Logistics
ship-to-grid
ship-to-grid integration
ship-to-shore interconnection
ships
Smart Grids
smart power grids
Technological innovation
threat mitigation
United States
Europe
alternative maritime power
architecture
Buildings
cold ironing
critical infrastructure resilience
critical infrastructures
diesel engines
disasters
environmental pollutants mitigation
air pollution control
European Union
Greece
grid-to-ship
GridLAB-D
GridLAB-D software
Human behavior
Human Factors
humanitarian relief
biblio
Risk assessment of agricultural supply chain based on AHP- FCS in Eastern Area of Hunan Province
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
natural disasters
the AHP- FCS method
supply chains
Supply Chain
security
risk management
risk assessment
risk analysis
Reliability
pubcrawl170112
agricultural product
Hunan province
fuzzy set theory
fuzzy comprehensive analysis
Face
economic development stability
analytic hierarchy process
AHP- FCS
agricultural supply chain
agricultural products
profile
Brooke Liu
risk communication
resilience
natural disasters
terrorism studies
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism