Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information network
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 1:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
power information
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
coupling model
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
computer network reliability
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
Bayes methods
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
Vulnerability Analysis of Smart Grid under Community Attack Style
Submitted by grigby1 on Fri, 04/24/2020 - 3:37pm
Community theory
Power Grid Vulnerability Assessment
Vulnerability Analysis
Power system protection
power system faults
power lines
Power Grid
Power cables
MLRM
minimum load reduction model
linear programming problem
Linear programming
information network
England 39 nodes system
cyber network
controllable power nodes
pubcrawl
community attack style
cascading failure process
cascading failure
failure analysis
Metrics
network topology
power system control
Smart Grids
Load modeling
composability
smart power grids
Smart Grid
Generators
Resiliency
resilience
biblio
Study on Security Technology of Internet of Things Based on Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
network coding
traditional network technology
Satellites
prefect information secure condition
max-flow
information secure network coding scheme
information network
eavesdropping adversaries
cyber physical systems
computer network security
encoding
Predictive Metrics
information technology
composability
pubcrawl
Resiliency
security
Internet of Things
biblio
Unified multi-critical infrastructure communication architecture
Submitted by BrandonB on Tue, 05/05/2015 - 11:38am
Interdependency
unified multicritical infrastructure communication architecture
Subscriptions
situational awareness
security
quality of service
Publish/Subscribe
private sector
Monitoring
interdependent infrastructure nodes
communication model
information sharing
information network
information management
government sector
Data models
critical infrastructures
critical infrastructure
computer network reliability