Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
simulation
biblio
Performance Analysis of Black Hole Attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
MANET
Attack detection
AODV
black hole
Compositionality
Metrics
NS-2
pub-crawl
pubcrawl
resilience
Resiliency
security
simulation
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
Peer-to-peer computing
telecommunication security
simulation
signature
Servers
Security Properties
searching system
Scalability
Resiliency
resilience
Public key
pubcrawl
Proof-of-work
Ports (Computers)
blockchain
Named Data Network Security
IP networks
Internet of Things
Human behavior
Hash Function
file organisation
digital signatures
Databases
data management system
data management
data integrity
Cryptography
biblio
Attack Scenario Modeling for Smart Grids Assessment Through Simulation
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
security
pubcrawl
composability
physical layer security
simulation
resilience
Metrics
cyber-physical systems
Resiliency
Modeling Attacks
Smart Grids
biblio
{Cyber-physical Systems can Make Emergency Response Smart}
Submitted by el_wehby on Tue, 05/15/2018 - 11:18pm
Emergency Response
model-based design
optimization
simulation
Smart America
White House
1522458
biblio
Simulation and Analysis Framework for Cyber-Physical Systems
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
CPS Privacy
Compositionality
cyber physical systems
Human behavior
jamod
Modbus
Nuclear Reactor
pubcrawl
resilience
Resiliency
SCADA systems
security
simulation
biblio
On modeling of eavesdropping behavior in underwater acoustic sensor networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:51am
security
wireless sensor networks
Wind speed
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater acoustic communication
underwater acoustic channel characteristics
underwater
telecommunication security
spreading factor
Sonar equipment
simulation
Signal to noise ratio
acoustic communication
Scalability
Resiliency
pubcrawl
probability
Metrics
isotropic hydrophones
hydrophones
eavesdropping probability
eavesdropping
Computational modeling
array hydrophones
acoustic signal frequency
biblio
Verifying Attack Graphs through Simulation
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
Metrics
time-consuming process
Temperature sensors
simulation
simulated environment
security of data
security
Resiliency
resilience
pubcrawl
Predictive models
Nuclear Reactor
Analytical models
Inductors
hybrid attack graph
graph theory
Data models
cyber-physical systems
cyber physical system simulation
Cyber Physical System
control systems
composability
attack graphs
attack graph verification
biblio
Web Caching Evaluation from Wikipedia Request Statistics
Submitted by grigby1 on Mon, 03/26/2018 - 12:54pm
Servers
Zipf distributed requests
wireless networks
Wikipedia request statistics
Wikipedia pages
Wikipedia daily top-1000 statistics
Wikipedia caches
Web sites
web caching strategies
Web caching evaluation
Web Caching
statistical analysis
simulation
access time reduction
Scalability
Resiliency
resilience
pubcrawl
Metrics
internet
hit rate
Encyclopedias
Electronic publishing
Conferences
cache storage
biblio
A Multi-Level Security Access Control Framework for Cross-Domain Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
Ubiquitous Computing Security
target domain
simulation
secure interactions
Scalability
Resiliency
pubcrawl
Organizations
network domains
multilevel security protection
multilevel security access control framework
multilevel mapping method
Multi-Level Security
Access Control
mapping method
intradomains
inter-domain mapping
information science
Human Factors
Human behavior
hierarchical access control structures
Data protection
cross-domain networks
cross-domain
Conferences
Computational modeling
authorisation
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
next ›
last »