Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security threat
biblio
A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 12:36pm
Measurement
statistical analysis
statistic metrics
state of charge
stability
security of data
pubcrawl
power engineering computing
NeuralWare software
neural network SOC prediction
neural network
neural nets
metrics testing
Metrics
air pollution control
greenhouse gas emission policies
EV BMS cyber security
EV batterys state of charge
Electric Vehicles
electric vehicle market
electric vehicle
cyber security threat
cyber security
BP NN
battery testing
battery testers
Backpropagation
back propagation neural network training
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 1:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets
Submitted by BrandonB on Wed, 05/06/2015 - 9:11am
internet
Topology
Sybil placement strategy statistical assessment
Stochastic processes
Stochastic Process
statistical analysis
Routing
peer-to-peer distributed hash tables
Peer-to-peer computing
packet level network simulation
network topology
invasive software
botnet command and control solution
interdefender coordination
diffused random graph
DHT-structured peer-to-peer botnets
DHT-structured P2P botnets
cyber security threat
Computers
computer network security
Computational modeling
compromised computer on-demand collections
command and control systems
C&C solutions