Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
process monitoring
biblio
Automated Deviation Detection for Partially-Observable Human-Intensive Assembly Processes
Submitted by grigby1 on Thu, 02/24/2022 - 11:25am
pubcrawl
process monitoring
Privacy Policies
Monitoring
Metrics
Measurement
Law
Industries
Human-Intensive
Human behavior
Deviation Detection
Correlation
Assembly Processes
uncertainty
Scalability
Regulation
biblio
Generalized Reconstruction-Based Contribution for Multiple Faults Diagnosis with Bayesian Decision
Submitted by aekwall on Mon, 05/18/2020 - 9:48am
belief networks
smearing effect
multiple faults diagnosis
multiple fault diagnosis
Multi-dimensional reconstruction based contribution
industrial process
generalized reconstruction-based contribution
data-driven fault diagnosis method
bayesian decision
process monitoring
fault detection
Covariance matrices
fault diagnosis
Monitoring
numerical simulation
numerical analysis
Human Factors
principal component analysis
Indexes
cyber physical systems
PCA
Metrics
pubcrawl
Resiliency
Bayes methods
biblio
Multiple Fault Diagnosis Methods Based on Multilevel Multi-Granularity PCA
Submitted by aekwall on Mon, 05/18/2020 - 9:47am
multilevel multigranularity PCA
traditional PCA fault diagnosis
Resiliency
pubcrawl
production engineering computing
process monitoring
process fault diagnosis
principal component analysis
multivariate statistical analysis
multiple process variables
multiple fault diagnosis methods
multiple fault diagnosis
Correlation
multi-level
multi-granularity
Metrics
linear correlation
Human Factors
fault diagnosis
fault detection
Data processing
Data models
cyber physical systems
Covariance matrices
biblio
Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems
Submitted by el_wehby on Sun, 05/27/2018 - 9:13pm
optimization
wireless sensor networks
Wireless communication
WDS monitoring
water supply
water distribution systems
simulations
Robot sensing systems
process monitoring
Pipelines
Algorithms
Monitoring
mobile sensors
mobile sensor networks
Mobile communication
leak detection
leak and backflow detection
Image edge detection
backflow detection
1253968
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication
biblio
Ambient Rhythm: Melodic Sonification of Status Information for IoT-enabled Devices
Submitted by K_Hooper on Wed, 09/27/2017 - 12:19pm
Acoustic Atmosphere
acoustic coupling
Human behavior
Interfaces
IoT
process monitoring
pubcrawl
Resiliency
scalabilty
Sonification
biblio
A SCADA Intrusion Detection Framework That Incorporates Process Semantics
Submitted by grigby1 on Fri, 08/18/2017 - 1:25pm
i-o systems security
i/o systems security
Intrusion Detection
io systems security
network intrusion detection
network security
process monitoring
pubcrawl
SCADA Security
Scalability
biblio
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
ExFAT
pubcrawl170109
process monitoring
media mirror
legal effect
lawsuit
Law
judicial identification
hash authentication
Forensics
File systems
file location algorithm
file locating
file character code algorithm
file character code
ExFAT file system
Algorithm design and analysis
evidence recovery
electronic data recovery forensics
electronic data
document fragment reassembly algorithm
document fragment
Distributed Bragg reflectors
digital signatures
digital multisignature
Digital Forensics
destroyed situation
data recovery
Data models
Cryptography
Computer crime
Classification algorithms
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm