Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
System performance
biblio
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
static analysis
Locky
program diagnostics
pubcrawl
Ransomware
ransomware pandemic prevention
SDHASH
Semantics
Similarity Preserving
SSDEEP
invasive software
Syntactics
System performance
Triaging
triaging performance
triaging ransomware
WannaCry
WannaCryptor
YARA rules
CryptoWall
Resiliency
Metrics
Fuzzy Cryptography
Cer-ber
Cerber
composability
Context-Triggered Piecewise Hashing
Cryptography
Scalability
cyberthreat hunting
data privacy
dynamic analysis
Engines
file organisation
Fuzzy Hashing
IM-PHASH
Import Hashing
biblio
Security and Trust Issues on Digital Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
pubcrawl
Trusted Computing
trust problems
trust issues
Traceability
System performance
supply chains
supply chain security
supply chain management
security of data
security management
security
Scalability
Resiliency
resilience
Reliability
advanced information technologies
Pervasive Computing Security
Internet of Things
information technology
information science
Human behavior
History
exploratory investigation
digital supply chain system
digital supply chain management system
digital supply chain
composability
Cloud Computing
blockchain
Automated Response Actions
biblio
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
single LRU cache
Nickel
optimal distributed LRU caching
Organizations
probability
reliability theory
reliable caches
resilience
Resiliency
resource management
Scalability
separate LRU caches
single-hop multicache distributed system
Mobile Edge Computing
storage management
symmetric channels
system design
System performance
total cache space
total memory space
unreliable channels
unreliable LRU caches
Web Caching
wired Web servers
wireless content delivery networks
data items
asymptotic miss probabilities
asymptotic miss probability
cache miss ratios
cache storage
channel unreliability probabilities
Communication Systems
counterintuitive characteristics
counterintuitive insights
critical method
data centers
Data-Intensive Applications
asymmetric cache organization
data placement
data replication schemes
data routing strategies
efficient cache organization
efficient data access
explicit unequal allocation policy
fast data access
fundamental method
Hash functions
LRU caching systems
Metrics
biblio
IoT Security Model and Performance Evaluation: A Blockchain Approach
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
model construction
Throughput
theoretical data support
System performance
security risks
security problems
security of data
security model
Resiliency
resilience
Public key
pubcrawl
Predictive Metrics
performance evaluation
Packaging
blockchain
Metrics
IoT security model
InterPlanetary File System
Internet of Things
distributed large capacity storage
cyber-physical systems
cyber-physical system
Cryptography
concurrency (computers)
Concurrency
composability
blockchain-based security model
blockchain technology
biblio
Constraining Attacker Capabilities Through Actuator Saturation
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
LTI control systems
vehicles platoon
tools
System performance
security
road vehicles
Resiliency
reachable sets
reachability analysis
pubcrawl
physical limits
outer ellipsoidal bounds
optimization
Metrics
mathematical tools
actuator saturation
Linear systems
linear matrix inequalities
Human behavior
Engines
Ellipsoids
dangerous states
control system synthesis
computer simulations
composability
attacker capabilities
artificial limits
actuators
actuator security
biblio
The price of anarchy in transportation networks by estimating user cost functions from actual traffic data
Submitted by el_wehby on Tue, 05/15/2018 - 7:41pm
Cost function
Indexes
optimization
price of anarchy
Roads
smart cities
System performance
Transportation Networks
variational inequalities
vehicles
1645681
biblio
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
stochastic incomplete feedback
nearest neighbor
real-time control
root mean square error
spatial correlation
spatial data recovery scheme
Spatial databases
stochastic data
stochastic feedback data
measurement uncertainty
Stochastic processes
stochastic traffic patterns
System performance
temporal correlation
temporal data recovery scheme
temporal model identification
time-critical traffic patterns
efficient temporal and spatial data recovery
Computational modeling
Correlation
CPS
cyber-physical system
cyber-physical systems
data handling
Data models
data recovery scheme
auto regressive integrated moving average
ETSDR scheme
feedback loss
incomplete feedback data
integral of absolute error
Mathematical model
mean absolute error
mean square error methods
biblio
Recovery-based resilient latency-insensitive systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
logic circuits
Throughput
System performance
synchronous circuits
Synchronization
stalling signal
RLIS
Relays
recovery-based resilient latency-insensitive systems
queue sizing problem
clock cycle time
interconnect delay
Integrated circuit interconnections
improved queues
global stalling mechanism
expensive timing cost
error-recovery
error impact
Degradation
Clocks
« first
‹ previous
1
2
3
4
5
6