Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
complex systems
biblio
Threat Extraction in IoT-Based Systems Focusing on Smart Cities
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
smart cities
waste management
threat root causes
threat instances
threat extraction
smart city scenario
IoT-based system
IoT-based services
e-health system
distinct threat types
car parking
Smart City
complex systems
Privacy Threats
security
cryptology
medical information systems
Security analysis
threat extraction method
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Internet of Things
Scalability
computer network security
Threat Modeling
biblio
On the Impact of Generative Policies on Security Metrics
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
Security Metrics
security policies generation
policy basedsecurity management
generative policy based system
administrative overhead
Manuals
complex systems
security policies
security management
computer network security
Measurement
computer security
Grammar
policy-based governance
pubcrawl
computer network management
Access Control
authorisation
biblio
Energy Efficient Algorithm for Multihop BLE Networks on Resource-Constrained Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
energy efficient tree algorithm
ultralow energy consumption
tree network
telecommunication power management
telecommunication network reliability
resource-constrained devices
Resiliency
pubcrawl
Protocols
network lifetime
multihop routing
multihop BLE networks
IoT
fast growing protocol
expandability
BLE
Energy Efficiency
energy dissipation
energy consumption profile
energy conservation
constrained-resource nodes
composability
complex systems
Bluetooth low energy networks
bluetooth low energy
Bluetooth
BLE static constrained-resources networks
BLE mesh
BLE expandability problem
biblio
Deductive Verification of Distributed Protocols in First-Order Logic
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
infinite-state systems
verification problem
validity checking
Tutorials
tools
Theorem Proving
SMT solvers
Safety
pubcrawl
Protocols
protocol verification
program verification
privacy
policy-based governance
long standing research goal
logical verification conditions
automated provers
formal verification
Formal Specification
formal logic
first-order logic
distributed systems
distributed protocols
design automation
deductive verification approach
Computer languages
Compositionality
composability
complex systems
collaboration
cognition
automated theorem provers
biblio
The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
Risk-Metric
national CERT
original TTC
practical cyber security risk estimation
pubcrawl
resilience
Resiliency
risk management
Risk-Estimation
Metrics
Scalability
security of data
Security Risk Estimation
Security-Metric
Threat Landscape
time-to-compromise metric
vulnerability database
β-distribution
estimation
complex systems
Complexity theory
computer science
continuous attacker skill
CVSS vectors
cyber threat intelligence
Cyber-security
cybersecurity metrics
complex system modeling
Human behavior
Human Factors
individual systems
IT-security
Large-scale systems
mathematical shortcomings
Measurement
methodological shortcomings
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
biblio
The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
methodological shortcomings
β-distribution
vulnerability database
time-to-compromise metric
Threat Landscape
Security-Metric
security of data
Security Metrics
Risk-Metric
Risk-Estimation
risk management
pubcrawl
practical cyber security risk estimation
original TTC
national CERT
Metrics
complex system modeling
Measurement
mathematical shortcomings
Large-scale systems
IT-security
individual systems
estimation
cybersecurity metrics
Cyber-security
cyber threat intelligence
CVSS vectors
continuous attacker skill
computer science
Complexity theory
complex systems
file
Supercomputer Fast Interactive Simulations of Complex Cardiac Dynamics in Tissue on Personal Computers and Phones
Submitted by Flavio Fenton on Tue, 01/22/2019 - 8:02pm. Contributors:
Abouzar Kaboudian
Elizabeth Cherry
Flavio H. Fenton
real time simulations
complex systems
Posters (Sessions 8 & 11)
1446675
CPS-PI Meeting 2018
2018
Poster
biblio
Cyber Defense As a Complex Adaptive System: A Model-based Approach to Strategic Policy Design
Submitted by grigby1 on Fri, 09/28/2018 - 4:05pm
Cybersecurity
cyber security
resilience
pubcrawl
Resiliency
Human behavior
Policy
policy-based governance
complex adaptive systems
complex systems
complex systems engineering
cyber defense
enterprise systems engineering
strategy
whitelisting
E-Government
biblio
Ranking Causal Anomalies by Modeling Local Propagations on Networked Systems
Submitted by grigby1 on Thu, 02/15/2018 - 11:47am
matrix factorization
Time series analysis
system failure status
single fault propagation
security of data
Resiliency
resilience
pubcrawl
Probabilistic logic
probabilistic clustering
pattern clustering
networked systems
multiple fault diagnosis
Monitoring
Metrics
causal anomaly detection
low-rank network diffusion model
large-scale complex systems
invariant network
Indexes
Human Factors
human factor
Human behavior
global fault propagation
fault diagnosis
debugging
complex systems
complex system behaviors
Clustering algorithms
« first
‹ previous
1
2
3
next ›
last »