Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Calculus
biblio
Adopting Stochastic Network Calculus as Mathematical Theory for Performance Analysis of Underwater Wireless Communication Networks
Submitted by grigby1 on Thu, 10/20/2022 - 3:49pm
Resiliency
UWCN
stochastic service curve (SSC)
Stochastic network calculus (SNC)
Stochastic arrival curve (SAC)
minplus
maxplus
mathematical models
underwater communication
pubcrawl
Stochastic Computing Security
Transforms
Calculus
Wireless communication
Stochastic processes
Analytical models
resilience
biblio
On a Deterministic Approach to Solving Industrial Control System Problems
Submitted by grigby1 on Tue, 03/30/2021 - 12:05pm
Human Factors
signal transmission
security
queuing theory
queueing theory
Queueing analysis
pubcrawl
production engineering computing
network performance measures
Network calculus
Mathematical model
Local area networks
Industrial Control Systems
industrial control
automation
Human behavior
digital control system problems
deterministic queuing systems network calculus
delays
delay
database updating
Cybersecurity
critical infrastructures
Control System
control engineering computing
Calculus
backlog
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
Research on Iris Edge Detection Technology based on Daugman Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 1:03pm
Hough algorithm
security
Scalability
Resiliency
pubcrawl
personal privacy
Metrics
Iris recognition
iris edge detection technology
Image edge detection
identity technology
Identity Security
biometrics (access control)
highly confidential privacy
frequency-domain analysis
Fingerprint recognition
face recognition
edge detection
daugman algorithm
data privacy
current society
convolution
composability
Calculus
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
mechanized method
traditional trust assumptions
tools
security violation
security protocols
security protocol design
security property
pubcrawl
Protocols
protocol-agnostic definition
protocol verification
privacy
policy-based governance
Policy Based Governance
accountability
formal verification
formal methods and verification
Cryptography
Cryptographic Protocols
computer security
Compositionality
composability
collaboration
cognition
certificate transparency
Calculus
accountable algorithms protocol
accountability automated verification
biblio
Information Flow Control for Distributed Trusted Execution Environments
Submitted by aekwall on Mon, 01/20/2020 - 11:45am
encryption
untrusted host
Trusted Computing
TEE
Resiliency
pubcrawl
Protocols
Predictive Metrics
messages authentication
Libraries
information-flow-control
Information Flow Control
high-level abstractions
high-integrity messages
Fabrics
encryption audits
-distributed-systems
distributed trusted execution environments
distributed programming
DFLATE
data integrity
Cryptography
cryptographic mechanisms
core security calculus
confidential messages
Compositionality
Calculus
-trusted-execution-environment
-security
-language-based-security
-enclaves
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
Modeling Network Medium Access Protocols for Network Quality of Service Analysis
Submitted by Katie Dey on Thu, 11/12/2015 - 1:58pm
Resilient Systems
Science of Security
Foundations
network time-varying performance
Access
analysis
Analytical models
Bandwidth
Calculus
Data models
delays
design-time analysis
distributed real-time embedded system verification
embedded systems
foundations
Medium
Network
network medium channel access protocol
network quality of service analysis
verification
protocol
Protocols
QoS
quality
quality of service
Resilient Monitoring and Control
Resilient Systems
Satellites
Science of Security
Service
SURE Project
TDMA
time division multiple access
time-varying channels