Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control systems
biblio
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Protocols
virtual security function
software defined security service
Software
security protocol
security policies
security
SDN
pubcrawl
Network Security Architecture
Predictive models
policy-based governance
NFV
Monitoring
control systems
Cloud Security
Cloud Computing
biblio
Construction of Audit Internal Control System Based on Online Big Data Mining and Decentralized Model
Submitted by aekwall on Tue, 04/27/2021 - 1:29pm
Scalability
Big Data
security
Task Analysis
Data models
Resiliency
Human behavior
pubcrawl
Data mining
control systems
Information systems
Security Audits
data stream
decentralized model
Internal Control
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
anonymous system timing analysis
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
information-theoretic security
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
Communication system security
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
security of data
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
biblio
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theoretic security
stealthy estimation attack
Signaling Game with Evidence
physical system
online digital model
intelligent attackers
estimation theory
digital twin
Data-Integrity Attack
clandestine attack strategies
Chi-square detector
CPSS
defense strategies
Covariance matrices
game-theoretic approach
security of data
state estimation
Predictive Metrics
estimation
Human Factors
Games
control systems
pubcrawl
Resiliency
cyber-physical systems
game theory
Scalability
Monitoring
Detectors
biblio
Biometric Authentication for Safety Lockers Using Cardiac Vectors
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
Human behavior
security
Scalability
Safety
Resiliency
resilience
pubcrawl
Metrics
Manuals
Identification
authentication
feature extraction
Electrocardiography
ECG
Digital Lockers
control systems
BIOS
biometrics (access control)
Bio-metrics
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:42pm
Linguistics
Wireless Mesh Network Security
self-organized technology
self-configured technology
safe traffic adaptation model
safe traffic adaptation
queue length
performance efficiency
network traffic load
fuzzy framework
future queue state
explicit rate messages
queueing theory
Monitoring
wireless mesh networks
delays
control systems
fuzzy set theory
Fuzzy logic
internet
Metrics
composability
pubcrawl
Resiliency
real-time systems
telecommunication traffic
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
Cloud Computing
Computer crime
control systems
denial-of-service attack
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Servers
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
Submitted by grigby1 on Tue, 02/16/2021 - 1:40pm
documentation
Damage Assessment
smart buildings
smart building stakeholders
smart building risk assessment methodology
smart building risk assessment case study
inter-networked control systems
cost effective risk management
comprehensive risk assessment process
Stakeholders
cyber-physical systems
building management systems
Internet of Things
risk analysis
Buildings
control systems
control engineering computing
Resiliency
resilience
pubcrawl
Monitoring
security
risk management
security of data
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »