Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control systems
biblio
Towards data assurance and resilience in IoT using blockchain
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
drones
Servers
security scalability
secure communication
Scalability
resilience
Reliability
pubcrawl
integrity
auditing
Drone
Distributed databases
Date Assurance
control systems
computer architecture
blockchain security
blockchain
biblio
Accountability in cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human Factors
Watermarking
security of data
Science of Security
Scalability
Robustness
responsibility-assignment
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Kullback-Liebler divergence
Attack detection
Human behavior
cyber-physical systems
cyber-physical system
CPS accountability
corrective measures
control systems
Conferences
composability
collaboration
causal information flow analysis
Casting
biblio
Integration of wireless sensor network and Web of Things: Security perspective
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
Logic gates
sensor security
WSN integration
WoT security issue
Web of Things
smart thing
Sensor
security perspective
Security Challenge
Internet of Things vision
WSN
security threats
control systems
wireless sensor networks
Wireless Sensor Network
security
Wireless communication
computer network security
Computer crime
data privacy
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
Security in software-defined wireless sensor networks: Threats, challenges and potential solutions
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
control systems
sensor security
WSN
water resources
tools
software-defined wireless sensor network
software-defined networking approach
security threats
SDWSN security
SDWSN
SDN paradigms
SD-WSN
real-time systems
Internet of Things paradigm
IoT
authorization
wireless sensor networks
computer network security
composability
SDN
Human Factors
software defined networking
Human behavior
Resiliency
pubcrawl
security
Metrics
biblio
Design Framework for Reliable Multiple Autonomic Loops in Smart Environments
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
middleware
transactional middleware LINC
transactional execution mechanism
Switches
Smart Environments
sensors
self-adjusting systems
Scalability
Resiliency
reliable self-adaptive systems
reliable multiple autonomic loops
Reliability engineering
Reliability
reactive language Heptagon/BZR
pubcrawl
Multiple loops
abstraction framework PUTUTU
Metrics
Mathematical model
loops composition
loops adaptation
control systems
control engineering computing
building management systems
Building automation
Autonomic Security
automata-based controller
automata theory
adaptive systems
actuators
Abstraction Layer
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
biblio
Security of software defined networks: Taxonomic modeling, key components and open research area
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
Resiliency
network management
network operators
network specification
networking like routing
open research area
Policy
policy-based governance
program debugging
pubcrawl
low-level device configuration
SDN architectural layers-interfaces
SDN architecture
security solutions
simulation framework
software defined network security
software defined networking
state distribution
taxonomic modeling
thematic taxonomy
cyber-attacks
Artificial Neural Networks
Cloud Watcher
collaboration
Companies
computer architecture
Computer crime
computer network management
computer network security
control systems
artificial neural network
debugging
digital simulation
digital threats
FORTNOX
FRESCO
Governance
Government
Hardware
L-IDs
biblio
Security is About Control: Insights from Cybernetics
Submitted by grigby1 on Mon, 06/05/2017 - 12:33pm
artificial intelligence security
composability
computer security
control systems
Control Theory
cybernetics
Human behavior
Metrics
pubcrawl
Resiliency
security
biblio
Managing NFV using SDN and control theory
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
clean slate
collaboration
computer architecture
control systems
Control Theory
Human behavior
Intrusion Detection
Load management
Metrics
Monitoring
pubcrawl
Resiliency
Round robin
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 12:32pm
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »