Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer simulation
biblio
Study on Hybrid Collaborative Simulation Testing Method Towards CPS
Submitted by grigby1 on Thu, 07/16/2020 - 10:43am
resilience
hybrid P2P based collaborative simulation test framework
Metrics
multipriority task scheduling
Peer-to-peer computing
preemptive time threshold
program testing
pubcrawl
real-time systems
Hybrid P2P
Resiliency
scheduling
simulations
sliding window based clock synchronization
Software
Synchronization
testing
CPS system
Collaborative Simulation
collaborative simulation control strategy
composability
Computational modeling
Computer simulation
Control Strategy
CPS
CPS modeling
Analytical models
dynamic adaptive time advancement
full digital nodes
full physical nodes
groupware
Hardware
hardware in the loop nodes
hybrid collaborative simulation testing method
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
SystemC VP
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
scalable verification
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
Scalability
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Hardware
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
biblio
Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games
Submitted by Katie Dey on Mon, 09/09/2019 - 9:36pm
ACT-R
Algorithm
Articles for Review
C3E 2019
Cognitive Architecture
Cognitive Security
Computer simulation
deception
Instance-based learning
Mind
Cognitive Security
Articles for Review
C3E 2019
biblio
Towards a Design Studio for Collaborative Modeling and Co-Simulations of Mixed Electrical Energy Systems
Submitted by Katie Dey on Sun, 09/30/2018 - 11:23am
Cloud Computing
Co-Simulations
Collaborative Work
Computer simulation
cyber-physical systems
Distributed Simulations
Docker
Experimental Testbed
high-level architecture
model-driven engineering
modeling
power system simulation
smart-grid
Systems Simulation
biblio
On Event Detection and Localization in Acyclic Flow Networks
Submitted by el_wehby on Sun, 05/27/2018 - 9:13pm
Mobile communication
wireless sensor networks
Water pollution
water distribution systems
sensors
optimization
oil-gas distribution systems
national importance
monitoring infrastructure
Monitoring
mobile sensor networks
mobile radio
acyclic flow networks
large-scale distribution systems
immense research interest
Image edge detection
Heuristic algorithms
flow network simulator
event localization
event detection
detect events
Contamination
Computer simulation
1253968
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
security breaches
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
Predictive Metrics
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
General Deterrence Theory
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
accounting
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
biblio
Post-quantum message authentication cryptography based on error-correcting codes
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
error-correcting code based Cryptography
software implementation
Resiliency
Reed-Solomon codes
quantum computing
pubcrawl
post-quantum message authentication cryptography
Post-quantum cryptography
post-quantum code based signature
Metrics
error-correcting codes
composability
error correction codes
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
digital signatures
digital signature algorithm
digital signature
Cryptography
Computers
Computer simulation
file
Lanham_Social_Network_Model_KC.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:52pm
CMU
Computer simulation
information diffusion
social network analysis
Text Mining
biblio
Social Network Modeling and Agent‐Based Simulation in Support of Crisis De‐escalation
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:52pm
CMU
Computer simulation
information diffusion
social network analysis
Text Mining
CMU
« first
‹ previous
1
2