Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
networks
biblio
Cryptographic Data Security for IoT Healthcare in 5G and Beyond Networks
Submitted by grigby1 on Tue, 02/28/2023 - 4:50pm
IoT security
end-to-end
Costs
networks
Healthcare
5G
encryption
edge computing
decryption
composability
Prototypes
Cybersecurity
Internet of Things
Medical services
5G mobile communication
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
privacy
biblio
On the Performance and Scalability of Simulators for Improving Security and Safety of Smart Cities
Submitted by aekwall on Fri, 01/13/2023 - 3:05pm
security
Software
wireless sensor networks
Protocols
Scalability
pubcrawl
Compositionality
wireless networks
Performance analysis
networks
smart cities
Media Access Protocol
simulators
Smart City
security scalability
biblio
Congestion Aware Intent-Based Routing using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks
Submitted by grigby1 on Fri, 08/26/2022 - 9:50am
Compositionality
congestion
Communications
Spatial diversity
networks
heterogeneous networks
Computing Theory
spread spectrum communication
graph neural networks
prediction
machine learning
quality of experience
network topology
quality of service
Routing
composability
Resiliency
resilience
pubcrawl
Artificial Intelligence
biblio
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay
Submitted by grigby1 on Thu, 06/09/2022 - 1:29pm
Redundancy
Spines Overlay
networks
Interledger
ILP
Geography
intrusion tolerance
overlay networks
distributed ledger
Performance
pubcrawl
blockchain
Fault tolerant systems
fault tolerance
network security
Protocols
Resiliency
resilience
Human Factors
biblio
Accuracy and Generalization of Deep Learning Applied to Large Scale Attacks
Submitted by aekwall on Mon, 01/10/2022 - 11:53am
Neural networks
Computational modeling
deep learning
machine learning
Conferences
pubcrawl
Scalability
Resiliency
Human behavior
telecommunication traffic
denial-of-service attack
Attack detection
correlation coefficient
Flow analysis
networks
Attack vectors
biblio
Services for Zero Trust Architectures - A Research Roadmap
Submitted by grigby1 on Tue, 12/21/2021 - 2:22pm
Access Control
collaboration
Conferences
Design methodology
Human behavior
Human Factors
networks
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
security
service-oriented architecture
zero trust
biblio
Manufacturing and Production Sector
Submitted by willirn1 on Tue, 10/26/2021 - 3:09pm
manufacturing
Production
cyber threats
supply chains
C3E
physical threats
malicious human action
ransomware attacks
software supply chain
Industrial Control Systems
networks
biblio
Artificial Neural Networks for detecting Intrusions: A survey
Submitted by aekwall on Thu, 05/13/2021 - 10:32am
intrusion detection system
feature extraction
Resiliency
pubcrawl
policy-based governance
Metrics
Neurons
Training
Artificial Neural Networks
Biological neural networks
convolution
Recurrent neural networks
attacks.
networks
cyber physical systems
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 10:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
file
Accurate and Efficient Collective Additive Manufacturing by Mobile Robots
Submitted by Anonymous on Thu, 01/09/2020 - 5:10pm. Contributors:
Chen Feng
Maurizio Porfiri
Ludovic Righetti
mobile robots
networks
3D printing
Posters
1932187
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
1
2
3
4
next ›
last »