Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
system complexity
biblio
Security Aware Spatial Modulation (SA-SM)
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
peak-to-average-power-ratio
forward-error-correction threshold
HN
interchannel interference
Internet-of-Things deployments
MIMO
MIMO communication
MIMO techniques
multiple-input multiple-output techniques
optical transmitters
Peak to average power ratio
degree of technology independent physical layer security
radio range
SA-SM
secure technique
security aware spatial modulation
SM
space division multiplexing
spatial multiplexing
system complexity
visible light range
VLC
error statistics
computer network security
Internet of Things
Receivers
security
Radio frequency
Resiliency
pubcrawl
composability
Metrics
Decoding
IoT
computer network reliability
spectral efficiency
radio receivers
OFDM
forward error correction
adjacent channel interference
arising security concerns
bit-error-rate
communication system capacity
communication system reliability
biblio
Early Hybrid Safety and Security Risk Assessment Based on Interdisciplinary Dependency Models
Submitted by grigby1 on Mon, 02/17/2020 - 4:07pm
security risks
risk analysis
risk management
Safety
safety assessment
security
security assessment
security design weaknesses
security risk assessment
Resiliency
security weaknesses
social reasons
Software
system complexity
system operation
tools
Unified modeling language
complex critical infrastructures
resilience
pubcrawl
policy-based governance
modeling
Model driven engineering
Metrics
interdisciplinary interactions
interdisciplinary dependency models
hybrid safety
Human behavior
fault trees
environmental reasons
economic reasons
Design Process
critical infrastructures
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification