Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170107
biblio
An autonomic approach to extend the business value of a legacy order fulfillment system
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
software applications
Manuals
Monitoring
order fulfillment workflow
pubcrawl170107
retailing industry
self-adaptive systems
self-managing systems
service-oriented architecture
legacy software systems
software engineering
software evolution
software maintenance
Software systems
systems interoperability
systems of systems
third party security screening provider
enterprise resource planning
autonomic behavior
Autonomic computing
autonomic control loop design
autonomic software component
Business
business value
Complexity theory
Databases
autonomic approach
ERP systems
error-prone manual process
human error
human monitoring
hybrid systems
legacy multichannel commerce enterprise resource planning system
legacy order fulfillment system
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model
biblio
Evaluating the complexity and impacts of attacks on cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
estimation theory
time-to-shutdown
Sensor phenomena and characterization
security risks
security of data
security attributes
quantitative security evaluation
pubcrawl170108
pubcrawl170107
process control
probability
modeling
graph theory
actuators
cyber-to-physical attack
cyber-to-cyber attack
cyber-physical systems
cyber-physical system security
cross-domain attack
CPS
consequence estimation process
Computer crime
attack probability
attack graph
attack consequences
biblio
Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
data sharing
set theory
secure data exchange
public network
pubcrawl170107
private key cryptography
private key attribute set
military aircraft
file sharing
encryption
electronic data interchange
data sharing systems
Access Control
Data Security
data encryption
data authentication
CP-ABE
confidentiality feature
ciphertext-policy attribute-based encryption
authentication feature
authentication
asymmetric encryption mechanism
Ad hoc networks
biblio
Fuzzy clustering of incomplete data based on missing attribute interval size
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
interval data set
TICI data set
standards
similar object cluster identification
pubcrawl170107
Prototypes
pattern clustering
nearest neighbor rule
missing attribute interval size
Iris
Interval size
interval median
Algorithm design and analysis
incomplete data clustering
Incomplete Data
fuzzy set theory
fuzzy clustering
fuzzy c-means algorithm
Fuzzy C-Means
data structures
data handling
Clustering algorithms
Breast
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing
biblio
Hardware-assisted code obfuscation for FPGA soft microprocessors
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
many embedded FPGA system
Table lookup
Switches
software security
software confidentiality
Software
Soft microprocessor
security of data
pubcrawl170107
minimal hardware overhead
microprocessor chips
Code Obfuscation
hardware-software codesign
hardware assisted code obfuscation
Hardware
FPGA soft microprocessors
field programmable gate arrays
encryption
encoding
data dependent control flow modification
Complexity theory
biblio
Algorithmic information theory for obfuscation security
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
Code Obfuscation
Complexity theory
encoding
Intellectual Property Protection
Kolmogorov Complexity
Measurement
pubcrawl170107
reverse engineering
security
Software
biblio
Response and reconfiguration of cyber-physical control systems: A survey
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
Games
Sensor Systems
security of data
security mechanism
security
Reliability
Redundancy
pubcrawl170107
isolation mechanism
actuators
game theory
embedded systems
embedded computer
distributed embedded computing
detection mechanism
cyber-physical control system
attack protection
biblio
Resilient cumulant game control for cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
linear Markovian system
Trajectory
security vulnerability
security of data
quadratic cost function optimization
pubcrawl170107
optimisation
Nash game
Nash Equilibrium
Mathematical model
Markov processes
control feedback gain variation
linear hybrid stochastic system
HJB equation
Hamilton-Jacobi-Bellman equation
Games
game theory
full-state feedback
cyber-physical systems
cyber-physical system
cumulant game control resiliency
Cost function
« first
‹ previous
1
2
3
4
next ›
last »