Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automation
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Evaluation of Hybrid Deep Learning Techniques for Ensuring Security in Networked Control Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:41pm
learning (artificial intelligence)
Training
Support vector machines
security related problems
security of data
Resiliency
resilience
pubcrawl
privacy
NSL-KDD
networked control systems
network security
machine learning
network intrusion detection
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
internet
hybrid deep learning techniques
feature extraction
deep learning
composability
automation plant
automation networks
automation
biblio
Smart Grid Security: Threats and Solutions
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
pubcrawl
vigor
technology
Smart Grids
smart grid security
Smart Grid
security
Scalability
sanction
Resiliency
resilience
Reliability
automatically
nature
Monitoring
monitor
Metrics
Meters
intelligrid
information and communication technology
information
distributed
automation
biblio
An innovative analying method for the scale of distribution system security region
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
Resiliency
transformers connection relationship matrix
Systems operation
Smart Grids
smart grid security
security
Scale
Scalability
Safety
Artificial Neural Networks
resilience
pubcrawl
Power transformer insulation
Metrics
distribution system security region
boundary equation
automation
biblio
SCLCT: Secured cross language cipher technique
Submitted by grigby1 on Wed, 02/21/2018 - 12:44pm
Rails
Metrics
modern era possesses cryptography
open source language
Policy
Policy-Governed Secure Collaboration
privacy
pubcrawl
Rail Fence Cipher
Java
resilience
Resiliency
Scalability
SCLCT Cipher
secret codes
secured cross language cipher technique
security
cryptology
Caesar Cipher
cipher text
Ciphers
CLCT Cipher
collaboration
composability
computing device
Cryptography
automation
data privacy
empowering citizens
encryption
evolving digitization
fascinating science
Human behavior
human factor
biblio
Human interactive machine learning for trust in teams of autonomous robots
Submitted by K_Hooper on Wed, 02/14/2018 - 11:02am
interactive systems
unmanned vehicles
Unmanned Systems
Training
supervisory control
robots
pubcrawl
neuroevolutionary machine-learning techniques
multi-robot systems
mobile robots
ML behavior
machine learning algorithms
machine learning
learning (artificial intelligence)
automation
IML-generated search plans
human-robot interaction
human trust
human interactive machine learning
Human behavior
Human automation interaction
Conferences
Computers
command and control systems
black box algorithms
autonomous team behaviors
autonomous robot teams
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
Keyword-driven security test automation of Customer Edge Switching (CES) architecture
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
pubcrawl
automated test framework
automation
CES protocol designers
computer architecture
computer network security
customer edge switching architecture
internet
Internet architecture
keyword driven security test automation
keyword-driven testing
multidomain communications
protocol validation
Protocols
testing
Resiliency
Resilient Security Architectures
robot framework
robots
security
security threats
signalling protocols
Software
STRIDE analysis
telecommunication equipment testing
telecommunication traffic
test automation
biblio
DDoS attack isolation using moving target defense
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
Attack proxy
automation
Bandwidth
Computational modeling
computer architecture
Computer crime
Insider assisted DDoS attack
Metrics
moving target defense
MTD
pubcrawl
Resiliency
Servers
Shuffling
biblio
Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
automation
Autonomic Security
behavior analysis
cyber security
Data Analytics
information technology
machine learning
Metrics
network security
pubcrawl
Resiliency
Scalability
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »