Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automation
biblio
A Review on Internet of Things Based Door Security
Submitted by grigby1 on Fri, 07/29/2022 - 9:43am
blockchain
pattern locks
webcamera
solenoid lock
FFT
Bluetooth sensor
Arduino
automation
Employment
IoT
Data Security
tools
Fingerprint recognition
home automation
Scalability
security
Hardware
Resiliency
resilience
Human behavior
pubcrawl
biblio
Vulnerability Assessment and Attack Simulation of Power IoT Based on the Attractiveness of Equipment Assets
Submitted by grigby1 on Fri, 07/29/2022 - 9:02am
tools
pubcrawl
resilience
Resiliency
Conferences
Software
Hardware
Scalability
Metrics
information management
vulnerability assessment
automation
power systems
power IoT
attack simulation
power grid vulnerability analysis
biblio
Hunting Dependencies: Using Bow-Tie for Combined Analysis of Power and Cyber Security
Submitted by grigby1 on Tue, 07/12/2022 - 3:36pm
cyber-physical systems
Cyber Dependencies
Interdependencies
risk analysis
Focusing
power systems
automation
Compositionality
Metrics
pubcrawl
Smart Grids
composability
Smart Grid
Computer crime
Scalability
Resiliency
resilience
Human behavior
biblio
Self-organizing Software Defined Mesh Networks to Counter Failures and Attacks
Submitted by aekwall on Fri, 07/01/2022 - 9:45am
Mesh networks
Chained Attacks
Self-MIDAS
sFlow-RT
sFlow Collector
sFlow Agent
Policy Based Flow Management (PBFM)
flow tables
DDoS Attacks
Attack Detection and Mitigation
SDN
network architecture
automation
denial-of-service attack
telecommunication traffic
Manuals
Redundancy
Resiliency
Scalability
pubcrawl
biblio
Methods and Algorithms for Generating a Storage Key Based on Biometric Parameters
Submitted by grigby1 on Tue, 06/14/2022 - 3:15pm
neural network
Radon transform
bio key
biometrics
biometrics (access control)
Algorithm
Transforms
biometric encryption
automation
information security
Software algorithms
Metrics
Reed-Solomon codes
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Mathematical and Algorithmic Prevention of Biometric Data Leaks
Submitted by grigby1 on Tue, 06/14/2022 - 3:12pm
Identification
industrial plants
automation
biometric authentication
biometrics (access control)
biometric encryption
Random access memory
data storage
Metrics
encryption
Object recognition
authentication
Scalability
Resiliency
resilience
pubcrawl
information security
biblio
Towards Assisted Autonomy for Supply Chain Compliance Management
Submitted by grigby1 on Fri, 06/10/2022 - 1:48pm
supply chain security
automation
blockchain
compliance management
human in the loop
machine learning
Manuals
pubcrawl
Regulation
Regulators
Scalability
smart contracts
Supply Chain
supply chains
Transportation
biblio
Effects of trust in human-automation shared control: A human-in-the-loop driving simulation study
Submitted by grigby1 on Thu, 06/09/2022 - 2:57pm
Monitoring
pubcrawl
Human behavior
Conferences
Correlation
Safety
automation
human trust
Man-machine systems
calibration
biblio
Information Security Risk Assessment of Industrial Control System Based on Hybrid Genetic Algorithms
Submitted by aekwall on Thu, 06/09/2022 - 11:38am
information security
pubcrawl
Scalability
Resiliency
Industrial Control Systems
control systems
automation
industrial control
mechatronics
evidence theory
Hierarchy
hybrid genetic algorithm
industrial control system
measurement uncertainty
security risk assessment
scalable systems
biblio
Analysis on the Application of Cryptographic Technology in the Communication Security of Intelligent Networked Vehicles
Submitted by grigby1 on Wed, 06/08/2022 - 1:54pm
Internet of Vehicles
security protection
security
Scalability
Resiliency
resilience
pubcrawl
password technology
Internet of Vehicles (IoV)
Security Policies Analysis
intelligent data
information security
data privacy
data communication
Cryptography
connected vehicles
Compositionality
automation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »