Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital simulation
biblio
Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity
Submitted by grigby1 on Wed, 11/04/2020 - 1:45pm
text-based environment
password usage
Phishing
privacy
pubcrawl
social engineering
student experience
teaching
text analysis
password
user experience
Virtual Learning Environment
Virtual Learning Environments
virtual reality
virtual world
virtual world lessons
VLE
Digital Simulations
Computer crime
computer science education
cyber physical systems
Cybersecurity
cybersecurity attitude
cybersecurity education
cybersecurity knowledge
digital simulation
computer aided instruction
E-Learning
education
Educational institutions
Instruments
invasive software
malware
online scam
biblio
A gateway to easily integrate simulation platforms for co-simulation of cyber-physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
pubcrawl
Java
Large-scale systems
Libraries
Logic gates
Metrics
National Institute of Standards and Technology co-simulation platform
NIST co-simulation platform
Object oriented modeling
interacting physical components
Research Infrastructure
resilience
Resiliency
simulations
Software Architecture
standards
Universal CPS Environment
CPS modeling
high-level architecture standard
high level architecture
functional mock-up interface
distributed simulation
distributed processing
digital simulation
cyber-physical systems
CPS conceptual design
computer architecture
Computational modeling
composability
communication libraries
co-simulation expertise
co-simulation
simulation
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Agent based simulation of a payment system for resilience assessments
Submitted by grigby1 on Mon, 12/03/2018 - 1:52pm
Metrics
Swedish payment system
supply chain risk assessment
Supply Chain
Scalability
Resiliency
resilience assessments
resilience
pubcrawl
Petroleum
payment system
Online banking
multi-agent systems
Agent based modeling
gaming simulation approach
gaming simulation
Games
fuel retailing
food retailing
financial data processing
digital simulation
computer games
computer based role playing game
Computational modeling
Analytical models
agent based simulation
biblio
SuperMan: A Novel System for Storing and Retrieving Scientific-Simulation Provenance for Efficient Job Executions on Computing Clusters
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Metrics
SuperMan
storage management
SimUlation ProvEnance Recycling MANager
simulation
scientific-simulation provenance storage
scientific-simulation provenance retrieval
scientific information systems
scientific computing
Resiliency
Recycling
pubcrawl
Provenance
PROV
open systems
composability
job executions
interoperability
information retrieval
Human Factors
Human behavior
HPC
EDISON
digital simulation
Data models
Conferences
computing clusters
compute-intensive simulations
Computational modeling
Compositionality
biblio
Modeling of countermeasure against self-evolving botnets
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Markov chains
zombie computers
Viruses (medical)
Software
simulation experiments
self-evolving botnets
Resiliency
Radiation detectors
pubcrawl
Metrics
Markov processes
botnets
malicious attackers
machine learning
learning (artificial intelligence)
invasive software
digital simulation
computing resources
Computers
Computational modeling
Compositionality
biblio
Security of software defined networks: Taxonomic modeling, key components and open research area
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
Resiliency
network management
network operators
network specification
networking like routing
open research area
Policy
policy-based governance
program debugging
pubcrawl
low-level device configuration
SDN architectural layers-interfaces
SDN architecture
security solutions
simulation framework
software defined network security
software defined networking
state distribution
taxonomic modeling
thematic taxonomy
cyber-attacks
Artificial Neural Networks
Cloud Watcher
collaboration
Companies
computer architecture
Computer crime
computer network management
computer network security
control systems
artificial neural network
debugging
digital simulation
digital threats
FORTNOX
FRESCO
Governance
Government
Hardware
L-IDs
biblio
Profiling of automobile drivers using car games
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
driving log generation
vehicle data
User profiling
traffic engineering computing
Simulator
pubcrawl170115
Part profiles
keystroke identification
Gears
gaming
Games
Acceleration
driving characteristics
digital simulation
Computers
computer games
Computational modeling
car games
biometrics
behavioral patterns
automobiles
automobile driver profiling