Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security scalability
biblio
Probability Distribution Model to Analyze the Trade-off between Scalability and Security of Sharding-Based Blockchain Networks
Submitted by grigby1 on Mon, 04/18/2022 - 11:36am
Analytical models
blockchain
decentralization
Failure Probability
Probability distribution
Protocols
pubcrawl
Scalability
scalability trilemma
security
security scalability
Throughput
transaction processing probability
biblio
A Security Scoring Framework to Quantify Security in Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
industrial cyber-physical systems
threat analysis
Security Scoring
security scalability
Security Rating
Security Metrics
security metric
pubcrawl
Metrics
security weaknesses
Data models
cyber-physical systems
critical infrastructure
connected vehicles
Conferences
automation
Adaptation models
biblio
Artificial Immune Technology Architecture for Electric Power Equipment Embedded System
Submitted by aekwall on Fri, 04/01/2022 - 2:06pm
information security
Trusted Computing
Systematics
surveillance
security strategy
security scalability
Scientific Computing Security
Scalability
pubcrawl
Predictive Metrics
embedded systems
Homeostasis
Embedded system information security
electric power equipment
computer architecture
Compositionality
artificial immune technology(AIT)
Metrics
composability
Resiliency
biblio
Security Analysis of Smart Home Systems Applying Attack Graph
Submitted by aekwall on Mon, 01/10/2022 - 12:50pm
pubcrawl
visualization
tools
Software
Smart homes
smart Home Systems
security scalability
security
Resiliency
security weaknesses
privacy
Predictive Metrics
Market research
Layout
composability
building management system
Building automation system
attack graphs
biblio
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Submitted by grigby1 on Tue, 12/15/2020 - 1:25pm
blockchain designs
trust-corrupting
truly scalable system
system throughput
sharding proposals
security scalability
PolyShard
polynomially coded sharding
performance scalability
node subsets
linearly scaling efficiency
information-theoretic upper bounds
decentralization scalability
coded storage protocol
coded sharding
Cryptography
coding theory
blockchain system
storage efficiency
information theory
linear codes
Compositionality
polynomials
Protocols
security
Resiliency
resilience
Metrics
pubcrawl
security of data
biblio
Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
scalable infrastructures
machine learning
modelling security data
Monitoring
Probes
pubcrawl
Scalability
scalable data collection infrastructure
scalable end-to-end collection
leverage machine learning
Scalable Security
security
security analytics
security data collection systems
security data modelling
security scalability
towards end-to-rnd security
deep learning techniques
complex IoT deployments
Compositionality
computer architecture
computer network security
configurable data collection infrastructure
configurable end-to-end collection
Data collection
data-driven IoT security
collecting processing security-related datasets
effective security analytics algorithms
Internet of Things
IoT platforms
IoT security
IoT security data
IoT systems
learning (artificial intelligence)
biblio
Scalability Evaluation of Aspen Tree and Fat Tree Using NS3
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
Aspen Tree
Compositionality
DCN
fat tree
fault tolerance
pubcrawl
Scalability
security scalability
biblio
IoT Devices Security Using RF Fingerprinting
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
software defined radio
Radio frequency
Radio Frequency Fingerprinting
RF Fingerprinting
Scalability
scalability problems
SDR
security
security scalability
smart devices
pubcrawl
software radio
telecommunication security
Telecommunication standards
universal SDR-based inexpensive implementation
user-dedicated modes
Wireless communication
wireless RFF
wireless security authentication
feature extraction
authentication problem
Compositionality
computational complexity
computer network security
Cryptographic Protocols
cryptography-based authentication protocols
device identity fingerprint
emitted wireless signals
authentication
Fingerprint recognition
Internet of Things
Internet of Things devices industry
IoT
IoT devices security
mobile phone signal burst extraction
Object recognition
physical layer-based security authentication method
biblio
Performance, Reliability and Scalability for IoT
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
machine learning
telecommunication network reliability
software platforms
security scalability
Scalability
robotics
risks evaluation
Reliability and Scalability
QoS for IoT
pubcrawl
Performance
5G
IoT-solutions
IoT support
Internet of Things
Industry 4.0
cooperative intrusion detection
computer network security
Compositionality
Cloud and Fog
Big Data Analytics
Big Data
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »