Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Centrality
biblio
NAMData: A Web-application for the Network Analysis of Microbiome Data
Submitted by aekwall on Fri, 08/12/2022 - 2:57pm
community detection
Zero Treatment
Taxa Filtration
normalization
Network Visualization
Network analyzers
network analysis
Microbiome Data
Metagenomics
feature extraction
Centrality
Compositionality
pubcrawl
Correlation
programming
Pipelines
Data visualization
Knowledge engineering
biblio
A Complex Network Approach to Power System Vulnerability Analysis based on Rebalance Based Flow Centrality
Submitted by grigby1 on Fri, 07/29/2022 - 8:03am
complex networks
power grid vulnerability analysis
power system vulnerability analysis
graph/network theory
network flow
power systems
Centrality
Power measurement
Metrics
adaptive systems
encoding
Planning
Scalability
Safety
Resiliency
resilience
pubcrawl
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
Placement optimization of IoT security solutions for edge computing based on graph theory
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
Internet of Things
Security Metrics
security functions
security as a service
pubcrawl
placement optimization
Metrics
IoT security solutions
IoT security framework
IoT network
IoT
Centrality
graph theory
EndToEnd like encryption
edge computing security
edge computing
dominating set
Cryptography
Computing Theory
computer network security
centrality metrics
biblio
Significance Analysis for Edges in a Graph by Means of Leveling Variables on Nodes
Submitted by grigby1 on Fri, 09/15/2017 - 10:03am
Centrality
graph theory
Human behavior
Malware Analysis
Metrics
network analysis
privacy
pubcrawl
Resiliency