Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computing Theory
biblio
An Efficient Computational Strategy for Cyber-Physical Contingency Analysis in Smart Grids
Submitted by grigby1 on Tue, 09/20/2022 - 2:03pm
pubcrawl
Metrics
real-time systems
Games
Measurement
Power system protection
power transmission lines
Approximation algorithms
Smart Grids
Security Metrics
Transmission line measurements
Computing Theory
Cyber-Physical Contingency Analysis
Cyber-security
Security games
biblio
Game-Theoretic Model for Optimal Cyber-Attack Defensive Decision-Making in Cyber-Physical Power Systems
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
Micromechanical devices
System performance
system integration
Security Metrics
Reinforcement learning
realistic testbed
pubcrawl
proactive security decision
power systems
Nash Equilibrium
game theoretic security
Metrics
Measurement
game theory
CPPS
Computing Theory
Scalability
Predictive Metrics
Human Factors
biblio
On the Impact of the Embedding Process on Network Resilience Quantification
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
critical infrastructure
pubcrawl
Metrics
Topology
network topology
Extraterrestrial measurements
reliability theory
data analysis
scientific computing
Security Metrics
Computing Theory
graph embedding
Computational Topology
network resilience
Wasserstein Distance
WEGL
biblio
Threshold-Based Analysis of the Code Quality of High-Performance Computing Software Packages
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
Clang
codes
Complexity theory
Computing Theory
Conferences
Data mining
datasets
LLVM
Measurement
Metrics
pubcrawl
Security Metrics
software packages
software quality
static analysis
statistical analysis
biblio
A Novel Approach for the Detection of DDoS Attacks in SDN using Information Theory Metric
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
tools
security
pubcrawl
Metrics
internet
Topology
intrusion detection system
Entropy
Measurement
software-defined network
Security Metrics
denial-of-service attack
Computing Theory
DDoS attack detection
information theory metrics
Mininet
biblio
Efficient Parallel Algorithms for Computing Percolation Centrality
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
pubcrawl
Metrics
Conferences
graphics processing units
Transportation
social networking (online)
Gain measurement
Security Metrics
Computing Theory
High performance computing
Silver
biblio
Towards 5G-ready Security Metrics
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
Organizations
pubcrawl
Metrics
Conferences
5G mobile communication
Computational modeling
Industries
Measurement
cloud
Telecommunications
5G
attack graph
Security Metrics
Computing Theory
network function virtualization
biblio
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
computer architecture
Servers
pubcrawl
Metrics
Hardware
Hardware Security
Runtime
Measurement
security risk assessment
statistical analysis
Security Metrics
graph theory
Computing Theory
hardware security metrics
biblio
A Possibilistic Evolutionary Approach to Handle the Uncertainty of Software Metrics Thresholds in Code Smells Detection
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
pubcrawl
Metrics
Measurement
Software algorithms
uncertainty
Sociology
software quality
Security Metrics
software metrics
Computing Theory
codes
Evolutionary algorithm
Code smells detection
possibilistic K-NN
possibility distribution
uncertain metrics' thresholds
biblio
Secure Outsourcing of Fuzzy Linear Regression in Cloud Computing
Submitted by grigby1 on Fri, 08/26/2022 - 11:09am
tools
Cloud Computing
machine learning
security
pubcrawl
Protocols
Metrics
Linear programming
Computing Theory
outsourcing
linear regression
fuzzy linear regression
Secure computing
transformational approach
1
2
3
4
5
6
7
8
9
…
next ›
last »