Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
collaboration
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
biblio
"Hiding User Privacy in Location Base Services through Mobile Collaboration"
Submitted by grigby1 on Thu, 02/23/2017 - 11:40am
mobile networks
Web surfing
web services
user privacy
telecommunication security
Smartphones
smart phones
Servers
pubcrawl170105
privacy
Peer-to-peer computing
mobility management (mobile radio)
collaboration
mobile crowd method
Mobile communication
mobile collaboration
location-based services
location privacy
location base services
location aware system
LBS server
GPS
Global Positioning System
file
Bogart_How_to_break_API_CK.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 9:24am
CMU
collaboration
Dependency management
Jan'17
Qualitative research
semantic versioning
Software ecosystems
biblio
How to break an API: cost negotiation and community values in three software ecosystems
Submitted by Jamie Presken on Thu, 12/08/2016 - 9:22am
CMU
collaboration
Dependency management
Jan'17
Qualitative research
semantic versioning
Software ecosystems
CMU
Jan'17
biblio
Towards efficient group management and communication for large-scale mobile applications
Submitted by BrandonB on Wed, 05/06/2015 - 2:14pm
Manganese
vehicles
surveillance
Subscriptions
reliable communication
real-time tracking
Real-time monitoring
public security
node mutual awareness
mobile workforce management
mobile systems
mobile nodes
mobile networks
mobile computing
middleware
collaboration
Logistics
Logic gates
large-scale mobile applications
group management
Group communication
geopositioning
fleet tracking and management system
Emergency Response
distributed middleware
DDS
context-specific group communication
context-defined groups
context-defined group management
biblio
A Factorial Space for a System-Based Detection of Botcloud Activity
Submitted by BrandonB on Wed, 05/06/2015 - 10:30am
factorial space
UDP-flood DDoS attacks
transport protocols
system-based detection
system metrics
source-based detection
principal component analysis
Monitoring
Measurement
malicious use
legitimate usage
legitimate activity
Intrusion Detection
botcloud activity
distributed system behavior analysis
distributed processing
distributed massive attacks
computer network security
Computer crime
collaboration
cloud service provider
Cloud Computing
botnets
botcoud behavior
botcloud detection
biblio
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
energy cyber physical systems
wide-area situational awareness experiment
security of data
power systems
power grids
Power Grid
power engineering computing
Phasor measurement units
fault tolerant computing
Experimentation
collaboration
Energy
Data models
cyber physical systems
cyber physical system security
cyber physical system resiliency
computer security
Communities
collaborative research
biblio
Soft systems methodology in net-centric cyber defence system development
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
modeling
system dynamics model
System Dynamics
system behaviour
SSM
soft systems methodology
sociotechnical systems
situational awareness
security of data
SA
net-centric information system
net-centric hypothesis
net-centric cyber defence system development
net-centric approach
Net-Centric
collaboration
interdependent dynamic relationships
information value
Information systems
information sharing community
information security
information reach
information environment
human activity system
Distributed Information Systems
data sources
complexity
Communities
command and control
collaborative communities
biblio
A framework for characterisation of complex systems and system of systems
Submitted by BrandonB on Mon, 05/04/2015 - 2:43pm
Ontologies
Unified modeling language
Systems engineering and theory
Systems
system-of-systems characterisation
system of systems
Rail transportation
quantitative characterization
programming
Ontology
ontologies (artificial intelligence)
Aggregates
Metrics
Measurement
Indexes
formal development
emergence notion
Complexity theory
complexity
complex systems characterisation
collaboration
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
« first
‹ previous
…
110
111
112
113
114
115
116
117
118
next ›
last »