Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security protection
biblio
Efficiently Constructing Topology of Dynamic Networks
Submitted by grigby1 on Wed, 07/12/2023 - 12:49pm
security
pubcrawl
Metrics
resilience
Resiliency
privacy
Topology
composability
real-time systems
network topology
Satellites
dynamic networks
security protection
Minimization
Dynamic Network
topology construction
biblio
Research on the feasibility technology of Internet of things terminal security monitoring
Submitted by grigby1 on Fri, 07/29/2022 - 9:02am
power grids
power grid vulnerability analysis
Technical requirements
security monitoring model
security analysis algorithmsecurity monitoring
security analysis algorithm
security monitoring
security protection
Systems architecture
Situation Awareness
Cloud Computing
Metrics
real-time systems
Protocols
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Agent-based security protection model of secret-related carrier intelligent management and control
Submitted by grigby1 on Wed, 06/08/2022 - 1:55pm
Robustness
secret carriers
intelligence management and control
hierarchical systems
Agent
intelligent data
Resiliency
security protection
Scalability
security
Compositionality
network security
control systems
Data models
Analytical models
resilience
pubcrawl
biblio
Analysis on the Application of Cryptographic Technology in the Communication Security of Intelligent Networked Vehicles
Submitted by grigby1 on Wed, 06/08/2022 - 1:54pm
Internet of Vehicles
security protection
security
Scalability
Resiliency
resilience
pubcrawl
password technology
Internet of Vehicles (IoV)
Security Policies Analysis
intelligent data
information security
data privacy
data communication
Cryptography
connected vehicles
Compositionality
automation
biblio
Security Protection Technology of Electrical Power System Based on Edge Computing
Submitted by grigby1 on Tue, 03/22/2022 - 1:53pm
edge computing
data privacy protection
access authentication
security protection
smart grid security
power grids
Metrics
Smart Grids
real-time systems
encryption
Smart Grid
data privacy
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust
Submitted by grigby1 on Tue, 12/21/2021 - 3:20pm
Power measurement
zero trust
Web and internet services
Smart Grids
security protection
Scalability
Resiliency
resilience
pubcrawl
power systems
Power Mobile Interconnection
Computing Theory
policy-based governance
Human Factors
Human behavior
dynamic access control
Couplings
Continuous Trust Evaluation
Complexity theory
complex networks
collaboration
trust
biblio
Blockchain Based Big Data Security Protection Scheme
Submitted by aekwall on Tue, 08/17/2021 - 4:10pm
Access Control
authentication
Big Data
blockchain
Cryptography
Heart beat
Human behavior
Kerberos
Metrics
pubcrawl
Resiliency
security protection
Servers
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Network Attack Detection based on Domain Attack Behavior Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
effective market-oriented products
tools
security protection
Scalability
Resiliency
resilience
real-time systems
pubcrawl
normal attack
network security threats
network security
network attack detection method
log file
Forgery
feature extraction
active directory
domain related attack behavior characteristics
domain intrusion detection system
domain control
domain attack detection rules
Databases
computer network security
Computer hacking
Computer crime
Communication networks
common domain intrusion methods
Chained Attacks
Attack detection
APT attack chain
antivirus software
biblio
Client-side Security Assessment and Security Protection Scheme for Smart TV Network
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
Logic gates
Web and internet services
TV network
smart TV
security protection
security assessment
security
resilience
pubcrawl
Metrics
Networked Control Systems Security
intelligent data
debugging
command injection attacks
client-side
Cable TV
Bridges
Predictive Metrics
composability
Resiliency
1
2
next ›
last »