Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
Using Statistical Methods and Co-Simulation to Evaluate ADS-Equipped Vehicle Trustworthiness
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
safety metrics
NIST
NIST framework
OpenModelica
policy-based governance
pubcrawl
resilience
Resiliency
Ricardo IGNITE
Safety
multiple simulation platforms
security of data
sensors
simulated operational domain design
system reliability
tools
UCEF
vehicle dynamics simulators
virtual analysis functions
virtual reality
cyber-physical systems
composability
Acceleration
ADS-equipped vehicle trustworthiness
ADS-equipped vehicles
application program interfaces
automated driving system-equipped vehicles
co-simulation
complex cyber-physical systems
Computational modeling
trustworthiness
driver information systems
FMI
fractional factorial design
functional mock-up interface
internet
Measurement
middleware
middleware security
biblio
Addressing Verification and Validation Challenges in Future Cyber-Physical Systems
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
policy-based governance
verification
validation techniques
Validation challenges
validation
V&V process
traditional verification
strategic perspective
security of data
Resiliency
resilience
pubcrawl
composability
physical parts
nontraditional middleware
nonexplainable software outputs
middleware security
middleware
H2020 ADVANCE project
future cyber-physical systems
formal verification
cyber-physical systems
computation parts
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
biblio
A Vulnerability Assessment Method of Cyber Physical Power System Considering Power-Grid Infrastructures Failure
Submitted by grigby1 on Fri, 04/24/2020 - 4:37pm
failure analysis
Power Grid Vulnerability Assessment
vulnerability assessment method
vulnerability assessment
single component function failure
power-grid infrastructures failure
power system reliability
power system faults
Power Grid Network
power components
multiple components synchronization function failure
local CPPS model
information components
functional characteristics
full probability evaluation formula
cyber-physical systems
cyber-physical power system
cyber physical power system
CPPS operation
cooperative attack
communication components
Bayesian network
probability
Metrics
power grids
composability
security
Resiliency
resilience
pubcrawl
biblio
Modeling Cloud Based Cyber Physical Systems Based on AADL
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
modeling languages
wireless sensor networks
vehicle
Unified modeling language
UML
Software Architecture
Software
security of data
Resiliency
resilience
quality of service
QoS
pubcrawl
object-oriented methods
object oriented security
Object oriented modeling
AADL
modeling
Metrics
Intelligent Transportation Systems
distributed sensors
distributed sensor networks
Data models
cyber-physical systems
CPS
Computational modeling
composability
cloud-based cyber-physical systems
cloud platforms
Cloud Computing
cloud
biblio
Modeling and Analysis of CPS Availability Based on the Object-oriented Timed Petri Nets
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented
simulations
security-critical applications
Resiliency
resilience
Reliability
pubcrawl
Petri nets
Petri Net
object-oriented timed Petri net
object-oriented system
object-oriented methods
Availability analysis
object oriented security
Metrics
mathematical analysis method
mathematical analysis
cyber-physical systems
CPS modeling
CPS availability analysis
CPS architecture model
CPS
composability
biblio
Improving Privacy in Graphs Through Node Addition
Submitted by aekwall on Mon, 04/20/2020 - 10:32am
Privacy-Preserving Mechanism (PPM)
k- automorohism
k- isomorphism
Measurement
Metrics
naïve ID removal
node addition
Peer-to-peer computing
Predictive Metrics
privacy
privacy models and measurement
k- anonymity
privacy-preserving mechanisms
pubcrawl
Resiliency
Routing
Scalability
seed-based attack
strongest attacks
structural attack
structure-based attack
structure-based de-anonymization attacks
edge addition
anonymity privacy
anonymization and de-anonymization
attack graphs
Autonomous System (AS)level graph
composability
computer security
Control Theory and Privacy
cyber-physical systems
data privacy
degree attacks
Computing Theory and Privacy
fake edges
fake nodes
graph data
graph data necessitates
graph privacy
graph theory
Human behavior
Inter-domain routing
internet
file
Towards Reliable and Optimized Data-Driven Cyber-Physical Systems using Human-Centric Sensing
Submitted by wangdong on Fri, 04/10/2020 - 10:22am. Contributor:
Dong Wang
cyber-physical systems
Data Driven
human-centric
Lightning Talks
1845639
CPS PI Meeting 2019
Lightning Talks
Presentation
file
A Self-Learning Intelligent Control Framework for Networked Cyber-Physical Systems
Submitted by zhongxn on Wed, 04/08/2020 - 3:22pm. Contributor:
Xiangnan Zhong
self learning
intelligent control
cyber-physical systems
Lightning Talks
1947418
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
microservices
software architects
service-oriented architecture
Servers
security restrictions
security of data
security
resulting microlevel policies
real-time behavior
pubcrawl
Protocols
protocol verification
policy-based governance
Policy Based Governance
Perturbation methods
CoCoME case study
microservice architectural style
message passing
macro-level security policy
macro-level policy
information-flow security policies
Information systems
information leaks
Information Flow
individual microservices
Formal Specification
cyber-physical systems
cyber-physical microservice architectures
computer architecture
collaboration
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
…
next ›
last »