Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
power-grid controller anomaly detection
control engineering computing
LSTM
actuators
data-driven defense system
enhanced temporal deep learning
Hardware Performance Counter
Kolmogorov–Smirnov test
power-grid controller
Human Factors
power-grid system
programmable logic controller
security-critical cyber-physical systems
temporal deep learning detection
temporal deep learning model
time 360.0 ms
zero trust
Scalability
deep learning
sensors
process control
power grids
power system security
power engineering computing
Zero-day attacks
Substations
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
invasive software
malware
Hardware
biblio
Security for the Industrial IoT: The Case for Information-Centric Networking
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
Internet of Things
unprotected channel
telecommunication power management
sensors
security
secure networking solution
safety-critical industrial IoT
Safety
robust communication
Resiliency
pubcrawl
production engineering computing
Metrics
Logic gates
IP-based approaches
internetworking
actuator security
internet
inter-networking
inter-networked sensors
information-centric networking
Information Centric Network
information centric networking
industrial safety systems
industrial production plants
industrial plants
Human behavior
DoS resilience
content-centric security model
computer network security
composability
Cloud Computing
biblio
A Middleware Framework to Address Security Issues in Integrated Multisystem Applications
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
open systems
Systems-of-Systems
Systems Integration
smart cities
sensors
security of data
security attacks
security aspects
security
Resiliency
pubcrawl
production engineering computing
Access Control
multisystem integration
middleware
Metrics
manufacturing systems
interoperability
integrated multisystem applications
industrial applications
Human behavior
composability
actuators
actuator security
biblio
Securing Industrial Wireless Networks: Enhancing SDN with PhySec
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
industrial landscape
sensors
software defined networking
network management
physical layer security
additional overhead
cryptographic procedures
cyber-physical production systems
cyber-security threats
industrial communication networks
network security
industrial wireless networks
interconnected devices
network security requirements
PhySec
secret key generation
transmission bandwidth
wireless solutions
actuator security
Communication system security
Cryptography
Internet of Things
Software
computer network management
Resiliency
Human behavior
pubcrawl
composability
computer network security
Wireless communication
Metrics
production engineering computing
software-defined networking
SDN
Communication networks
cyber security
radio networks
biblio
Towards a Security Cost Model for Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
cyber attack
actuator security
security incident
security costs
security cost model
resulting costs
providing security
physical world
onion layer model
flexible systems
engineering secure systems
Cost of security
CPS
actuators
security of data
sensors
Measurement
Mathematical model
Industry 4.0
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Task Analysis
security
Cloud Computing
biblio
Wideband Electromagnetic Dynamic Acoustic Transducer as a Standard Acoustic Source for Air-coupled Ultrasonic Sensors
Submitted by aekwall on Mon, 01/13/2020 - 12:07pm
Scalability
Receivers
Resiliency
Human behavior
pubcrawl
sensors
Transmitters
Acoustics
acoustic source
air-coupled ultrasonic measurement
flexural ultrasonic transducer
microphones
Wideband
wideband electromagnetic dynamic acoustic transducer
acoustic coupling
biblio
Data Acquisition Network and Application System Based on 6LoWPAN and IPv6 Transition Technology
Submitted by aekwall on Mon, 01/13/2020 - 12:04pm
personal area networks
wide area networks
tunnel
rich IPv6 address
multiservice data storage
low-power wide-area network wireless communication technology
IPv6
IPv4 address exhaustion
internal sensor network
device access management
data acquisition network
application system
affair data service
actual uploaded river quality data
6to4 tunnel
6to4
Monitoring
internetworking
data packet
sensors
6LoWPAN
data acquisition
internet
Routing
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
Servers
IP networks
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »