Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network connectivity
biblio
Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 11:28am
Conferences
CPS
CPS resilience
cps resiliency
cyber-physical systems
Industries
information security
network connectivity
overlay networks
Peer-to-peer computing
pubcrawl
resilience
Smart cameras
biblio
Fuzzy Logic based Network Intrusion Detection Systems
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
intrusion detection system
security
rule base generation steps
Resiliency
resilience
pubcrawl
normal network traffic
noisy data
NIDSs
network intrusion detection systems
network connectivity
Metrics
malicious activities
abnormal network traffic
interpolation
fuzzy rule interpolation
fuzzy logic based solutions
Fuzzy logic
feature extraction
false positive classification
electronic communication
Cyber Physical System
computer networks
computer network security
computer network
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
Software Defined Multi-Path TCP Solution for Mobile Wireless Tactical Networks
Submitted by grigby1 on Wed, 12/02/2020 - 1:54pm
software defined multipath TCP solution
relay networks (telecommunication)
relay points
resilience
Resiliency
satellite communication system
satellite failure
Satellites
Scalability
service interruption
shore nodes
single link failure
single-path model
single-path TCP communication methods
pubcrawl
software defined networking
software-defined networking
source node movements
stable network handovers
tactical networks
TCP connectivity
telecommunication network reliability
transport protocols
Unmanned Aerial Vehicles
wireless
Wireless communication
wireless network technologies
wireless signal outage
mobile wireless heterogeneous networks
Bandwidth
communication interruption
communication model
connectable relay point
control systems
coupled congestion control
frequent network handovers
inherent mobility
Marine vehicles
military communication
military computing
Mininet-WiFi emulation testbed
mobile
autonomous aerial vehicles
mobile wireless tactical networks
mobility management (mobile radio)
Multi-Path TCP
multipath channels
naval battle networks
Naval Battlefield Network communications
naval entities
network connectivity
network handover delay
network stability
noninteractive data
nonnegligible overhead
Protocols
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus
Submitted by willirn1 on Thu, 05/30/2019 - 2:57pm
r-robustness
robust graphs
dominating sets
Complexity theory
Measurement
Redundancy
resilience
control systems
Robustness
networked system control
robust network construction
telecommunication control
fundamental metrics
failure-prone circumstances
resilient consensus
network structure
network connectivity
network robustness
structural robustness
trusted nodes
telecommunication network reliability
Vanderbilt
biblio
Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures
Submitted by grigby1 on Mon, 12/10/2018 - 11:34am
IoT-enabled infrastructures
Wireless communication
underlaid device network
three-player three-stage game theoretic framework
subgame perfect Nash equilibrium
smart everything initiatives
Scalability
Resiliency
resilience
pubcrawl
overlaid device network
optimisation
network connectivity
Nash Equilibrium
multilayer system architecture
Algorithm design and analysis
iobt
Internet of Things
Internet of battlefield things
internet
infrastructure network operators
Human Factors
heterogeneous multilayer adversarial network design
Games
game theory
Electronic mail
computer network security
Communication system security
coexisting infrastructure network
Big Data
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV
biblio
Process-aware side channel monitoring for embedded control system security
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
run-time parameters
microcomputers
Monitoring
network connectivity
process stability
process-aware side channel monitoring
pubcrawl
Real-time monitoring
Resiliency
Metrics
security
side channel sensors
side channel sensory modalities
side channels
software components
Temperature measurement
Temperature sensors
thermal
Cryptography
acoustic
analog side channels
composability
computational loop
control logic
control systems
CPS computational nodes
CPS device
actuator security
cyber-attacks
cyber-physical systems
embedded control system security
embedded systems
Fans
feature extraction
heterogeneous hardware