Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
knowledge acquisition
biblio
Towards Automated Generation of Function Models from P IDs
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
function model
plant topology models
P&ids
operator decision support systems
modeling process
modeling patterns
MFM models
MFM
knowledge acquisition
Functional Modeling
pubcrawl
automationml
Automated model generation
automated generation
Decision support systems
IDS
resilience
composability
production engineering computing
Resiliency
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 11:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
biblio
Incremental knowledge acquisition and self-learning for autonomous video surveillance
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
unlabeled video streams
knowledge acquisition
object detection
pubcrawl
Resiliency
safety purpose
Scalability
self-learning
Self-Organizing Maps
standard machine learning pipelines
Intelligent Video Analysis
Unsupervised Learning
unsupervised machine learning
video feed
video frame
video signal processing
video stream
video streaming
video surveillance
video surveillance systems
Hazards
Anomaly Detection
autonomous video surveillance
benchmark video dataset
Change detection
Clustering algorithms
cognition
event detection
feature extraction
hazard detection
action recognition
Heuristic algorithms
Human behavior
imperative security
incremental knowledge acquisition
incremental learning
incremental machine learning
Industry 4.0
industry/smart factory settings
intelligent high-level video analysis
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss