Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Poles and towers
biblio
Situational Awareness of De-energized Lines During Loss of SCADA Communication in Electric Power Distribution Systems
Submitted by aekwall on Fri, 01/20/2023 - 3:12pm
power distribution
Weather forecasting
Training data
situational awareness
security situational awareness
Resiliency
pubcrawl
Predictive models
Predictive Metrics
composability
Poles and towers
Neural networks
load forecasting
load forecast
Load flow
distribution systems
Distributed databases
biblio
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Submitted by grigby1 on Wed, 07/13/2022 - 12:11pm
pubcrawl
Resiliency
Cryptography
Elliptic curve cryptography
Resistance
resilience
Scalability
Poles and towers
Elliptic curves
Identity-based encryption
Costs
elliptic curve
exponentiation
pairing-based cryptography
special TNFS
biblio
Endpoint Detection Amp; Response: A Malware Identification Solution
Submitted by grigby1 on Tue, 04/19/2022 - 12:15pm
Poles and towers
user interfaces
Signature-based detection
signature based defense
security
Scalability
Response
Resiliency
resilience
pubcrawl
Centralized Analysis &
Malware Identification
malware
information security systems
Focusing
feature extraction
End point Security
data privacy
cyber security
biblio
Safety and Damage Assessment Method of Transmission Line Tower in Goaf Based on Artificial Intelligence
Submitted by grigby1 on Tue, 02/16/2021 - 12:41pm
structural engineering computing
damage identification
finite element simulation model
foundations
geometric model
Goaf
mining industry
operation safety
random forest algorithm
damage assessment method
structural reliability model
surface subsidence
tower collapse
tower foundation interaction
transmission line tower
transmission line tower safety
Damage Assessment
Forestry
coal seam
coal mine goaf
coal
Transmission line measurements
mining
Poles and towers
power transmission lines
finite element analysis
Reliability
random forests
Safety
Resiliency
resilience
pubcrawl
Artificial Intelligence
biblio
Learning Compositional Sparse Bimodal Models
Submitted by grigby1 on Mon, 10/05/2020 - 1:02pm
human-robot interaction
visualization
tabletop robotics
tabletop building-blocks setting
symbol grounding
Semantics
Robot sensing systems
red squares
pubcrawl
Poles and towers
Multimodal learning
learning compositional sparse bimodal models
learning (artificial intelligence)
image representation
image colour analysis
Artificial Intelligence
human evaluation studies
encoding
Dictionaries
Compositionality
compositional structure
compositional semantics
compositional learning
compositional elements
compositional basis
colored shapes
blue triangles
bimodal sparse representation
bimodal perceptual domain modeling
bimodal dataset
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
Towards a Conversational Agent for Remote Robot-Human Teaming
Submitted by aekwall on Mon, 12/16/2019 - 1:27pm
Oils
telerobotics
Task Analysis
Scalability
Robot control
remote robots
remote robot-human teaming
pubcrawl
Poles and towers
operator situation awareness
operator control
conversational agents
Metrics
human-robot interaction
Human behavior
Furhat robot
Data collection
conversational agent
conversation agents
control engineering computing
autonomous systems
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 12:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication