Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Graphics
biblio
Fireasy: a tool to aid security policy modeling, translation and understanding firewall configuration
Submitted by aekwall on Fri, 01/13/2023 - 3:51pm
Metrics
Task Analysis
SPML2
security policies
security
Scalability
Resiliency
pubcrawl
PacketFilter
Companies
maintenance engineering
Information systems
Human Factors
Graphics
Firewalls (computing)
firewall rules visualization
Firewal
biblio
Definition of Protective Measures of Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 08/26/2022 - 11:08am
Data protection
protection measure
Euler-Venn diagram
basic set
automated process control system
Area measurement
Graphics
information protection system
Industrial engineering
information security
Computing Theory
set theory
Metrics
Buildings
process control
pubcrawl
security
biblio
Laminar chaos in systems with variable delay time
Submitted by aekwall on Fri, 07/29/2022 - 4:33pm
Metrics
time-varying delay
time-delay system
Synchronization
Resiliency
pubcrawl
privacy
oscillating behaviors
modulation
chaos
laminar chaos
Graphics
delays
Delay effects
Couplings
composability
complex networks
biblio
Graph-Based Lattices Cryptosystem As New Technique Of Post-Quantum Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
Cryptography
pubcrawl
quantum computing
composability
encoding
Compositionality
NP-hard problem
Lattices
lattice
degree sequence
graphic lattice
Graphics
ice-flower system
sufficient conditions
topological coding
theoretical cryptography
biblio
The Cyber Attack on the Corporate Network Models Theoretical Aspects
Submitted by aekwall on Mon, 01/10/2022 - 12:49pm
attack implementation
attack graphs
weighted graph
network vulnerability
mathematical model parameters
Graphics
graph model of information attack
Filtering
cyber attack
corporate network
Cartesian product
Mathematical model
attack consequences assessment
Web servers
Predictive Metrics
cyberattack
Semantics
composability
Resiliency
pubcrawl
Protocols
biblio
Research on Linkage Model of Network Resource Survey and Vulnerability Detection in Power Information System
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
information security
Vulnerability Verification
vulnerability scanning
Resource Survey
power information network resource survey
power information network management
Power Information Network
network resource survey
linkage model
information networks
Couplings
Compositionality
Graphics
security of data
power systems
power information system
Information systems
power engineering computing
tools
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
IP networks
biblio
Secured graphic QR code with infrared watermark
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
implicit QR code information
Watermarking
security of data
secured graphic QR code
Resiliency
QR codes
QR code
pubcrawl
optical characteristics
Mobile handsets
mark scanning equipment
Ink
infrared watermarking
infrared watermark
infrared QR code information
infrared detectors
anticounterfeiting feature
image watermarking
image enhancement
image colour analysis
Image color analysis
Image coding
Graphics
general QR code reader
explicit graphic QR code information
error diffusion
data hiding
data encapsulation
cyber physical systems
Cryptography
CMYK printed ink colors
biblio
Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation
Submitted by Katie Dey on Mon, 09/09/2019 - 3:29pm
user evaluation
HMT
Graphics
Computer graphics
visualization
Human-computer interaction
Alex Endert
IN-SPIRE
Computational modeling
Data models
Data visualization
Analytical models
Semantics
cognition
human-in-the-loop system design
model steering functionality
user analytic process
user interaction methodology
analytical reasoning
Computation
visual analytics
semantic interaction
human computer interaction
data visualisation
data analysis
Human Machine Teaming
Interactions
C3E 2019
biblio
Unified Approach for Operating System Comparisons with Windows OS Case Study
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Three-dimensional displays
operational level benchmarking
operational level performance
OS security features
pubcrawl
resilience
Resiliency
security
security of data
operating systems (computers)
unified approach
unified benchmarking approach
Windows 7
Windows 8
Windows operating system
Windows OS
Windows OS case study
Windows XP
graphics processing units
Benchmark testing
Benchmarking
composability
conventional personal computer
DirectX 11
efficient benchmark systems
gpu
Graphics
automated benchmarking tools
Hardware
hardware level
hardware technology
Metrics
microsoft windows
operating system
operating systems