Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Robustness
biblio
A Sequential Multi-Objective Robust Optimization Approach under Interval Uncertainty Based on Support Vector Machines
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
pattern classification
uncertainty
SVM
Support vector machines
sequential optimization approach
sequential multiobjective robust optimization
sequential MORO
Robustness
Resiliency
resilience
pubcrawl
composability
optimization
optimisation
multi-objective robust optimization
Metrics
mathematics computing
interval uncertainty
genetic algorithms
design alternative classification model
convergence
Computational modeling
biblio
Assessing Software Supply Chain Risk Using Public Data
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
software supply chain risk assessment
Robustness
safety-critical software
Scalability
secure networking library
security
security of data
sigmoid cumulative vulnerability discovery function
Software
risk management
software vulnerability discovery
supply chain management
supply chain risk
supply chain security
supply chains
temporary plateau feature
tools
vulnerability discovery
open source project
AML
commercial government organizations
cumulative vulnerability discovery plot
cybersecurity risk
Databases
Human behavior
national vulnerability database
NVD
Alhazmi-Malaiya Logistic model
open version control data
OpenSSL
Predictive models
pubcrawl
public data
resilience
Resiliency
biblio
A Global Approach for the Improvement of UHF RFID Safety and Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
Safety
UHF RFID tags
UHF RFID security improvement
UHF RFID safety improvement
UHF RFID
UHF devices
telecommunication network reliability
system robustness evaluation
system behavior simulation
supply chain security
security
secure tag hardware architectures
secure protocols
Scalability
authentication
Robustness
RFID privacy
Resiliency
resilience
radiofrequency identification
pubcrawl
Protocols
ns2
Human behavior
Hardware
fpga prototyping
Cryptographic Protocols
Authentication Protocols
biblio
Security Control for Linear Systems Subject to Denial-of-Service Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 2:53pm
resilience
two-mode switching control method
Time Frequency Analysis
Stability analysis
stability
Security Control
security
secure control
Scalability
Robustness
Resiliency
closed loop systems
pubcrawl
Metrics
Linear systems
event-triggered control systems
event-triggered control
DoS attacks
denial-of-service attacks
cyber physical systems
Computer crime
closed-loop stability
biblio
CNNs with cross-correlation matching for face recognition in video surveillance using a single training sample per person
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
image representation
video surveillance
triplet-loss optimization methods
Training
still-to-video FR systems
single training sample
Scalability
Robustness
Resiliency
pubcrawl
Pipelines
optimization
optimisation
neural nets
matrix Hadamard product
adaptive weighted cross-correlation
image matching
Human behavior
Hadamard matrices
feature extraction
face recognition systems
face recognition
Face
discriminant face representations
cross-correlation matching
correlation methods
convolution
CCM-CNN parameters
camera distributed network
biblio
Performance Evaluation of a Fragmented Secret Share System
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
resilient mechanism
large-scale data leakage
Memory
metadata
Metrics
performance evaluation
pubcrawl
public storage environments
resilience
Resiliency
large scale data infrastructure
Robustness
secret shares
secure data storage
Secure File Sharing
storage locations
storage management
threshold sizes
thresholds scheme
data integrity
big data storage
Cloud Computing
composability
consistent data availability
Cryptography
data
Data fragmentation
data handling
Big Data
data retrievals
disaster contention
encryption
file recovery
fragmented secret share system
Human behavior
key
keyless mechanism
biblio
Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
composability
Data mining
encryption
feature extraction
malware
Metrics
pubcrawl
Ransomware
resilience
Resiliency
Robustness
tools
biblio
Game-Theoretic Analysis of System of Systems with Inherent Robustness Parameters
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Resiliency
interdependent systems of systems
large-scale infrastructures
Mathematical model
Metrics
Nash Equilibrium
probability
pubcrawl
resilience
inherent robustness parameters
Robustness
Scalability
security
social development
sum-form utility functions
system of systems
system parameters
game theory
Biological system modeling
Compositionality
conditional survival probabilities
cost parameters
Cyber Dependencies
cyber-physical systems
defender
economic development
attacker
game-theoretic analysis
Games
Human behavior
Human Factors
independent systems of systems
infrastructure robustness
infrastructure survival probability
biblio
Advanced interest flooding attacks in named-data networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
resilience
Monitoring
multicast communication
multicast communications
Named-Data Networking
network infrastructure
policy governance
Policy-Governed Secure Collaboration
pubcrawl
Metrics
Resiliency
Robustness
Routing protocols
security of data
specific DDoS attack
telecommunication security
unsatisfiable content requests
data-plane
advanced interest flooding attacks
clean slate
clean-slate Internet proposal
collaboration
complete attack model
computer architecture
Computer crime
computer network security
advanced IFA
Electronic mail
Human behavior
human factor
Human Factors
information-centric networking
Interest Flooding Attack
internet
biblio
Securing user identity and transactions symbiotically: IoT meets blockchain
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
permissioned blockchain
user identity
transactions symbiotically
standards
security of data
security
Scalability
Robustness
Resiliency
Public key
pubcrawl
Protocols
privacy
Permissioned Blockchains
attribute management
performance evaluation
IoT
Internet of Things
Identity management
Human behavior
History
embedded devices
Distributed Identity Management
device identity
data privacy
Cryptography
blockchain technology
blockchain
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »