Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formatting
biblio
Analytics at Scale: Evolution at Infrastructure and Algorithmic Levels
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
component
relational database security
Tutorials
styling
style
insert
formatting
Technological innovation
data analysis
Scalability
relational databases
quality of service
composability
Production
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
component
insider threat
object detection
styling
style
insert
formatting
Recurrent neural networks
Metrics
deep learning
real-time systems
composability
performance evaluation
policy-based governance
Human behavior
pubcrawl
feature extraction
Predictive models
biblio
An Improved Byzantine Consensus Based Multi-Signature Algorithm
Submitted by grigby1 on Mon, 04/18/2022 - 11:37am
blockchain
component
Computational modeling
Consensus algorithm
consensus mechanism
cyber attack
Data Security
Explosions
formatting
Memory
pubcrawl
Scalability
security scalability
Smart Grid
telecommunication traffic
biblio
Analysis on Solid Protection System of Industrial Control Network Security in Intelligent Factory
Submitted by grigby1 on Wed, 03/02/2022 - 1:53pm
Intelligent manufacturing industrial control network industrial control security
styling
style
security
resilience
Production facilities
process control
Networked Control Systems Security
Metrics
manufacturing
Loss measurement
Industrial Control Systems
insert
information security
formatting
Economics
composability
Scalability
scalable systems
Resiliency
pubcrawl
biblio
A Study on Machine Learning based Conversational Agents and Designing Techniques
Submitted by aekwall on Tue, 09/07/2021 - 11:16am
Data models
deep learning
pubcrawl
Scalability
Metrics
Human behavior
chatbot
conversational agents
component
formatting
insert
style
styling
biblio
A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
key establishment
styling
style
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Key Management Architecture
key management
authentication
insert (key words) DTN
Human behavior
Heuristic algorithms
framework
formatting
computer architecture
component
Ciphers
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
An Improved Method for Generating Biometric-Cryptographic System from Face Feature
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
encryption
feature extraction
pubcrawl
Metrics
Resiliency
Scalability
component
resilience
Face
Biomedical imaging
biometric encryption
Facial features
formatting
insert
style
styling
biblio
Trust Structure in Public Key Infrastructures
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
pubcrawl
Trusted Computing
trust structure
styling
style
Servers
Semantics
security augmentation
Scalability
Resiliency
public key infrastructure
public key cryptography
Public key
authentication
privacy
PKI Trust Models
PKI
Metrics
intelligent algorithms
insert
Human Factors
Human behavior
generic PKI model
formatting
certification