Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Using Set-Based Heading to Improve Mobile Agent Movement
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
network theory (graphs)
Topology
Time measurement
situational security
situational awareness
set-based heading
security of data
security
scale-free graph
random walk
random processes
nonheading movement technique
cover time
network (graph)
movement method
mobile agents
mobile agent movement
minimum distance graph
History
heading
Geography
foraging application
Electronic mail
dynamic graph topology
biblio
Synchrophasor Data Baselining and Mining for Online Monitoring of Dynamic Security Limits
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
security monitoring
power system reliability
power system security
power system stability
power transfer measurement
random forest (RF)
SBSA
SCADA measurements
SCADA systems
seasonal security margins
security
power engineering computing
Stability criteria
synchrophasor
synchrophasor data baselining
synchrophasor-based situational awareness
system interfaces
system reliability
system stress
system visibility
Table lookup
network backbone buses
Baselining
clustering
critical interfaces
Data mining
dynamic security assessment (DSA)
dynamic security limits
look-up tables
medoid clustering
Monitoring
angle shifts
nomograms
online monitoring
PAM clustering
partitioning around medoids (PAM)
pattern clustering
phase-angle differences
phasor measurement
phasor measurement unit (PMU)
Phasor measurement units
biblio
Fusing restricted information
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
information security classification
sensor fusion
Sensitivity
security of data
security
secrecy preserving fusion
restricted information fusion
privacy preserving data mining
merging
classification
Information filters
Fuses
Databases
data mining processes
Data mining
data merging
Data integration
biblio
Visualization of Security Metrics for Cyber Situation Awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:08am
Measurement
visualization
visual analytics technique
SIEM systems
security metric visualization
security information visualization
security information and event management systems
security
Olympic Games scenario
Network Security Status
network security level assessment
Abstracts
Layout
high level metrics visualization
data visualisation
data analysis
cyber situation awareness
computer network security
big data security
Big Data
Availability
biblio
Ontology based approach for perception of network security state
Submitted by BrandonB on Tue, 05/05/2015 - 11:08am
automation
computer network security
computer networks
Hardware
Manuals
network operating system
network operating systems
Network Security Status
Network Situational awareness
Ontologies
ontologies (artificial intelligence)
Ontology
security
taxonomy
taxonomy classes
biblio
A survey of Internet security risk over social networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Internet security risk
social risks
social networks
social networking integration
social networking (online)
Social network services
social network
security of data
security
rural community
risk management
Organizations
civil society
Internet risks
internet
hackers
global economy
geography climate
Educational institutions
dangers to society
crimes social networking
Computers
Communities
biblio
A Taxonomic Perspective on Certification Schemes: Development of a Taxonomy for Cloud Service Certification Criteria
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
cloud service certification criteria
taxonomy
taxonomic perspective
structural characteristics
standards
security
Interviews
CSC initiatives
CSC design
audit process
cloud providers
cloud computing standards
Cloud Computing
certifiers
certification schemes
certification
Business
biblio
Staffing for Security: Don't Optimize
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
botnets
computer security
Data Security
Economics
IT security employees
Organizations
Personnel
privacy
security
security of data
security threats
software development
staff allocation optimization
staffing
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
Taxonomy of Attacks for Agent-Based Smart Grids
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
grid computing
taxonomy of attacks
taxonomy
software agents
Smart Grids
Smart Grid
security of data
security feature
security
power systems
National Science Foundation Workshop
Mathematical model
Load modeling
large scale environment
information flow direction
agent-based smart grids
Generators
Equations
dynamic environment
distributed environment
cyber-physical systems
cyber-physical process
cyber-physical causality
Cyber Physical Systems (CPS)
cyber detection scheme
cyber attack detection scheme
critical infrastructure
attack classification
agents
« first
‹ previous
…
420
421
422
423
424
425
426
427
428
…
next ›
last »