Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Monitoring
biblio
PDF Malware Analysis
Submitted by grigby1 on Wed, 09/20/2023 - 10:49am
privacy
Virtual machining
static analysis
Shell Scripting
security
ScriptAnalysis
Resiliency
resilience
pubcrawl
cuckoo sandbox
Portable document format
PDF malware
Monitoring
Metrics
Malware Analysis
malware
Human behavior
dynamic analysis
biblio
Power System Monitoring, Control and protection using IoT and cyber security
Submitted by grigby1 on Fri, 09/08/2023 - 4:17pm
Compositionality
IOTA
communication
technology
power system
protection
Internet-scale Computing Security
Data protection
cyber security
Roads
Telecommunications
Internet of Things
Network
power grids
Power Grid
security
control systems
composability
Production
Scalability
Safety
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Monitoring
biblio
Research on New Power System Network Security Guarantee System
Submitted by grigby1 on Fri, 08/25/2023 - 10:34am
composability
sustainable protection model
New power system
Early warning and emergency response
cyberspace security
Human Factors
power systems
Cyberspace
Power measurement
emergency services
Compositionality
network security
Monitoring
Information Assurance
Industries
Computational modeling
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
security
Monitoring
pubcrawl
resilience
Resiliency
internet
Big Data
Memory management
data structures
Compositionality
hash algorithms
filtering algorithms
cuckoo hashing
hash collision
Odd-Even Hash
Rehashing
biblio
A Hardware-Assisted Security Monitoring Method for Jump Instruction and Jump Address in Embedded Systems
Submitted by grigby1 on Thu, 07/13/2023 - 3:30pm
composability
jump instruction
jump address
Resiliency
security monitoring
Embedded System
Loading
integrity
Data mining
security
Computers
embedded systems
Hardware
resilience
Metrics
pubcrawl
Monitoring
biblio
Using CyberScore for Network Traffic Monitoring
Submitted by grigby1 on Fri, 06/23/2023 - 12:27pm
Monitoring
pubcrawl
resilience
Scalability
Industries
telecommunication traffic
Computer crime
deep packet inspection
statistical analysis
network intrusion detection
Resiliency
Inspection
open-source
Security Score
Traffic Measurement
biblio
Improving Resistance of Matrix Factorization Recommenders To Data Poisoning Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 1:44pm
Monitoring
pubcrawl
Human behavior
Metrics
composability
Resistance
recommender systems
Systematics
data poisoning attacks
decomposition
attack resistance
matrix factorisation
biblio
Communication Obfuscation for Privacy and Utility against Obfuscation-Aware Eavesdroppers
Submitted by grigby1 on Fri, 06/09/2023 - 12:53pm
Monitoring
CPS
pubcrawl
Human behavior
privacy
Wireless communication
cyber-physical systems
Dynamical Systems
Human Factors
biblio
Design of Cyber-Physical Security Testbed for Multi-Stage Manufacturing System
Submitted by grigby1 on Fri, 05/26/2023 - 4:31pm
composability
data generation
cyber-physical
network systems
cyber range
Global communication
Resiliency
testbed
testing
cyber-physical systems
CPS Security
collaboration
Prototypes
Cybersecurity
Scalability
resilience
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Monitoring
security
biblio
Research on applied strategies of business financial audit in the age of artificial intelligence
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
information security
security
Monitoring
pubcrawl
Artificial Intelligence
composability
Compositionality
uncertainty
data analysis
computational intelligence
risk management
Compounds
audit
1
2
3
4
5
6
7
8
9
…
next ›
last »