Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Monitoring
biblio
Alarm Correlation Method Using Bayesian Network in Telecommunications Networks
Submitted by grigby1 on Fri, 03/31/2023 - 7:26am
belief networks
Monitoring
pubcrawl
Metrics
Correlation
Topology
information technology
network topology
Telecommunications
Bayes methods
Bayesian network
Alarm Correlation
fault diagnosis
network operation
Root cause analysis
biblio
Electricity-Theft Detection in Smart Grids Using Wireless Sensor Networks
Submitted by grigby1 on Fri, 01/20/2023 - 11:30am
Compositionality
Hierarchical algorithm
Electricity theft detection
Electricity management
transmission
Smart Grid Sensors
Costs
distribution
automation
Clustering algorithms
computer architecture
Smart Grids
wireless sensor networks
Computational modeling
Resiliency
resilience
Human Factors
pubcrawl
Monitoring
biblio
Performance Variability and Causality in Complex Systems
Submitted by grigby1 on Fri, 12/09/2022 - 5:18pm
Monitoring
pubcrawl
resilience
Resiliency
composability
Reliability
distributed computing
Degradation
complex systems
Autonomic Security
location awareness
time-series
causal analysis
biblio
Detecting and Mitigating Jamming Attacks in IoT Networks Using Self-Adaptation
Submitted by grigby1 on Fri, 12/09/2022 - 5:18pm
computer architecture
Internet of Things
Adaptation models
Monitoring
IoT
pubcrawl
resilience
Resiliency
composability
wireless networks
distributed computing
Jamming
jamming attacks
Autonomic Security
Self-Adaptation
biblio
Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints
Submitted by grigby1 on Thu, 10/13/2022 - 11:17am
Logic gates
Monitoring
Servers
pubcrawl
Human behavior
Registers
Public key
Phishing
HTTPs
Electronic mail
Public-Key Certificate
biblio
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone
Submitted by grigby1 on Thu, 10/13/2022 - 11:16am
security
Monitoring
Servers
pubcrawl
Human behavior
DNS
Phishing
unsolicited e-mail
Electronic mail
Uniform resource locators
overload mitigation
phishing URL
Response Policy Zone
route detouring
RPZ
URL Phishing attack
biblio
Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks
Submitted by grigby1 on Mon, 10/03/2022 - 11:47am
Routing
energy balance.
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
Routing Protocol
Wireless Sensor Network
wireless networks
Compositionality
Monitoring
composability
Protocols
privacy
Energy Efficiency
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Anomaly Detection of ICS Communication Using Statistical Models
Submitted by grigby1 on Fri, 09/30/2022 - 7:43am
Switches
statistical distributions
communication patterns
IEC 104
Resiliency
Monitoring
ICS Anomaly Detection
traffic control
Windows
Training
Smart Grid
IEC standards
industrial networks
Scalability
Integrated circuit modeling
resilience
pubcrawl
Anomaly Detection
biblio
Convergence of Cloud and Fog Computing for Security Enhancement
Submitted by grigby1 on Fri, 09/16/2022 - 3:37pm
Fog computing
Security monitoring framework
cloud server
virtual machine
Costs
Resiliency
computing resources
cyber-attack
Virtual machining
encryption
edge computing
Scalability
resilience
pubcrawl
Servers
Monitoring
security
Cloud Computing
biblio
Secure End-to-End Sensing in Supply Chains
Submitted by grigby1 on Fri, 09/09/2022 - 2:36pm
sensors
trusted execution
supply chain security
Internet of Production
condition monitoring
supply chains
Reliability
blockchain
Containers
computer architecture
Companies
Resiliency
resilience
pubcrawl
Trusted Computing
Supply Chain
Monitoring
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »