Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fault detection
biblio
Neuron Fault Tolerance in Spiking Neural Networks
Submitted by grigby1 on Fri, 11/18/2022 - 4:44pm
neural network resiliency
Mission critical systems
fault detection
Neurons
Fault tolerant systems
fault tolerance
Planning
Hardware
Resiliency
resilience
pubcrawl
biblio
Research on fault diagnosis in early stage of software development based on Object-oriented Bayesian Networks
Submitted by aekwall on Fri, 07/29/2022 - 3:27pm
Measurement
Analytical models
pubcrawl
Metrics
Resiliency
composability
Industries
fault diagnosis
codes
Object oriented modeling
fault detection
early stage
failure rate
object-oriented Bayesian network
object oriented security
biblio
Waveform Vector Embedding for Incipient Fault Detection in Distribution Systems
Submitted by aekwall on Fri, 05/06/2022 - 11:57am
Support vector machines
machine learning
Conferences
power systems
pubcrawl
Resiliency
Power system protection
Compositionality
Logistics
Dictionaries
fault detection
electrical fault detection
incipient fault
waveform dictionary
waveform vector
expandability
biblio
Smart Grid Anomaly Detection using a Deep Learning Digital Twin
Submitted by grigby1 on Wed, 03/23/2022 - 11:36am
power grids
Wide Area Monitoring System
Smart Grid Sensors
Smart Grid
Sensor Systems
SCADA systems
Resiliency
resilience
pubcrawl
Power measurement
Anomaly Detection
Phasor measurement units
Human Factors
Human behavior
fault detection
digital twin
deep learning
Cyber Physical System
convolutional neural network
composability
biblio
Collaboratively Diagnosing IGBT Open-circuit Faults in Photovoltaic Inverters: A Decentralized Federated Learning-based Method
Submitted by aekwall on Tue, 03/08/2022 - 1:38pm
cyber-physical systems
Human Factors
Packet loss
data privacy
machine learning
Learning systems
pubcrawl
Metrics
Resiliency
Photovoltaic systems
fault diagnosis
multiple fault diagnosis
fault detection
fault detection and diagnosis
federated learning
IGBT open-circuit fault
insulated gate bipolar transistors
photovoltaic system
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 12:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
Improving Black Box Classification Model Veracity for Electronics Anomaly Detection
Submitted by aekwall on Tue, 03/09/2021 - 11:05am
electronics anomaly detection
fault detection
KNN
BB-stepwise algorithm
black box
black box classification model veracity
black box model
classification model transparency
data driven classification models
decision tree models
fault diagnosis
electronics devices
electronics industry
higher transparency
Industrial electronics
KNN models
KNN-stepwise
manufactured electronics
Stepwise
Metrics
performance evaluation
Classification algorithms
Data models
nearest neighbour methods
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Conferences
pattern classification
manufacturing systems
production engineering computing
black box encryption
Decision trees
classification
Veracity
Feature Selection
biblio
A Resource Management Model for Real-time Edge System of Multiple Robots
Submitted by grigby1 on Thu, 12/17/2020 - 12:54pm
resource security access control
policy-based governance
pubcrawl
real-time edge system
resilience
Resiliency
resource access control
resource allocation
resource isolation
operating systems (computers)
resource security isolation protection
robot hardware modules
Robot Operating System
robot operating systems
security
security of data
software modules
telecommunication security
isolation model
day industrial productions
edge computing
fault detection
fault location
hierarchical management
Human behavior
Human Factors
industrial robots
authorisation
light-weight edge devices
lightweight edge device
mission-critical resource classification
multi-robot systems
multilevel security data isolation transmission
multiple robot arms
multiple robots
novel resource management model
biblio
On the Investigation of Essential Diversities for Deep Learning Testing Criteria
Submitted by aekwall on Mon, 11/02/2020 - 1:47pm
Measurement
testing criteria
testing
test suites
test diversities
Task Analysis
system robustness
Reliability
pubcrawl
program testing
Neurons
neuron activities
Metrics
metamorphic testing
metrics testing
deep learning
learning (artificial intelligence)
image retrieval
fault diagnosis
fault detection ability
fault detection
essential metrics
essential diversities
erroneous behaviors
defined metrics
deep learning testing criteria
Deep Learning testing
deep learning systems
deep learning models
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
DOS brute force attacks faults detection
brute force attacks
Subtractive Clustering
specialised MIB dataset
SNMP-MIB variables
SNMP-MIB parameter datasets
SFCM method
optimised fuzzy c-means
network performance
network issues
Network Fault Attacks
MIB feature
Management information base
Fuzzy Cluster Means
Fault Clustering
Servers
computer networks
computer network systems
clustering methods
Clustering algorithms
fault detection
policy-based governance
Human Factors
network administrators
fuzzy set theory
Force
pubcrawl
Protocols
computer network security
1
2
3
4
next ›
last »