Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mechatronics
biblio
Analysis of “Tripartite and Bilateral” Space Deterrence Based on Signaling Game
Submitted by grigby1 on Fri, 06/30/2023 - 2:32pm
Games
tying hands
tripartite and bilateral
sunk coat
space deterrence
signal game theory
Deterrence
mechatronics
game theory
pubcrawl
information technology
Scalability
Analytical models
Conferences
Resiliency
resilience
Human behavior
biblio
Backstepping Sliding Mode Control for Cyber-Physical Systems under False Data Injection Attack
Submitted by grigby1 on Fri, 05/26/2023 - 4:32pm
Robustness
Super-twisting sliding mode control
radial basis function networks
backstepping
mechatronics
false data injection attacks
Resiliency
simulation
actuators
collaboration
cyber-physical systems
CPS Security
composability
Scalability
resilience
policy-based governance
Human behavior
pubcrawl
biblio
Data Security Structure of a Students’ Attendance Register Based on Security Cameras and Blockchain Technology
Submitted by grigby1 on Fri, 04/28/2023 - 3:53pm
Compositionality
security camera
blockchains
mechatronics
Data Security
computational intelligence
Hard disks
blockchain technology
Cameras
Cryptography
Registers
composability
Computer crime
Artificial Intelligence
pubcrawl
Servers
security
biblio
Network attack detection model based on Linux memory forensics
Submitted by grigby1 on Fri, 03/03/2023 - 9:25am
pubcrawl
Metrics
Resiliency
Analytical models
internet
composability
Memory management
network security
Linux
Compositionality
resilience
Forensics
Memory Forensics
Linux Operating System Security
mechatronics
Linux kernel analysis
biblio
An Exploration of Mis/Disinformation in Audio Format Disseminated in Podcasts: Case Study of Spotify
Submitted by grigby1 on Fri, 02/17/2023 - 5:28pm
pubcrawl
Human behavior
Conferences
Scalability
Ecosystems
social networking (online)
fake news
disinformation
mechatronics
Digital audio broadcasting
misinformation
Podcast
Spotify
Technology Policy
Social Agents
biblio
Same Form, Different Payloads: A Comparative Vector Assessment of DDoS and Disinformation Attacks
Submitted by grigby1 on Fri, 02/17/2023 - 5:28pm
pubcrawl
Human behavior
Conferences
Scalability
Cybersecurity
Computers
Law
DDoS
social networking (online)
Media
standardization
disinformation
mechatronics
threat assessment
open systems
Social Agents
biblio
A Secure and Efficient Analytical Encryption Method for Industrial Internet Identification based on SHA-256 and RSA
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
Resiliency
Safe Coding
identification analysis
coding
mechatronics
codes
Dictionaries
policy-based governance
encoding
security
Metrics
pubcrawl
Public key
Secret key
encryption
Human Factors
information security
biblio
Research on Security Vulnerability Mining Technology for Terminals of Electric Power Internet of Things
Submitted by grigby1 on Fri, 02/03/2023 - 3:41pm
fuzzing
power
IoT terminal
firmware security
power grid vulnerability analysis
mechatronics
power systems
vulnerability mining
Fuzz Testing
Internet of Things
static analysis
composability
process control
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Research on Nondestructive Vulnerability Detection Technology of Power Industrial Control System
Submitted by grigby1 on Fri, 02/03/2023 - 3:40pm
Metrics
Vulnerability Analysis
static analysis
Resiliency
resilience
pubcrawl
power industry control system
Power industry
power grid vulnerability analysis
non-destructive detection
Industrial Control Systems
mechatronics
Inspection
industrial control simulation
industrial control
control systems
composability
Analytical models
industrial control system
biblio
Research on iOS Remote Security Access Technology Based on Zero Trust
Submitted by grigby1 on Fri, 12/02/2022 - 11:10am
mechatronics
zero trust
Teleworking
ShangMi (SM) cryptographic algorithms
Resiliency
resilience
pubcrawl
Prototypes
process control
Acoustic Fingerprints
information security
identity authentication
Human Factors
Human behavior
Epidemics
computer architecture
composability
Access Control
1
2
3
4
next ›
last »