Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Control Theory
biblio
A Method of Cyber Risk Control Node Selection Based on Game Theory
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
composability
Control Theory
cyber attack
game theory
offensive and defensive income
pubcrawl
resilience
Resiliency
risk control
security
Vulnerability
biblio
SARA: Security Automotive Risk Analysis Method
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
automotive security
composability
Control Theory
pubcrawl
resilience
Resiliency
risk assessment
security
security requirements
threat analysis
biblio
HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
composability
Control Theory
Hardware Security
information-flow security
pubcrawl
resilience
Resiliency
security
timing channels
biblio
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
business process
composability
Control Theory
optimization modulo theories
pubcrawl
resilience
Resiliency
security
workflow satisfiability
biblio
In-Design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks
Submitted by grigby1 on Fri, 06/28/2019 - 9:41am
Control Theory
Resiliency
Computing Theory and Resilience
DDoS
pubcrawl
resilience
Scalability
SDN
SDN security
biblio
Obfuscation Resilient Search Through Executable Classification
Submitted by grigby1 on Mon, 06/10/2019 - 12:58pm
bytecode analysis
bytecode search
Computing Theory and Resilience
Control Theory
deep learning
executable search
graph theory
Human behavior
Malware Analysis
Metrics
obfuscation resilience
privacy
pubcrawl
Resiliency
biblio
Property Specific Information Flow Analysis for Hardware Security Verification
Submitted by grigby1 on Mon, 05/20/2019 - 3:30pm
Scalability
Metrics
policy-based governance
potential security violations
property specific information flow analysis
property specific search
property specific trimming technique
pubcrawl
resilience
Resiliency
Mathematical model
security
security critical paths
security model
security of data
security property
security verification
timing
Trojan horses
unintended design flaws
hardware security verification
collaboration
Complexity theory
composability
Control Theory
Design methodology
formal verification
Hardware
hardware information flow analysis
Hardware Security
Acceleration
hardware security vulnerabilities
Hardware Trojans
Human behavior
Human Factors
information flow analysis
information flow models
information flow security
information theoretic security
biblio
Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks
Submitted by grigby1 on Thu, 05/09/2019 - 9:47am
Control Theory
privacy
Anomaly Detection
convolutional neural networks
Industrial Control Systems
pubcrawl
resilience
Resiliency
Scalability
scalable
biblio
Post-quantum Security Using Channel Noise
Submitted by aekwall on Mon, 03/25/2019 - 8:56am
physical layer security
composability
Control Theory
finite-length regime
Human behavior
information theoretic security
information-theoretic security
Metrics
physical-layer security
post-quantum security
pubcrawl
Resiliency
security
sensor security
wiretap channel
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »