Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data analysis
biblio
Anti-Phishing Game Framework Based on Extended Design Play Experience (DPE) Framework as an Educational Media
Submitted by grigby1 on Fri, 02/03/2023 - 5:21pm
pubcrawl
Human behavior
Conferences
Games
Phishing
Uniform resource locators
data analysis
Media
education
Security Awareness
Anti-phishing
Extended DPE Framework
URL Phishing
biblio
An End-to-End Cyber-Physical Infrastructure for Smart Grid Control and Monitoring
Submitted by aekwall on Fri, 01/20/2023 - 4:17pm
Data visualization
Smart Grid Situational Awareness
topology estimation
full stack
cyber-physical system
network topology
Phasor Measurement Unit
Predictive Metrics
distribution networks
real-time systems
data analysis
Smart Grid
Smart Grids
composability
Resiliency
pubcrawl
estimation
testbed
biblio
Design of Smart Risk Assessment System for Agricultural Products and Food Safety Inspection Based on Multivariate Data Analysis
Submitted by grigby1 on Thu, 01/05/2023 - 5:39pm
pubcrawl
Metrics
Hardware
Safety
data analysis
Trajectory
supply chains
Inspection
supply chain risk assessment
agricultural products
Food Safety Inspection
Intelligent Agricultural Products
Multivariate Data
Smart Risk Assessment
system modelling
biblio
Neutrosophic Data Analytic Hierarchy Process for Multi Criteria Decision Making: Applied to Supply Chain Risk Management
Submitted by grigby1 on Thu, 01/05/2023 - 5:38pm
risk management
pubcrawl
Metrics
Databases
Companies
Decision Making
data analysis
supply chains
reflection
supply chain risk assessment
Multi Criteria Decision Making
Neutrosophic Data Analytic Hierarchy Process
risk factors
supply chain risk management
biblio
Zero trust: Never trust, always verify
Submitted by grigby1 on Fri, 12/02/2022 - 11:09am
no presumptive trust
zero trust
zero knowledge
trust
Scholarships
safe digital systems
Risk
Resiliency
resilience
pubcrawl
Acoustic Fingerprints
negative expectations
Human Factors
Human behavior
digital systems
data analysis
control
Computer crime
composability
biblio
Evaluation of Performance for Big Data Security Using Advanced Cryptography Policy
Submitted by grigby1 on Fri, 11/18/2022 - 2:17pm
statistical analysis
Retail and Supply Chain
Privacy Preservation Technique
e-commerce
Advanced Cryptography Policy-ACP
Remote authentication
supply chain management
Data Security
Security Policies Analysis
pubcrawl
supply chains
Data Analytics
data analysis
data privacy
privacy
authentication
collaboration
policy-based governance
biblio
On the Impact of the Embedding Process on Network Resilience Quantification
Submitted by grigby1 on Tue, 09/20/2022 - 2:02pm
critical infrastructure
pubcrawl
Metrics
Topology
network topology
Extraterrestrial measurements
reliability theory
data analysis
scientific computing
Security Metrics
Computing Theory
graph embedding
Computational Topology
network resilience
Wasserstein Distance
WEGL
biblio
Scheduling Real Tim Security Aware Tasks in Fog Networks
Submitted by grigby1 on Fri, 09/16/2022 - 4:38pm
computer architecture
security
pubcrawl
resilience
Scalability
delays
Fog computing
real-time systems
Time factors
data analysis
Scheduling algorithms
Resiliency
biblio
A Computational Intelligent Analysis Scheme for Optimal Engine Behavior by Using Artificial Neural Network Learning Models and Harris Hawk Optimization
Submitted by grigby1 on Wed, 08/10/2022 - 2:45pm
Optimization methods
pubcrawl
Analytical models
Computational modeling
composability
Compositionality
Torque
Artificial Neural Networks
data analysis
learning (artificial intelligence)
computational intelligence
artificial neural network
Engine Modeling
Harris Hawks Optimization
intelligent data analysis
Nitrous Oxide Emissions
biblio
Similarity Analysis of Ransomware based on Portable Executable (PE) File Metadata
Submitted by aekwall on Thu, 07/14/2022 - 4:21pm
Support vector machines
Clustering algorithms
machine learning
feature extraction
Metrics
Resiliency
composability
Classification algorithms
Ransomware
data analysis
static analysis
metadata
pubcrawl
Forestry
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »