Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safety
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
pubcrawl
tactical risk
Software Vulnerability
software fault tolerance
Servers
security of data
security
Safety
risk management
risk analysis
resource management
Resiliency
resilience
random system faults
CPS resilience
optimal cyber defense remediation
operational technology
Operational Resilience
operational impact assessment
information technology
graph theory
fault graph-based model
Erbium
data-driven attack graph
Damage Assessment
cyber-physical systems
cyber threats
cyber physical systems
biblio
Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
logic linguistic models
vital physical system
Ukrainian CEI
security of data
Safety
risk management
Resiliency
resilience capacities
resilience assurance
resilience
pubcrawl
multilevel fuzzy logic models
logic-linguistic models
Accidents
Linguistics
fuzzy set theory
fuzzy logic-based approach
Fuzzy logic
external hostile influences
Damage Assessment
cyber resilience
cyber incidents
critical infrastructures
critical energy infrastructure
Computer crime
CEI cyber resilience assessment
biblio
Investigating Attack Propagation in a SoS via a Service Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
Safety
systems of systems
system of systems
system decomposition
SoS structure
SoS risk assessment
SoS development life cycle
SoS design
service-guarantees
service levels
service decomposition
Service
sensors
security of data
security
attack propagation
risk management
pubcrawl
Metrics
malicious adversaries
independent systems
decomposition
cyber physical systems
connected systems
Compositionality
Complexity theory
communication as a service
autonomous vehicles
autonomous quarry
attack propagation problem
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Constructing a Digital Signature Algorithm Based on the Difficulty of Some Expanded Root Problems
Submitted by aekwall on Mon, 06/22/2020 - 11:24am
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
computer science
digital signature
digital signature algorithm
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
biblio
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Submitted by grigby1 on Thu, 06/04/2020 - 11:47am
SPS threats
Safety
safety risk assessment
security
security risk assessment
Servers
social aspects of automation
Social Virtual Reality
Solid modeling
risk management
three-dimensional immersive computer experience
trees (mathematics)
user experience
virtual reality
virtual reality learning environment
VR technology
VRLE system
vSocial VRLE
immersive systems
attack tree
attack tree formalism
composability
computer based training
cyber physical systems
data privacy
educational user experience
Human Factors
adhoc attack tree
IoT Application Testbed
privacy
Privacy Control
privacy-preservation
pubcrawl
real-time systems
resilience
Resiliency
biblio
Using Statistical Methods and Co-Simulation to Evaluate ADS-Equipped Vehicle Trustworthiness
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
safety metrics
NIST
NIST framework
OpenModelica
policy-based governance
pubcrawl
resilience
Resiliency
Ricardo IGNITE
Safety
multiple simulation platforms
security of data
sensors
simulated operational domain design
system reliability
tools
UCEF
vehicle dynamics simulators
virtual analysis functions
virtual reality
cyber-physical systems
composability
Acceleration
ADS-equipped vehicle trustworthiness
ADS-equipped vehicles
application program interfaces
automated driving system-equipped vehicles
co-simulation
complex cyber-physical systems
Computational modeling
trustworthiness
driver information systems
FMI
fractional factorial design
functional mock-up interface
internet
Measurement
middleware
middleware security
biblio
Research on Computer Network Security Evaluation Method Based on Levenberg-Marquardt Algorithms
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
Metrics
Neural Network Security
training process
local minimum point
LM-BP algorithm
Levenberg-Marquardt algorithms
evaluation
computer network security evaluation method
computer networks
BP Neural Network
Backpropagation
Training
neural nets
Communication networks
Safety
Indexes
computer network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
biblio
Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
industrial control system
Safety
Resiliency
pubcrawl
Protocols
production engineering computing
Predictive Metrics
power systems
power industry control system intrusion
Networked Control Systems Security
network invasion
network intrusion
Control Theory
industrial control network space security
industrial control
control systems
control engineering computing
computer network security
composability
Business
behavior characteristics analysis
attack model
attack behavior analysis
security
biblio
Safety and Security Architecture Analyses Framework for the Internet of Things of Medical Devices
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
medical computing
security architecture analysis framework
security analysis approach
safety and security
safety analysis framework
IoT architectures
health care sensors
architecture analyses
Network Security Architecture
medical devices
medical data
Safety
health care
Smart homes
Analytical models
pubcrawl
Resiliency
computer architecture
security
Internet of Things
Medical services
security of data
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »