Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safety
biblio
Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST)
Submitted by grigby1 on Fri, 09/30/2022 - 9:30am
reliability theory
System Theory
STAMP S&s
STAMP
security incident
CAST
Accident Analysis
Resiliency
IEEE Sections
software quality
information theoretic security
software reliability
information security
Compositionality
composability
Scalability
Safety
Analytical models
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Latency Analysis of I/O Virtualization Techniques in Hypervisor-Based Real-Time Systems
Submitted by grigby1 on Thu, 09/29/2022 - 3:43pm
security
pubcrawl
Hardware
Safety
Scalability
delays
real-time systems
real time systems
Virtualization
Virtual machine monitors
Measurement
i-o systems security
hypervisor
I/O virtualization
latency analysis
response time analysis
biblio
A proposed methodology to use a Block-chain in Supply Chain Traceability
Submitted by grigby1 on Fri, 09/09/2022 - 3:05pm
Memory
traceability systems
supply chains
Supply Chain
Safety
Resiliency
resilience
pubcrawl
Production
supply chain security
food supply chain
food security
Food industry
Dairy products
critical success factors
business requirements
block-chain
biblio
Whole-chain supervision method of industrial product quality and safety based on knowledge graph
Submitted by grigby1 on Fri, 09/09/2022 - 3:01pm
quality assessment
supply chain risk assessment
quality and safety supervision
Product design
named entities recognition
knowledge graph
industrial products
BiLSTM-CRF
relation extraction
pubcrawl
Neo4j
Regulation
Production
Data models
Safety
Conferences
Metrics
biblio
Research on the Application of Internet of Things and Block Chain Technology in Improving Supply Chain Financial Risk Management
Submitted by grigby1 on Fri, 09/09/2022 - 2:59pm
Internet of Things
risk management
pubcrawl
Metrics
Safety
smart contracts
supply chains
finance
Internet of Things technology
blockchains
block chain technology
credit management risk
supply chain risk assessment
biblio
Information Security of Logistics Services
Submitted by grigby1 on Fri, 09/09/2022 - 2:36pm
supply chain risk assessment
Companies
Economics
information security
Logistics
Monitoring
pubcrawl
resilience
Resiliency
risk management
Safety
security
security management
supply chain security
supply chains
biblio
A Survey on Hypervisor-based Virtualization of Embedded Reconfigurable Systems
Submitted by aekwall on Fri, 08/26/2022 - 11:23am
embedded systems
Hardware
Reliability
real-time systems
Virtual machine monitors
virtual machine
pubcrawl
Metrics
Resiliency
composability
Safety
Market research
embedded
FPGA Virtualization
hypervisor
real-time
biblio
Security Verification Method of Embedded Operating System Semaphore Mechanism based on Coq
Submitted by aekwall on Fri, 08/26/2022 - 11:23am
Redundancy
Software Testing
semaphore
formal verification
embedded operating system
software security
usability
component
Safety
security
composability
Resiliency
Metrics
pubcrawl
operating systems
Software
embedded systems
biblio
Vulnerability of Controller Area Network to Schedule-Based Attacks
Submitted by aekwall on Fri, 08/26/2022 - 10:57am
Perturbation methods
real-time systems
pubcrawl
Resiliency
Internet of Things
Safety
controller area network
Schedules
controller area network security
cyber-physical systems
control systems
Synchronization
Bus off-Attack
Land vehicles
Schedule Based Attack
biblio
Autonomous Application in Requirements Analysis of Information System Development for Producing a Design Model
Submitted by grigby1 on Fri, 08/12/2022 - 1:25pm
Complexity theory
Swarm Intelligence
dynamic
telecommunication computing
key management
convolution neural network
Computing Theory
trust
Technological innovation
Trusted Computing
Organizations
network security
programming
composability
Safety
Resiliency
resilience
Human behavior
pubcrawl
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »