Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Cross-Layer Authentication based on Physical-Layer Signatures for Secure Vehicular Communication
Submitted by grigby1 on Tue, 05/30/2023 - 2:19pm
Cross Layer Security
Physical-Layer Signatures
Cross-Layer Authentication
communication security
Costs
Compositionality
composability
public key infrastructure
Wireless communication
pubcrawl
Computational modeling
Protocols
Cryptography
authentication
Heuristic algorithms
Resiliency
resilience
biblio
A Taxonomy of Security and Defense Mechanisms in Digital Twins-based Cyber-Physical Systems
Submitted by grigby1 on Fri, 05/19/2023 - 1:12pm
simulation
smart transportation
digital twin
social computing
emulation
CPS modeling
cyber-physical systems
Systematics
taxonomy
Internet of Things
composability
Computational modeling
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
security
biblio
Integrating Multiple HLA Federations for Effective Simulation-Based Evaluations of CPS
Submitted by grigby1 on Fri, 05/19/2023 - 1:11pm
Standards organizations
shared federations
high-level architecture
design automation
CPS modeling
distributed simulation
co-simulation
modeling and simulation
simulation
composability
computer architecture
Computational modeling
Conferences
Resiliency
resilience
Metrics
pubcrawl
cyber-physical systems
Organizations
biblio
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE
Submitted by grigby1 on Fri, 05/19/2023 - 1:05pm
Internet of Things
security
pubcrawl
policy-based governance
collaboration
Analytical models
Safety
Scalability
Data models
Computational modeling
CP-ABE
Costs
non-interactive verifiable computation
NPOT
biblio
A Cross-Domain Data Security Sharing Approach for Edge Computing based on CP-ABE
Submitted by grigby1 on Fri, 05/19/2023 - 1:05pm
Peer-to-peer computing
pubcrawl
policy-based governance
collaboration
Scalability
Data models
Access Control
Computational modeling
Data Security
edge computing
Time-frequency Analysis
Processor scheduling
CP-ABE
Ciphertext policy attribute-based encryption
cross-domain
data security sharing
biblio
A Pulsed Power Design Optimization Code for Magnetized Inertial Confinement Fusion Experiments at the National Ignition Facility
Submitted by grigby1 on Fri, 05/12/2023 - 9:24am
pubcrawl
Computational modeling
composability
resilience
Resiliency
Magnetic confinement
codes
ignition
Magnetohydrodynamics
Inertial confinement
Magnetohydrodynamic power generation
biblio
Resilience Assessment Method of Integrated Electricity and Gas System Based on Hetero-functional Graph Theory
Submitted by grigby1 on Fri, 05/12/2023 - 9:16am
Couplings
numerical analysis
line-pack.
integrated electricity and gas system
hetero-functional graph theory
Control Theory
Resiliency
Electrical Engineering
graph theory
pubcrawl
simulation
fault tolerance
Computational modeling
Scalability
resilience
Human Factors
Human behavior
biblio
Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks
Submitted by grigby1 on Fri, 04/28/2023 - 3:01pm
complex networks
Complex Worm Networks
Colleges and Universities
Application software
policy governance
Resiliency
Buffer overflows
computer network security
computer theory
computer networks
Compositionality
collaboration
composability
Computational modeling
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
feature extraction
biblio
A Game Theory based Attacker Defender Model for IDS in Cloud Security
Submitted by grigby1 on Fri, 04/28/2023 - 3:00pm
game theory
Whales
simulation
security
Resiliency
resilience
pubcrawl
policy governance
optimization
Neural networks
Metrics
Human behavior
IDS
estimation
Deep Neural Network
deep learning
computer theory
Computational modeling
Compositionality
composability
collaboration
cloud computing security
Cloud Computing
CICIDS-2018 dataset
biblio
Research on Network Confrontation Information Security Protection System under Computer Deep Learning
Submitted by grigby1 on Fri, 04/28/2023 - 2:59pm
Computational modeling
network confrontation
policy governance
computer
Resiliency
data science
object detection
computer theory
Compositionality
composability
Adaptation models
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
Training
deep learning
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »