Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Cross-Layer Codesign for Secure Cyber-Physical Systems
Submitted by el_wehby on Fri, 05/25/2018 - 4:22pm
cyber-physical system security
sensors
security of data
security attacks
security
schedulability
resource-constrained cyber-physical systems
functional layer technique
cybersecurity techniques
cyber-physical systems
automotive domain
Cryptography
cross-layer codesign framework
cross-layer
control-theoretic methods
control systems
control performance
Computational modeling
Codesign
Automotive engineering
1553757
biblio
Robust taxi dispatch under model uncertainties
Submitted by el_wehby on Fri, 05/25/2018 - 3:48pm
optimization
uncertainty
uncertain demand parameters
Transportation
taxi networks
Robustness
robust taxi dispatch
robust optimization method
Public transportation
polytope model uncertainties
Cities and towns
Monte-Carlo simulations
Monte Carlo methods
model uncertainties
minimax theorem
minimax techniques
Dispatching
demand and supply models
computational tractability
Computational modeling
1536086
biblio
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
Data mining
security of data
Resiliency
resilience
pubcrawl
Proof-of-work
power grid vulnerability analysis
power grid system
pool reward mechanisms
pool mining
Peer-to-peer computing
Metrics
distributed ledger
Distributed databases
data provenance
block mining
data integrity
Cryptography
Computational modeling
Compositionality
composability
cloud computing services
Cloud Computing
BWH attack
blockchain security and vulnerability
blockchain security
blockchain cloud
blockchain
block withholding attack
block withholding
biblio
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
formal verification
secure messaging
pubcrawl
ProVerif
protocol verification
ProScript protocol code
privacy
policy-based collaboration
Policy
JavaScript programs
Java
Analytical models
end-to end secure messaging protocols
Domain-Specific Language
CryptoVerif proof
Cryptography
Cryptographic Protocols
cryptographic protocol code
Computer bugs
Computational modeling
Compositionality
automated verification
biblio
A Computational Model for Improving the Accuracy of Multi-Criteria Recommender Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:10pm
Measurement
user modelling
user modeling technique
single rating collaborative filtering technique
similarity
Scalability
Resiliency
resilience
recommender systems
pubcrawl
Predictive models
neural nets
multicriteria recommender systems
multicriteria recommendations
Multi-criteria recommendation
modeling approaches
Adaptation models
Human Factors
Human behavior
highly distributed self-organizing structures
criteria ratings
Computational modeling
computational model
collaborative filtering
collaboration
biologically inspired algorithms
biological neurons
Biological neural networks
average similarity techniques
Artificial Neural Networks
aggregation function approach
adaptive self-organizing structures
biblio
A dynamic search space approach to improving learning on a simulated Flapping Wing Micro Air Vehicle
Submitted by el_wehby on Thu, 05/17/2018 - 6:51pm
FW-MAV
wing flapping patterns
Table lookup
simulated insect-like flapping-wing microair vehicle
search problems
restriction/access control methods
physical damage
Oscillators
microrobots
meta-heuristic search support
learning (artificial intelligence)
learning
gait analysis
FW-MAV wing gaits
acquisition time
frequency control
Force
flight behavior
evolutionary computation
Evolutionary algorithms
EA search
dynamic search space approach
Computational modeling
candidate solution representations
autonomous aerial vehicles
Atmospheric modeling
aerospace simulation
aerospace components
1239196
biblio
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
provable data possession
Metrics
non-repudiation
nonrepudiable PDP scheme
nonrepudiable provable data possession scheme
nonrepudiation issue
outsourced data
private auditability
private verifier
human factor
pubcrawl
Repudiation
resilience
Resiliency
security
Servers
storage management
associated tags
Human behavior
DV-PDP schemes
digital signatures
designated verifier
Data models
Data mining
data integrity
concrete DV-NRPDP scheme
Computational modeling
composability
cloud storage systems
cloud storage server
cloud storage
Cloud Computing
Cascading style sheets
biblio
Using model-based simulation for augmenting Incident Command System for disaster response
Submitted by el_wehby on Tue, 05/15/2018 - 11:56pm
incident command system
sensor data
resource management
recovery operations
Planning
organizational model
national incident management system
model-based simulation
Integrated circuit modeling
information integration agent
Adaptation models
Hazardous materials
emergency services
emergency management
disaster response management
Decision support systems
decision makers
Crisis Management
Computational modeling
communications management
1528550
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
Parameter tuning in modeling and simulations by using swarm intelligence optimization algorithms
Submitted by K_Hooper on Wed, 05/02/2018 - 10:37am
Biological system modeling
composability
Computational modeling
Firefly algorithms
Mathematical model
modeling and simulation
optimization
parameter tuning
particle swarm optimization
Predator prey systems
pubcrawl
Swarm Intelligence
Swarm Intelligence Optimization Algorithms
tuning
« first
‹ previous
…
57
58
59
60
61
62
63
64
65
…
next ›
last »