Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Laboratories
biblio
Analyzing Initial Design Theory Components for Developing Information Security Laboratories
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
Cryptography
infosec lab
design Theory
action design research
policy governance
Resiliency
computer theory
Laboratories
Compositionality
composability
Training
privacy
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
biblio
An asynchronous distributed-memory optimization solver for two-stage stochastic programming problems
Submitted by grigby1 on Thu, 10/20/2022 - 3:37pm
search problems
pubcrawl
resilience
optimization
Scalability
Stochastic processes
programming
power grids
Laboratories
Approximation algorithms
Supercomputers
Stochastic Computing Security
Resiliency
parallelization
SCACOPF
biblio
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
Submitted by grigby1 on Fri, 08/12/2022 - 4:34pm
cyber-physical system
energy measurement
Europe
False-Data-Injection
Laboratories
man-in-the-middle attack
network topology
performance evaluation
process control
Smart Grid Cyber Security
command injection attacks
pubcrawl
composability
Resiliency
Metrics
Smart Grids
biblio
Cloud-based Labs and Programming Assignments in Networking and Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 2:02pm
learning activities
teaching
Servers
Security Programming
security of data
public cloud
pubcrawl
Programming profession
programming languages
programming assignments
program testing
program debugging
private cloud
privacy
networking course
Network Programming
Cloud Computing
Laboratories
innovative design
innovate practice
Hands-On Laboratory
educational courses
education
cybersecurity education
cybersecurity course
cyber physical systems
course learning objectives
computer security
computer science education
computer aided instruction
cloud-based labs
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
Learning Agile with Intelligent Conversational Agents
Submitted by grigby1 on Thu, 07/16/2020 - 12:32pm
Planning
knowledge creation
Laboratories
learning analysis
learning analytics
Metrics
multi-agent systems
Multimedia systems
organizational environments
internet
pubcrawl
Scalability
Software
software engineering
software engineering industry
teaching
traditional teaching-learning instruments
Training
educational courses
academic SE curriculum
agile adoption
Agile Scrum training
assistive web-based conversational service
computer aided instruction
computer science education
conversational agent
conversational agents
academic fields
educational design
educational effectiveness
educative background
further education
higher education
Human behavior
intelligent conversational agents
biblio
Machine Learning and Social Media to Mine and Disseminate Big Scientific Data
Submitted by grigby1 on Fri, 05/22/2020 - 2:43pm
social media
ORNL
pubcrawl
query processing
relational databases
resilience
Resiliency
Scalability
scientific data mining
scientific databases
Oak Ridge National Laboratory
social media interaction
social networking (online)
SQL
SQL language
SQL queries
stream pipelining
structured databases
Structured Query Language
Twitter
Databases
big scientific data
Data discovery
data dissemination
Data mining
data retrieval
data streams
data-intensive projects
Database languages
database queries
atmospheric radiation measurement data center
easy search
environmental data centers
Human behavior
information dissemination
Laboratories
learning (artificial intelligence)
machine learning
machine learning framework
natural language processing
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Designing Secure and Resilient Embedded Avionics Systems
Submitted by aekwall on Wed, 05/01/2019 - 12:41pm
Program processors
unmanned aerial systems
UAS
security principles
security of data
security
safety oriented principles
Safety
resilient embedded avionics systems
Resiliency
real-time systems
pubcrawl
aerospace computing
Metrics
Laboratories
embedded systems
cyber security principles
cyber resources
computer architecture
composability
avionics domains
avionics community
avionics
Aerospace electronics
biblio
Using computational game theory to guide verification and security in hardware designs
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Metrics
complex designs
composability
computational game theory
Computational modeling
Data protection
defender strategy
design network structure
embedded systems
formal methods
game theory
Games
Hardware
hardware validation
Hardware verification
Laboratories
verification costs
open-source synthesized hardware designs
optimal security deployment strategy
pubcrawl
Reliability
reliability threats
Resiliency
resource allocation
Safety
safety properties
security
security of data
Security Properties
Stackelberg security games model
system state space
valuable verification resource allocation
1
2
next ›
last »