Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
National security
biblio
A DevSecOps-enabled Framework for Risk Management of Critical Infrastructures
Submitted by aekwall on Fri, 01/13/2023 - 2:57pm
Human Factors
software reliability
pubcrawl
Scalability
Metrics
Resiliency
risk management
software engineering
critical infrastructure
Economics
Hardware Robustness Safety critical systems
National security
Software and its engineering-Software creation and management-Software development process management Risk management
Security Risk Management
biblio
Research on Network Attack Information Acquisition and Monitoring Method based on Artificial Intelligence
Submitted by grigby1 on Fri, 12/09/2022 - 4:55pm
monitoring method
security situational awareness
Resiliency
resilience
pubcrawl
Predictive Metrics
Personnel
network security
network attack
National security
Artificial Intelligence
Metrics
Market research
IP networks
information acquisition
Human behavior
Cyberspace
composability
artificial intelligence security
biblio
America's Supply Chains
Submitted by willirn1 on Tue, 10/26/2021 - 2:27pm
Executive Order
supply chains
C3E
National security
cyber-attacks
critical infrastructure
manufacturing
biblio
An Investigation of High-Throughput Biometric Systems: Results of the 2018 Department of Homeland Security Biometric Technology Rally
Submitted by grigby1 on Wed, 11/04/2020 - 12:34pm
Metrics
user satisfaction metrics
US government
unmanned face
unmanned biometric systems
U.S. Department
traveler identification
Throughput
testing
Terrorism
security of data
Science and Technology Directorate
pubcrawl
National security
metrics testing
2018 Biometric Technology Rally
Measurement
measured throughput
measured performance
MdTF
matching capability
Maryland Test Facility
Iris recognition
homeland security biometric technology rally
high-throughput security environment
high-throughput biometric systems
face-iris systems
Face
DHS S-T affiliated bio-metrics
capture capability
biblio
A Cyber-Physical Interaction Model Based Impact Assessment of Cyberattacks for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 10:45am
Acceleration
IoV protection
IoV cyberattacks
intelligence traffic systems
impact assessment
economy development
cyberphysical interaction
cyber layer
attack impact
cyber physical systems
Internet of Vehicles
ITS
Intelligent Transportation Systems
National security
security of data
Human Factors
Physical layer
Mathematical model
Cybersecurity
Analytical models
Metrics
Roads
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Internet of Things
Computer crime
biblio
Countering Cybersecurity and Counterfeit Material Threats in Test Systems
Submitted by aekwall on Mon, 09/28/2020 - 10:35am
mission critical electronics
AS5553
ATE system
ATEasy
commercial-off-the-shelf instrumentation
cybersecurity issue
LXI
military products
missile assemblies
aerospace products
secure software-based system
Security Technical Implementation Guide (STIG)
test development environment
test parameters
test sequences
TPS
undetected data breach
UUT
electronic warfare
data integrity
invasive software
Resiliency
pubcrawl
composability
Cybersecurity
program testing
Automated Secure Software Engineering
Data Security
ATE
automatic test equipment
malware
National security
automatic test software
automatic test systems
AD9100D
biblio
Detection of False Data Injection Attacks in Cyber-Physical Systems using Dynamic Invariants
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
Power system dynamics
Kalman filters
learning (artificial intelligence)
Meters
Metrics
National security
power engineering computing
Power measurement
power system
Kalman filter
power system security
pubcrawl
Resiliency
robust estimation
Scalability
security of data
state estimation
traditional anomaly detection approaches
data-driven temporal causal relationships
adaptive filtering
adaptive robust thresholding
Anomaly Detection
bad data detection
Bayesian filtering
complex cyber-physical systems
cyber-physical systems
data-driven functional relationships
False Data Detection
dynamic invariant network
false data injection attack detection
false data injection attacks
G-KART
Granger causality based Kalman filter
graph theory
invariant graph
Jacobian matrices
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 9:18am
Europe
Damage Assessment
protection of critical infrastructure
intergovernmental national views
informational space
information environment
cyber environment
critical infrastructure security
common cyberspace
air gap
critical information infrastructure
security
National security
Cyberspace
computer security
pubcrawl
Resiliency
information security
critical infrastructures
critical infrastructure
security of data
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by aekwall on Mon, 07/06/2020 - 9:18am
automated damage assessment
Damage Assessment
sUAS
small unmanned aircraft systems
post-disaster response
optical radar
online mapping technique
natural disasters
lidar
Laser radar
Infrastructure Inspection
Homeland Security
Inspection
—sUAS
disasters
Aircraft
Bridges
National security
autonomous aerial vehicles
Three-dimensional displays
Cameras
pubcrawl
Resiliency
critical infrastructure
biblio
Model of optimization of arrangement of video surveillance means with regard to ensuring their own security
Submitted by aekwall on Mon, 04/13/2020 - 9:28am
nonlinear Boolean programming
video surveillance system
video surveillance equipment
video surveillance arrangement
video surveillance
security of video surveillance means
security
Safety
safe city
Resiliency
pubcrawl
nonlinear programming
arrangement optimization
National security
Metrics
illegal actions
Human behavior
damage minimization
crime prevention
crime detection
continuous visual monitoring
closed circuit television
Boolean functions
1
2
3
next ›
last »