Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Large-scale systems
biblio
Resilient control in large-scale networked cyber-physical systems: Guest editorial
Submitted by grigby1 on Thu, 04/21/2022 - 2:08pm
control systems
cyber-physical systems
Large-scale systems
multi-agent systems
Resiliency
sensors
Special issues and sections
Synchronization
biblio
Threat Comparison for Large-Scale Systems Using Different Browsers
Submitted by grigby1 on Mon, 01/31/2022 - 4:41pm
Web browser
threat analysis
service browser
Large-scale systems
service-oriented architecture
Web Browser Security
Compositionality
Browsers
complex networks
computer architecture
information system
Safety
Software
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Application of Cloud Modeling Technologies in Ensuring Cyber Security of APCS
Submitted by grigby1 on Thu, 09/09/2021 - 7:59am
information security
security
Resiliency
resilience
pubcrawl
process
model
Mathematical model
Large-scale systems
Algorithm
graph theory
Control Theory
Control System
Conference management
composability
automated
Analytical models
biblio
Early Combined Safety - Security Defense in Depth Assessment of Complex Systems
Submitted by grigby1 on Mon, 03/29/2021 - 12:27pm
Large-scale systems
Unified modeling language
traditional security research
tools
system engineer
system design life-cycle phases
security design weaknesses
security defenses
security attributes
security assessments
security
Scalability
Safety
Resiliency
resilience
pubcrawl
additional system complexity
interdisciplinary system dependencies
inter-system dependencies
Human behavior
expert systems
early conceptual design
early assessment
dependency model
defense in depth
critical infrastructures
concurrent safety
computer security
complex systems
complex system
complex critical infrastructures
combined Safety - Security Defense in Depth Assessment
biblio
Actuator Security Index for Structured Systems
Submitted by aekwall on Mon, 01/25/2021 - 11:51am
Human behavior
vulnerable actuators
structured systems
Sensor Systems
security
Resiliency
pubcrawl
power system security
Metrics
Linear systems
Large-scale systems
large scale energy systems
Indexes
actuator security
graph-theoretic conditions
generic security index
discrete-time LTI network systems
discrete time systems
directed subgraphs
directed graphs
control system security
composability
Barium
actuators
actuator security index
biblio
Intelligent Resource Scheduling at Scale: A Machine Learning Perspective
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
Resource Scheduling
performance-centric node classification
Policy Based Governance
Processor scheduling
pubcrawl
quality of service
resilience
Resiliency
resource allocation
resource management
nonfunctional constraints
Scalability
scheduling
server characteristics
Servers
straggler
straggler mitigation
Task Analysis
workload
Internet-scale Computing Security
Cloud Computing
cloud-scale
collaboration
composability
data centers
exhibited heterogeneity
Human behavior
Human Factors
intelligent resource scheduling
ad-hoc heuristics
Internet-scale systems
large-scale resource scheduling
Large-scale systems
learning (artificial intelligence)
machine learning
Metrics
ML
multidimensional resource requirements
biblio
Compositional Abstraction for Networks of Control Systems: A Dissipativity Approach
Submitted by grigby1 on Mon, 10/05/2020 - 1:01pm
linear control systems
Trajectory
Temporal Logic
system nonlinearities
Symmetric matrices
storage functions
simulation functions
pubcrawl
process control
nonlinear control systems
networks of control systems
matrix algebra
Matrices
linear temporal logic specification
Linear systems
Aerospace electronics
Large-scale systems
interconnection matrix
dissipativity-type properties
dissipativity-type compositional reasoning
dissipativity approach
dissipativity
controller design process
control system synthesis
control system networks
control nonlinearities
Compositionality
compositional scheme
compositional abstraction
Approximate abstractions
biblio
Toward a framework for assessing the cyber-worthiness of complex mission critical systems
Submitted by aekwall on Mon, 10/05/2020 - 10:46am
initial framework
threat models
threat modelling
threat actor
system safety engineering
SysML
strong level
security of data
security
risk management
Resiliency
resilience
pubcrawl
military systems
military computing
Large-scale systems
Accreditation
highly contested cyber environment
high level threat actors
embedded systems
cyber-worthiness
cyber-physical systems
cyber physical systems
cyber
CPS resilience
computer security
complex systems
complex mission critical systems
complex military systems
certification
assurance
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
pervasive augmented reality
virtual elements
ubiquitous computing
testing
security of data
security architecture
Scalability
resilience
pubcrawl
privacy architecture
privacy
pervasive large scale augmented reality games
pervasive computing
Application software
personal area networks
mobile computing
mobile augmented reality games
middleware architecture
middleware
Large-scale systems
information security
Human behavior
data privacy
computer games
computer architecture
augmented reality
1
2
3
next ›
last »