Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Large-scale systems
biblio
Decision-Making in Complex Dynamical Systems of Systems With One Opposing Subsystem
Submitted by grigby1 on Fri, 07/24/2020 - 1:02pm
independent decision-making entities
Control Theory
unified team making team-based decisions
opposing subsystem
opposing attacked subsystem
noninferior Nash strategies
noncooperative game theory
Large-scale systems
interacting subsystems
security
decision-making process
cooperative game theory
complex systems
complex dynamical systems of systems
adversarial decision-making environment
game theory
Decision Making
pubcrawl
biblio
A gateway to easily integrate simulation platforms for co-simulation of cyber-physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
pubcrawl
Java
Large-scale systems
Libraries
Logic gates
Metrics
National Institute of Standards and Technology co-simulation platform
NIST co-simulation platform
Object oriented modeling
interacting physical components
Research Infrastructure
resilience
Resiliency
simulations
Software Architecture
standards
Universal CPS Environment
CPS modeling
high-level architecture standard
high level architecture
functional mock-up interface
distributed simulation
distributed processing
digital simulation
cyber-physical systems
CPS conceptual design
computer architecture
Computational modeling
composability
communication libraries
co-simulation expertise
co-simulation
simulation
biblio
The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
Risk-Metric
national CERT
original TTC
practical cyber security risk estimation
pubcrawl
resilience
Resiliency
risk management
Risk-Estimation
Metrics
Scalability
security of data
Security Risk Estimation
Security-Metric
Threat Landscape
time-to-compromise metric
vulnerability database
β-distribution
estimation
complex systems
Complexity theory
computer science
continuous attacker skill
CVSS vectors
cyber threat intelligence
Cyber-security
cybersecurity metrics
complex system modeling
Human behavior
Human Factors
individual systems
IT-security
Large-scale systems
mathematical shortcomings
Measurement
methodological shortcomings
biblio
The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
methodological shortcomings
β-distribution
vulnerability database
time-to-compromise metric
Threat Landscape
Security-Metric
security of data
Security Metrics
Risk-Metric
Risk-Estimation
risk management
pubcrawl
practical cyber security risk estimation
original TTC
national CERT
Metrics
complex system modeling
Measurement
mathematical shortcomings
Large-scale systems
IT-security
individual systems
estimation
cybersecurity metrics
Cyber-security
cyber threat intelligence
CVSS vectors
continuous attacker skill
computer science
Complexity theory
complex systems
biblio
Using k-nearest neighbor method to identify poison message failure
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
pubcrawl
unstable network
Toxicology
Telephony
telecommunications networks
telecommunication security
telecommunication network reliability
telecommunication network management
telecommunication computing
System testing
statistical distributions
Scalability
Routing
Resiliency
resilience
AI Poisoning
Protocols
Probability distribution
probabilistic k-nearest neighbor method
poison message failure identification
network fault management
machine learning
learning (artificial intelligence)
Large-scale systems
IP networks
Human behavior
Data mining
control systems
computer science
Computer bugs
biblio
Online Cruising Mile Reduction in Large-Scale Taxicab Networks
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
large-scale taxicab networks
weighting process
weighted cruising graph
vehicles
Urban areas
traffic engineering computing
Taxicab Network
taxicab industry
Shenzhen
scheduling
Roads
online cruising mile reduction
Broadcasting
Large-scale systems
graph theory
GPS dataset
Global Positioning System
distributed online scheduling
Dispatching
cruising system
Cruising Mile Reduction
Companies
Chinese city
1536086
biblio
Collaborative Anomaly Detection Framework for Handling Big Data of Cloud Computing
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Interquartile Range (IQR)
UNSW-NB15 dataset
ubiquitous computing
security of data
Scalability
Resiliency
pubcrawl
pay-per-use based services
network observations
Metrics
Large-scale systems
Big Data
Gaussian Mixture Model (GMM)
false positive rate
dynamic distributed architecture
detection rate
data privacy
Collaborative anomaly detection framework
cloud computing environments
Cloud Computing
CADF
big data security in the cloud
biblio
Case Studies from the Real World: The Importance of Measurement and Analysis in Building Better Systems
Submitted by grigby1 on Tue, 08/22/2017 - 11:31am
field studies
Human behavior
Large-scale systems
Measurement
Metrics
multiple fault diagnosis
pubcrawl
Reliability
Resiliency
biblio
Resilience: A holistic safety approach
Submitted by BrandonB on Wed, 05/06/2015 - 2:54pm
Personnel
Systematics
system safety
system risk reduction
System recovery
Safety
risk management
resilience
Reliability
Accidents
Organizations
Large-scale systems
holistic safety approach
high-risk industries
Hazards
emergency management
complex systems
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism
« first
‹ previous
1
2
3
next ›
last »