Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
Automatic PTZ Camera Control Based on Deep-Q Network in Video Surveillance System
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
video surveillance system
video cameras
video analysis system
surveillance area
PTZ camera control values
PTZ camera
pan-tilt-zoom camera
DQN
deep-Q network
automatic PTZ camera control method
image sensors
image motion analysis
Resiliency
video surveillance
Streaming media
object detection
Cameras
video signal processing
Mathematical model
Training
Reinforcement learning
Metrics
pubcrawl
Human behavior
biblio
Two Methods for Authentication Using Variable Transmission Power Patterns
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
pattern locks
Human behavior
Scalability
Resiliency
Access Control
authentication
Communication system security
Hardware
Mathematical model
power control
pubcrawl
Relays
source authentication
variable power
wireless authentication
Wireless communication
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
SDN
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
Mathematical model
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
Adaptive immune system
layer immune inspired framework
Innate immune system
Immune system
human immune system
dynamic network threats
DoS mitigation
DoS flooding attacks
denial of service attack
data layer
control layer
computer network security
biologically inspired architecture
Biologically Inspired
bio-inspired framework
adaptive layer
biblio
A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Linear systems
zero vulnerability encrypted password
Vulnerability
security
Router Systems Security
router mechanism
Resiliency
resilience
pubcrawl
process control
Metrics
Mathematical model
Aerodynamics
internet
high-level security
encryption
Cryptography
convergence
control systems
computer network security
authorisation
authentication
Approximation error
biblio
Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
security mechanism
RFIDs
traditional RSA public key cryptography
storage space
RFID system
RFID information security technology
RFID information security
potential security hazard
hardware conditions
elliptic curve algorithms
elliptic curve algorithm
encryption
radiofrequency identification
Elliptic curves
Elliptic curve cryptography
security problem
public key cryptography
Mathematical model
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
Principles of Physical and Information Model Integration for Cybersecurity Provision to a Nuclear Power Plant
Submitted by grigby1 on Wed, 03/18/2020 - 11:50am
pubcrawl
Metrics
modelling
nuclear engineering computing
nuclear power plant
nuclear power stations
Numerical models
physical models
Policy-Governed Secure Collaboration
Mathematical model
resilience
Resiliency
risk management
Scalability
Science of Security
security of data
simulations
cybersecurity provision
collaboration
complex technical objects
composability
Computational modeling
computer security
cyber threats
Cybersecurity
cybersecurity problems
Adaptation models
cybersecurity risk assessment
Data models
Human behavior
hybrid model
information model integration
information properties
instrumentation and control system
biblio
Improving the Reliability and Security of Active Distribution Networks Using SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
distribution network
active distribution networks
MATLAB
power distribution economics
14-node SCADA-based active distribution network model
active electricity distribution network
active infrastructure
Active Network
arresters
circuit breakers
Voltage control
emerging network infrastructure
fault condition isolation
fault conditions
fuzzy logic toolbox
passive infrastructure
power fluctuations
reliability analysis
Simulink software
traditional electricity distribution system
power engineering computing
SCADA systems
Resiliency
Human behavior
pubcrawl
Reliability
Mathematical model
smart power grids
Fuzzy logic
Smart Grid
SCADA
power distribution faults
power distribution reliability
power system reliability
distributed power generation
SCADA Systems Security
Compositionality
Integrated circuit modeling
power system
biblio
One-Shot Malware Outbreak Detection Using Spatio-Temporal Isomorphic Dynamic Features
Submitted by grigby1 on Thu, 03/12/2020 - 12:03pm
invasive software
Training
spatio-temporal isomorphic dynamic features
scarce number
Scalability
Resiliency
resilience
one-shot malware outbreak detection
Mathematical model
malware
machine learning algorithm
learning (artificial intelligence)
signature based defense
Generative Adversarial Autoencoder
feature extraction
Dynamic Malware outbreak detection
dynamic malware detection
dynamic execution patterns
dynamic detection
deep learning
behavioural signature
Behavioural detection
Banking
pubcrawl
biblio
Model-Based Assessment for Balancing Privacy Requirements and Operational Capabilities in the Smart Grid
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
Resiliency
optimal balancing algorithm
policy-based governance
power generation protection
power system security
privacy
Privacy Requirements
privacy-aware data processing
privacy-aware data storage
pubcrawl
resilience
operational requirement
Scalability
security
Smart Grid
Smart Grid Privacy
Smart Grids
Smart Metering
smart power grids
University of Southern California
USC microgrid
Human behavior
billing
collaboration
common high-level use case
composability
data privacy
demand response
distributed power generation
forward mapping privacy
Heterogeneous systems
approximation theory
Human Factors
Load Curtailment
Mathematical model
merging
Metrics
model-based assessment
numeric approximation
Numerical models
operational capabilities
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »