Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Estimation of Information System Security Using Hybrid Simulation in AnyLogic
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
Petri nets
Security Risk Estimation
perimeter protection
Object oriented modeling
information system security
hybrid simulation
discrete event simulation
deterministic and probabilistic model
context-role
Permission
security system analysis
business data processing
Human Factors
security of data
Information systems
Probabilistic logic
Mathematical model
optimisation
Data protection
optimization
Metrics
pubcrawl
Resiliency
information security
Scalability
biblio
Hybrid Method to Implement a Parallel Search of the Cryptosystem Keys
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
parallel search
GA environments
Generators
genetic algorithms
interconnected sequence parts
Interconnected sequences
LFSR
Mathematical model
parallel processing
GA
parallelism
pubcrawl
sequences recognition mechanism
successive cipher characters
theoretical cryptography
theoretical principles
three-level contributions
basic encryption key
final key sequence mechanism
DNA strands
DNA computing
DNA
cryptosystem keys
Cryptography
cryptanalysis
counter value
Compositionality
composability
Ciphers
character files
biocomputing
binary sequences
binary equations system
biblio
A Novel Sybil Attack Detection Mechanism for C-ITS
Submitted by grigby1 on Mon, 03/02/2020 - 12:37pm
resilience
vehicular ad hoc networks
vehicles security
V2V communications
Traffic Safety
traffic model
traffic flow theory
sybil attacks
Sybil attack
SUMO traffic simulator
roads portion
Roads
road vehicles
road traffic
road safety
Resiliency
Accidents
Public key
pubcrawl
Protocols
NS3 network simulator
Metrics
Mathematical model
ITS
Intelligent Transportation Systems
driving experience
detection algorithm
cooperative intelligent transport systems
computer network security
Computational modeling
composability
C-ITS
biblio
Self-Secured Control with Anomaly Detection and Recovery in Automotive Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
learning (artificial intelligence)
System recovery
sensors
self-secured control
security of data
security
Resiliency
resilience
recovery estimation error
pubcrawl
neural nets
Mathematical model
machine learning models
machine learning
Anomaly Detection
generative adversarial networks
electric vehicle
cyber-physical systems
CPS
control loop behavior
control engineering computing
computer architecture
battery management system
battery
batteries
Automotive engineering
Automotive cyber-physical systems
automotive controllers
biblio
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach
Submitted by aekwall on Mon, 02/24/2020 - 9:57am
smart contracts
Repudiation
verifying party
vehicular networks
VANETs
trustworthy nodes
trusted centralized party
smart contract-based approach
reputable trusted node
IPFS
greedy authenticated nodes
computed reputation rating
reputation
MatLab simulation
File systems
digital signatures
traffic engineering computing
trust
Mathematical model
blockchain
Metrics
Peer-to-peer computing
Protocols
composability
pubcrawl
Human behavior
Resiliency
Trusted Computing
security
data integrity
data privacy
biblio
Modeling and Simulation of Magnetizing Inrush Current in A Single-Phase Transformer
Submitted by aekwall on Mon, 02/24/2020 - 9:55am
magnetizing inrush current
transient simulation studies
transformer modeling
transformer model
Transformer cores
Surges
Resiliency
remanent flux
remanence
pubcrawl
nonlinear ferromagnetic behavior
Mathematical model
Circuit faults
Magnetization
magnetic hysteresis
Magnetic flux
Magnetic cores
Jiles-Atherton hysteresis model
iron core
ferromagnetic materials
equivalent electrical circuit
core type single-phase transformer
Compositionality
biblio
Improvement of a Current Transformer Model based on the Jiles-Atherton Theory
Submitted by aekwall on Mon, 02/24/2020 - 9:54am
DIgSILENT software
Transformer cores
saturation characteristics
saturation
remanence characteristics
PSCAD-EMTDC
power system CAD
magnetic material
Jiles-Atherton theory
Jiles-Atheron theory
hysteresis characteristics
hysteresis
Fault currents
Resiliency
current transformers
current transformer model
Current transformer (CT)
CT core
Circuit faults
Magnetic cores
Numerical models
magnetic hysteresis
remanence
Compositionality
Mathematical model
pubcrawl
biblio
Enforcing Optimal Moving Target Defense Policies
Submitted by grigby1 on Tue, 02/18/2020 - 11:06am
MDP model
value iteration
security
Scalability
Resiliency
resilience
pubcrawl
optimal security policies
optimal policy selection
optimal moving target defense policies
moving target defense
Metrics
Analytical models
Mathematical model
Markov processes
Markov Decision Process
Markov Decision
Iterative methods
Games
Decision Making
Control Theory
computer science
Bellman optimality equation
biblio
Discovery of Society Structure in A Social Network Using Distributed Cache Memory
Submitted by grigby1 on Tue, 02/18/2020 - 10:56am
optimization
Web Caching
Sparks
SPARK tools
Spark
society structure
social networking (online)
social network
social media
Scalability
Resiliency
resilience
process nodes
Cache memory
Metrics
Mathematical model
mapping-reduction model
distributed memory systems
distributed cache memory
computational nodes
Computational modeling
community structure detection
community detection
Clustering algorithms
pubcrawl
cache storage
biblio
Efficient Estimation of Read Density When Caching for Big Data Processing
Submitted by grigby1 on Tue, 02/18/2020 - 10:55am
resilience
hit rate
Human behavior
MapReduce deployment
Mathematical model
Metrics
parallel processing
policy-based technique
read density
Histograms
Resiliency
runtime-space efficient computation
Scalability
Spark deployment
trace-based simulation
traditional database
Web Caching
workload traces representative
caching policy
approximate histogram
arrays
Big Data
big data processing systems
big data workloads
cache policy
cache storage
cached objects
pubcrawl
Cloud Computing
cloud workloads
Conferences
data handling
Data models
database management systems
distributed systems
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »