Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Detection of protection-impacting changes during software evolution
Submitted by aekwall on Mon, 03/04/2019 - 9:49am
Role Based Access Control
WordPress
web applications
static analysis
source code changes
source code (software)
software maintenance
software evolution
Software
security vulnerabilities
security regression
Security Impact of Changes
role-based access control
Access Control
Resiliency
RBAC security
pubcrawl
protection-impacting changes
negative security changes
Mathematical model
maintenance engineering
Image edge detection
composability
Automated Secure Software Engineering
authorisation
application security
biblio
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
Attack vectors
Workstations
Vectors
systems-based indicators
systems approach
network theory (graphs)
network security breaches
network intrusion
multiple diverse modalities
mathematical tool
IOC
indicators of compromise
complex networks
complex network intrusion
computer network security
Applied Mathematics
attribution
Mathematical model
tools
Metrics
graph theory
composability
pubcrawl
Human behavior
malware
IP networks
human-in-the-loop security center paradigm
biblio
RISK ASSESSMENT IN PHARMACEUTICAL SUPPLY CHAINS UNDER UNKNOWN INPUT-MODEL PARAMETERS
Submitted by aekwall on Mon, 02/25/2019 - 10:43am
Bayes methods
pubcrawl
Metrics
supply chains
Mathematical model
Pharmaceuticals
Stochastic processes
uncertainty
Supply Chain Risk Assesment
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
biblio
Mathematical Models of Acoustic Wave Scattering by a Finite Flat Impedance Strip Grating
Submitted by grigby1 on Wed, 01/16/2019 - 1:28pm
boundary-value problems
two-dimensional boundary-value problem
Strips
Scattering
narrow impedance strips
mathematical models
integral equations
integral equation
Gratings
finite flat impedance strip grating
explicit asymptotic solution
electromagnetic wave scattering
diffraction gratings
coupled integral equations
pubcrawl
asymptotic solution
acoustic waves
acoustic wave scattering
acoustic wave
acoustic plane wave scattering
Impedance
Kernel
acoustic coupling
Mathematical model
Scalability
Resiliency
Human behavior
biblio
A trust model based on evidence-based subjective logic for securing wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:06pm
resilience
WMN
wireless mesh networks
Wireless Mesh Network Security
watchdog detection mechanism
uncertainty
telecommunication security
telecommunication network routing
telecommunication network management
security threats
security
secure route discovery
Bayes methods
recommendation trust information model
pubcrawl
Metrics
Mathematical model
gray-hole attacks
evidence-based subjective logic
Entropy
EBSL
Computational modeling
composability
black-hole attacks
biblio
Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Submitted by grigby1 on Mon, 12/10/2018 - 10:42am
Mathematical model
work factor metrics
Unroll Factor
Trojan horses
third party IP cores
Space exploration
semiconductor industry
secure IC design process
Scalability
resource allocation
Resiliency
resilience
pubcrawl
power metrics
power consumption
microprocessor chips
adders
latency metrics
invasive software
integrated circuits
integrated circuit design
integrated chip design
high level synthesis
hardware Trojan detection
hardware trojan
Hardware
design-for-trust techniques
design space exploration process
Design Space Exploration
datapath resource allocation
cuckoo search algorithm
Benchmark testing
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
biblio
Diagnostics and Assessment of the Industrial Network Security Expert System
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
LPτ-sequence
Vulnerability
Software
security
Scalability
Resiliency
resilience
pubcrawl
nodal points
network security
Monte Carlo numerical method
Monte Carlo methods
Mathematical model
Markov processes
markov chain
manufacturing
Algorithm design and analysis
information security
Industrial Safety
industrial network virtual model
industrial network security expert system
Industrial engineering
Human behavior
expert systems
expert assessment
diagnostic system
diagnostic assessment
cyber-attacks sets
cyber-attacks classification
cyber-attack
computer network security
classification
biblio
Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling
Submitted by grigby1 on Wed, 11/14/2018 - 12:19pm
Mathematical model
topic modeling
system specific cybersecurity attack patterns
system
statistical distributions
security of data
security
Scalability
ranking method
pubcrawl
privacy
posterior distribution
pattern classification
natural language processing
attack topic distribution
KL divergence
Human Factors
expert systems
Databases
Data models
cybersecurity expert
cyber-physical systems
computer security
common attack pattern enumeration and classification database
common attack pattern enumeration
CAPEC database
capec
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »