Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Adding Support for Theory in Open Science Big Data
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Predictive Analytics
Frameworks
functional data analysis
Human behavior
Human Factors
Mathematical model
Metrics
natural sciences computing
open science big data
Economic indicators
Principal differential analysis
Provenance
pubcrawl
Resiliency
storage management
theory
theory formation
Analytical models
data transfer
data storage
data sources
data provenance
data privacy
Data models
data fitting
data curation
data analysis
Compositionality
composability
citable reusable data
Biological system modeling
Big Data Analytics
Big Data
biblio
Data Provenance for Multi-Agent Models
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
distributed parallel computing
Resiliency
pubcrawl
Provenance
multi-agent systems
Metrics
Mathematical model
Human Factors
Human behavior
Adaptation models
data provenance
Data models
Computational modeling
Compositionality
composability
Biological system modeling
agent-based systems
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols
biblio
Design Framework for Reliable Multiple Autonomic Loops in Smart Environments
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
middleware
transactional middleware LINC
transactional execution mechanism
Switches
Smart Environments
sensors
self-adjusting systems
Scalability
Resiliency
reliable self-adaptive systems
reliable multiple autonomic loops
Reliability engineering
Reliability
reactive language Heptagon/BZR
pubcrawl
Multiple loops
abstraction framework PUTUTU
Metrics
Mathematical model
loops composition
loops adaptation
control systems
control engineering computing
building management systems
Building automation
Autonomic Security
automata-based controller
automata theory
adaptive systems
actuators
Abstraction Layer
biblio
Temperature-dependent demagnetization nonlinear Wiener model with neural network for PM synchronous machines in electric vehicle
Submitted by grigby1 on Mon, 12/04/2017 - 11:49am
neural nets
Temperature-dependent demagnetization nonlinear Wiener model
temperature compensation
temperature
synchronous motors
Resiliency
remanence
pubcrawl
power engineering computing
PMSM
PM synchronous machine
permanent magnet synchronous motor demagnetization
permanent magnet motors
permanent magnet flux
Nonlinear Wiener model
neural network
BP Neural Network
motor temperature
Mathematical model
Magnetic Remanence
Magnetic flux
intrinsic coercivity
Electric Vehicles
electric vehicle
Demagnetization
demagnetisation
Data models
Compositionality
composability
compensation
coercive force
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
biblio
Vulnerabilities in two-area Automatic Generation Control systems under cyberattack
Submitted by grigby1 on Mon, 11/27/2017 - 11:25am
Power Grid
two-area automatic generation control systems
security of data
security measures
security
Resiliency
pubcrawl
power system stability
power system control
power grids
power grid vulnerability analysis
AGC system
Metrics
Mathematical model
Generators
Gain control
cyberattack
cyber criminals
control engineering computing
composability
automatic generation control
biblio
Analysis of cascaded failures in power networks using maximum flow based complex network approach
Submitted by grigby1 on Mon, 11/27/2017 - 11:25am
maximum flow
Vulnerability
Resiliency
random spatial networks
pubcrawl
power transmission lines
power system security
power system reliability
power network
power grids
power grid vulnerability analysis
Metrics
Admittance
Mathematical model
Load modeling
largest connected component
IEEE 118 bus network
Generators
failure analysis
composability
complex networks
complex network
cascaded failure analysis
cascaded failure
biblio
Vulnerability analysis of power systems during the scheduled maintenance of network facilities
Submitted by grigby1 on Mon, 11/27/2017 - 11:24am
power system planning
Vulnerability Analysis
time-phased model
system operators
Smart Grids
single level MILP problem
scheduled network facilities maintenance
scheduled facility outages
Resiliency
Reliability
pubcrawl
power system vulnerability analysis
power system reliability
Analytical models
power grid vulnerability analysis
mixed-integer linear programming
Metrics
Mathematical model
maintenance engineering
Linear programming
Interdiction
integer programming
IEEE 24-bus RTS
IEEE 24-bus reliability test system
facility outage scheduling
composability
biblio
Tamper resistance evaluation of PUF in environmental variations
Submitted by grigby1 on Mon, 11/20/2017 - 11:27am
machine-learning attacks
Tamper resistance
Support vector machines
semiconductor devices
Resistance
Resiliency
resilience
pubcrawl
Predictive models
Physical Unclonable Function
Mathematical model
arbiter PUF
machine learning attacks
Immune system
environmental variation
delays
Data models
counterfeit semiconductor components
counterfeit goods
copy protection
composability
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »