Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Redundancy Cyber Resiliency Technique Based on Fast ReRouting under Security Metric
Submitted by grigby1 on Thu, 09/16/2021 - 11:50am
Bandwidth
cyber resilience
Fast ReRoute
Linear programming
Mathematical model
Measurement
Numerical models
probability
Probability of Compromise
pubcrawl
Redundancy
resilience
Resiliency
security metric
biblio
Use of ADAR Method and Theory of Optimal Control for Engineering Systems Optimal Control
Submitted by grigby1 on Thu, 09/09/2021 - 9:01am
Mathematical model
Transient analysis
synergetic control theory
security
Resiliency
resilience
pubcrawl
optimal control
nonlinear control systems
ADAR method
Manifolds
Control Theory
control synthesis
composability
closed loop systems
Asymptotic stability
ADOR method
biblio
Application of Cloud Modeling Technologies in Ensuring Cyber Security of APCS
Submitted by grigby1 on Thu, 09/09/2021 - 8:59am
information security
security
Resiliency
resilience
pubcrawl
process
model
Mathematical model
Large-scale systems
Algorithm
graph theory
Control Theory
Control System
Conference management
composability
automated
Analytical models
biblio
A Novel Key Generation Approach Based on Facial Image Features for Stream Cipher System
Submitted by grigby1 on Tue, 08/31/2021 - 12:09pm
Pseudo random number
Streaming media
stream cipher system
secret key generation
Scalability
Resiliency
resilience
random key generation
pubcrawl
Ciphers
Metrics
Mathematical model
linear feedback shift register
Human behavior
Generators
feature extraction
encryption
biblio
Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication
Submitted by grigby1 on Tue, 08/17/2021 - 4:18pm
Anomaly Detection
authentication
behavioural biometrics
Context modeling
Contextual Authentication
Data models
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Mathematical model
Metrics
password
pubcrawl
Urban areas
user authentication
biblio
TS2FA: Trilateration System Two Factor Authentication
Submitted by grigby1 on Thu, 07/08/2021 - 3:37pm
pubcrawl
Wireless fidelity
two-factor authentication
two factor authentication
TS2FA
Trilateration System
Servers
RSSI
QR
ambient access points
password
OTP
NFC
Mobile handsets
Mathematical model
Human Factors
Human behavior
authentication
biblio
Analysis of the Design of Digital Video Security Monitoring System Based on Bee Population Optimization Algorithm
Submitted by aekwall on Wed, 07/07/2021 - 4:55pm
Mathematical model
Analytical models
Bee swarm algorithm
Couplings
optimization
Sociology
Statistics
surveillance system
Video Security
video surveillance
pubcrawl
Metrics
Resiliency
Human behavior
biblio
Real-time False Data Injection Attack Detection in Connected Vehicle Systems with PDE modeling
Submitted by grigby1 on Wed, 06/30/2021 - 3:22pm
Ghost Vehicle
vehicle dynamics
Resiliency
resilience
pubcrawl
Perturbation methods
partial differential equation
Observers
Mathematical model
Human Factors
Human behavior
Acceleration
false data injection attack
False Data Detection
estimation
detection
Data models
cyber physical systems
connected vehicles
composability
Communication networks
biblio
A Fuzzy AHP Approach for Ranking Security Attributes in Fog-IoT Environment
Submitted by aekwall on Mon, 06/28/2021 - 12:35pm
Fog computing
security
Cloud Computing
edge computing
Fog Computing and Security
Fog-IoT Security
fuzzy analytical hierarchy process
Internet of Things
Linguistics
Mathematical model
Multi Criteria Decision Making
pubcrawl
Resiliency
Scalability
smart devices
biblio
Deep Learning-Based False Sensor Data Detection for Battery Energy Storage Systems
Submitted by aekwall on Mon, 06/28/2021 - 12:32pm
convolutional neural network
false trust
sensor data fault
false data inject attack
Battery energy storage systems
state of charge
Circuit faults
convolution
Mathematical model
Scalability
Computational modeling
batteries
deep learning
policy-based governance
pubcrawl
Resiliency
Data models
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »