Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Attribution in Scale and Space
Submitted by aekwall on Thu, 05/13/2021 - 10:48am
Medical services
Task Analysis
Kernel
Human behavior
pubcrawl
composability
Google
Metrics
Mathematical model
attribution
Two dimensional displays
Perturbation methods
biblio
A Feature Compression Technique for Anomaly Detection Using Convolutional Neural Networks
Submitted by aekwall on Thu, 05/13/2021 - 10:32am
convolutional neural networks
Training
security
pubcrawl
network security
Mathematical model
deep learning
Data models
cyber physical systems
Neural Network Security
component
Artificial Neural Networks
Anomaly Detection
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Scalable, Physical Effects Measurable Microgrid for Cyber Resilience Analysis (SPEMMCRA)
Submitted by grigby1 on Wed, 05/05/2021 - 11:21am
Inverters
Scalable Security
scalable Microgrid
Scalability
resilience
pubcrawl
Microgrids
Mathematical model
Load modeling
Resiliency
industrial control system
industrial control
cyber-physical system
control systems
composability
automated security
Automated Response Action
biblio
Lightweight Verification and Fine-grained Access Control in Named Data Networking Based on Schnorr Signature and Hash Functions
Submitted by aekwall on Mon, 05/03/2021 - 12:15pm
encryption
Access Control
Resiliency
pubcrawl
internet
Mathematical model
authentication
Public key
verification
Scalability
NDN
Predictive Metrics
Compositionality
Schnorr signature
Hash functions
scalable verification
biblio
The Role of Combinatorial Mathematical Optimization and Heuristics to improve Small Farmers to Veterinarian access and to create a Sustainable Food Future for the World
Submitted by aekwall on Tue, 04/27/2021 - 12:34pm
Agriculture
Z3
Solvers
Pyomo
mathematical formulation
IoT device
Hanumayamma
GLPK
edge
CPLEX
Cow Necklace
CBC
Scalability
predictability
Security Heuristics
Linear programming
Artificial Intelligence
Unified modeling language
Mathematical model
optimization
pubcrawl
Resiliency
security
biblio
Analysis of Content Availability at Network Failure in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:28pm
computer network reliability
random node removal
nodes reachability
node removal
network robustness
network failure
information-centric net-working (ICN)
host-centric networks
contents server
content availability
cluster-based node removal
caching contents
average content availability
cache storage
Scalability
Information Centric Networks
information-centric networking
telecommunication network topology
Measurement
Routing protocols
network topology
Mathematical model
Analytical models
internet
Robustness
pubcrawl
Resiliency
biblio
On a Deterministic Approach to Solving Industrial Control System Problems
Submitted by grigby1 on Tue, 03/30/2021 - 11:05am
Human Factors
signal transmission
security
queuing theory
queueing theory
Queueing analysis
pubcrawl
production engineering computing
network performance measures
Network calculus
Mathematical model
Local area networks
Industrial Control Systems
industrial control
automation
Human behavior
digital control system problems
deterministic queuing systems network calculus
delays
delay
database updating
Cybersecurity
critical infrastructures
Control System
control engineering computing
Calculus
backlog
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
Submitted by aekwall on Mon, 03/29/2021 - 10:51am
Games
optimized k selection
optimal anonymization level
k-anonymization technique
different Nash equilibria solutions
data record
game-theoretic framework
information loss
game-theoretic approach
game theoretic security
Predictive Metrics
Human Factors
Scalability
Mathematical model
simulation
privacy
privacy preservation
pubcrawl
Resiliency
game theory
security
Organizations
data privacy
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
Predictive Metrics
wireless dynamic networks
self-regulation
network reconfiguration
network games
game theory approach
dynamic network infrastructure
cyber attacks protection
computer attacks
adaptive reconfiguration
game-theoretic approach
game theoretic security
Nash Equilibrium
Biological system modeling
cyberattack
Human Factors
Games
network structure
Measurement
Mathematical model
Wireless communication
pubcrawl
Resiliency
information security
game theory
Scalability
security of data
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »