Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Costs
biblio
Decision-Making Biases and Cyber Attackers
Submitted by grigby1 on Thu, 09/29/2022 - 4:39pm
sunk cost
Peltzman effect
loss aversion
functional fixedness
default effect
aversion to ambiguity
cyber warfare
Costs
Cybersecurity
Software measurement
Decision Making
delays
Computer crime
Conferences
Human behavior
pubcrawl
biblio
Fuzzy AHP based Ranking of Cryptography Indicators
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
Telecommunications
Fuzzy Cryptography
Quantum encryption
Multi-criteria decision-making
FAHP
Costs
Resiliency
analytic hierarchy process
RSA
encryption
Robustness
Artificial Intelligence
Scalability
AES
Hardware
resilience
Metrics
pubcrawl
biblio
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory
Submitted by grigby1 on Tue, 09/20/2022 - 1:27pm
Reinforcement learning
reward function
non-catastrophic
expert trajectory
Costs
Human Factors
adversarial attack
expert systems
Clustering algorithms
Predictive models
Prediction algorithms
Measurement
Perturbation methods
privacy
Scalability
Human behavior
pubcrawl
biblio
Applying the Methods of Regression Analysis and Fuzzy Logic for Assessing the Information Security Risk of Complex Systems
Submitted by grigby1 on Fri, 09/16/2022 - 4:46pm
regression analysis
multiple regression
cross-correlation
confidence interval
information resources
Costs
Resiliency
Risk
threat
Predictive models
Fuzzy logic
Analytical models
resilience
Metrics
pubcrawl
security
information security
biblio
An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
Fuzzy Cryptography
authentication
Cloud Computing
Costs
Fog computing
key management
Mobile handsets
ProVerif
pubcrawl
resilience
Resiliency
Resists
Scalability
security
security issues
Servers
biblio
Convergence of Cloud and Fog Computing for Security Enhancement
Submitted by grigby1 on Fri, 09/16/2022 - 4:37pm
Fog computing
Security monitoring framework
cloud server
virtual machine
Costs
Resiliency
computing resources
cyber-attack
Virtual machining
encryption
edge computing
Scalability
resilience
pubcrawl
Servers
Monitoring
security
Cloud Computing
biblio
Web-based Computational Tools for Calculating Optimal Testing Pool Size for Diagnostic Tests of Infectious Diseases
Submitted by grigby1 on Wed, 08/10/2022 - 2:45pm
pubcrawl
optimization
composability
Compositionality
testing
computational intelligence
Sensitivity
Web application
Costs
Infectious diseases
Calculators
Computational tools
Coronaviruses
Diagnostic testing
Pooling
biblio
Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
computer architecture
Conferences
Costs
Industries
Metals
Productivity
pubcrawl
resilience
Resiliency
Systems architecture
Trustworthy Systems
biblio
Secure Real-time Data Access Using Two-Factor Authentication Scheme for the Internet of Drones
Submitted by grigby1 on Mon, 08/01/2022 - 2:45pm
pubcrawl
Human behavior
Human Factors
security
authentication
privacy
internet
real-time systems
Resistance
Propagation losses
two-factor authentication
two factor authentication
Costs
UAVs
Internet of drones
Real-time information
biblio
Automatic patch installation method of operating system based on deep learning
Submitted by grigby1 on Fri, 07/29/2022 - 5:13pm
deep learning
security
pubcrawl
resilience
Resiliency
Industries
operating systems
visualization
power systems
Operating systems security
Costs
Operating system patches
Patch detection visualization
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »