Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Gold
biblio
On Learning in Collective Self-Adaptive Systems: State of Practice and a 3D Framework
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
multifaceted analysis
3D framework
adaptive systems
agent-specific goals
collective self-adaptive systems
CSAS applications
Distributed Sensing
environmental data collection
learning techniques
Interconnected Systems
multiple agents
privacy-aware mechanisms
search and rescue operations
self-adaptive systems
system-wide goals
taxonomy
Expert Systems and Privacy
Scalability
learning
Autonomic systems
Systematics
Gold
distributed systems
Human Factors
integrated circuits
Decision Making
Databases
multi-agent systems
pubcrawl
Human behavior
learning (artificial intelligence)
Conferences
data privacy
biblio
Research on Node Routing Security Scheme Based on Dynamic Reputation Value in Content Centric Networks
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
security issues
Dynamic Networks and Security
routing advantages
normal user requests
node routing security scheme
node routing attacks
dynamic reputation value
defensing
content centric networks
CCN network
Gold
Law
computer network security
Heuristic algorithms
telecommunication network routing
internet
Metrics
Routing
composability
pubcrawl
Resiliency
security
Servers
biblio
SystemVue based Secure data transmission using Gold codes
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
quadrature amplitude modulation
wireless technology
Wireless communication
wireless channels
Viterbi decoding
Viterbi decoder
transceivers
transceiver
telecommunication security
SystemVue based Secure data transmission
SystemVue
signal to noise ratio graphs
security
Resiliency
resilience
radio transceivers
advanced wireless techniques
pubcrawl
orthogonal frequency division multiplexing modulation scheme
OFDM modulation
OFDM
Metrics
graph theory
gold codes
Gold
error statistics
Cryptography
Convolutional codes
Compositionality
coding theory
channel noise Convolutional code
channel coding
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
biblio
Twitter Opinion Mining and Boosting Using Sentiment Analysis
Submitted by grigby1 on Fri, 05/22/2020 - 2:44pm
public opinion
twitter sentiment classification
Twitter data
Task Analysis
Synset
social networking (online)
social media
SNLP
signal processing
sentiments
sentiment proportions
sentiment analysis
Scalability
Resiliency
resilience
Cameras
public conviction
pubcrawl
personal mood
pattern classification
opinions
opinion mining
natural language texts
natural language processing
Meta-level
Human behavior
Gold
exclusive entities
emotions
Data mining
biblio
Communication Design for Underwater Acoustic Positioning Networks
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
multiple users UAPN
Underwater Networks
Underwater acoustics
underwater acoustic positioning networks
spread spectrum communication
sonar equation
Sonar
signal design
reliable communication
positioning service
offshore exploration
Oceans
ocean monitoring
networking protocols
narrow acoustic bandwidth
Scalability
marine research
marine engineering
communication design
underwater acoustic communication
telecommunication network reliability
Gold
sensors
Correlation
Metrics
component
Protocols
pubcrawl
Resiliency
Receivers
biblio
Deep Explanation Model for Facial Expression Recognition Through Facial Action Coding Unit
Submitted by aekwall on Mon, 12/30/2019 - 12:11pm
emotion classes
facial recognition
nonverbal emotional communication method
machine learning tasks
Justification
Hidden Markov models
Gold
FER tasks
facial muscle movements
facial expression recognition
facial action coding units
facial action coding unit
Facial Action Coding System
face recognition
Explanation Model
emotion recognition
Task Analysis
deep learning models
deep explanation model
CNN model
CK+ Dataset
deep learning
convolutional neural network model
convolutional neural nets
Metrics
Computational modeling
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
bayesian attack graphs
vulnerability exploitation
vulerability exploitation
NIST CVSS
NIST common vulnerability scoring system
network security assessment
Gold
CVSS metric version v2.0
CVSS metric version 3.0
CVSS metric version 1.0
CVSS
conditional probability computation method
Security Metrics
BAG
Computing Theory
Complexity theory
Metrics
conditional probability
Bayes methods
authentication
security of data
Measurement
pubcrawl
graph theory
biblio
Controlling Cloud Data Access Privilege: Cryptanalysis and Security Enhancement
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
Gold
user collusion attacks
user authorization
user anonymity protection
user anonymity
security weaknesses
security enhancement
Resiliency
resilience
pubcrawl
policy-based governance
Outsourcing Decryption
Metrics
identity privacy
Human Factors
Human behavior
Access Control
finegrained access control
encryption
data privacy
data access privilege scheme
Cryptography
cryptanalysis
Computational modeling
collaboration
cloud data access privilege
Cloud Computing
authority collusion attacks
authorities collusion attack
authorisation
attribute-based encryption
biblio
Sensor Security Index for Control Systems
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
multiple sensors
system vulnerability
system destruction
Stuxnet
Steady-state
sensors
sensor security index
sensor bias injection attacks
sensor attacks
Sensor attack
security of data
security
Resiliency
resilience
pubcrawl
north eastern electrical grid black out
actuator security
Metrics
malicious attacks
Linear systems
linear dynamic systems
linear control systems
Indexes
Human behavior
Gold
Detectors
Cyber-physical attack
Control systems attack
composability
anomaly detector
actuators
« first
‹ previous
1
2
3
next ›
last »