Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Planning
biblio
A Hybrid Attack Model for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
execution stage
Planning
markov chain
attack graph
attack propagation
bad data injection
bad data injection attack
Cyber-physical security assessment
Dynamic Defender model
Power Grid
execution stages
HAM
hybrid attack model
Markov Chain model
PLADD
preparation stage
Probabilistic Learning Attacker
Chained Attacks
smart power grids
Scalability
security
Data models
cyber-physical systems
learning (artificial intelligence)
Resiliency
pubcrawl
Mathematical model
security of data
Substations
power grids
power engineering computing
power system security
Games
Markov processes
electricity grid
biblio
Learning Agile with Intelligent Conversational Agents
Submitted by grigby1 on Thu, 07/16/2020 - 11:32am
Planning
knowledge creation
Laboratories
learning analysis
learning analytics
Metrics
multi-agent systems
Multimedia systems
organizational environments
internet
pubcrawl
Scalability
Software
software engineering
software engineering industry
teaching
traditional teaching-learning instruments
Training
educational courses
academic SE curriculum
agile adoption
Agile Scrum training
assistive web-based conversational service
computer aided instruction
computer science education
conversational agent
conversational agents
academic fields
educational design
educational effectiveness
educative background
further education
higher education
Human behavior
intelligent conversational agents
biblio
Game-Theoretic Planning to Counter DDoS in NEMESIS
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
Human Factors
security and privacy
packet-level simulation
network maneuvers
NEMESIS
game-theoretic planning
game theoretic optimal courses of action
distributed denial-of-service attacks
COA
analytical wargaming
game theoretic security
Predictive Metrics
Computer crime
Games
Mathematical model
Planning
Analytical models
pubcrawl
game theory
Servers
Scalability
distributed denial of service attacks
DDoS
computer network security
biblio
Multimodal, Multiuser Immersive Brainstorming and Scenario Planning for Intelligence Analysis
Submitted by grigby1 on Thu, 06/04/2020 - 10:47am
intelligence analysis
tools
Task Analysis
Software
scenario planning advisor
scenario planning
risk assessment
Resiliency
resilience
pubcrawl
privacy
planning (artificial intelligence)
Planning
multiuser Immersive brainstorming
multimodal interaction
Analytical models
immersive systems
immersive environment
IBM
Human Factors
cyber physical systems
composability
collaboration
cognitive immersive systems lab
cognitive immersive software
cognition
CISL
brainstorming tool
brainstorming
biblio
Agile Release Planning Using Natural Language Processing Algorithm
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
agile release planning
word corpus
user story
team working
software prototyping
similar user stories
RV coefficient NLP algorithm
Release Planning
Rally
R Programming
provided user stories
project release
natural language processing algorithm
JIRA
Java utility
complex software engineering projects
Scalability
agile methodology
project management
Algorithm
Currencies
Software algorithms
Java
software development management
software engineering
natural language processing
Planning
pubcrawl
Human behavior
Resiliency
Software
file
Adaptive Water Quality Sampling with Autonomous Vehicles with Applications to Nitrate Deposition
Submitted by Marin Kobilarov on Wed, 04/08/2020 - 2:22pm. Contributors:
Marin Kobilarov
Gaurav Sukhatme
William Ball
autonomous underwater vehicles
water quality
environmental monitoring
Adaptive Sampling
Planning
control
Lightning Talks
1646500
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
A Proposed Virtual Private Cloud-Based Disaster Recovery Strategy
Submitted by grigby1 on Mon, 03/02/2020 - 12:34pm
Organizations
virtual private cloud-based disaster recovery strategy
traditional disaster recovery
System recovery
security
Resiliency
resilience
Recovery Time Objective (RTO)
recovery time objective
Recovery Point Objective (RPO)
recovery point objective
pubcrawl
Planning
back-up procedures
information technology
information security
Google
disasters
Disaster Recovery (DR)
Disaster Cycle
Computational modeling
Cloud-Based Disaster Recovery
Cloud Computing
business continuity issues
business continuity
biblio
Consumption Ability Estimation of Distribution System Interconnected with Microgrids
Submitted by aekwall on Mon, 03/02/2020 - 11:36am
power supply quality
Underwater Networks
rationality evaluation
power distribution planning
power distribution economics
Planning
Photovoltaic systems
multiscenario simulation
multimicrogrids
microgrids access plan
microgrid capacity
distribution system interconnection
distribution system design
distribution network planning
consumption ability estimation procedure
distribution networks
Scalability
power quality
estimation
energy management
power generation economics
Microgrids
distributed power generation
distributed generation
simulation
power system interconnection
index system
Metrics
pubcrawl
Resiliency
security
biblio
A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental Analysis
Submitted by aekwall on Mon, 11/25/2019 - 1:00pm
pattern classification
Workflow Event Log
workflow enactment event log
Trace Classification
Temporal Work Transference Pattern
temporal work transference event log trace classification algorithm
system memory
pubcrawl
process mining
Planning
Analogies and Transference
Organizations
Information systems
information system
Human Factors
Human behavior
hospitals
History
Data mining
Classification algorithms
biblio
A Social Engineer in Terms of Control Theory
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
password
tools
terminal model
telecommunication control
social engineering
social engineer
security of data
security
Resiliency
resilience
pubcrawl
psychology
Planning
communication algorithms
nonstochastic communication object
information security specialists
information security
human model
human factor
Handheld computers
effective communication
Control Theory
contracts
composability
communication process
communication control system
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »