Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data models
biblio
Graph-Based Time Series Edge Anomaly Detection in Smart Grid
Submitted by grigby1 on Thu, 05/05/2022 - 4:31pm
Computational modeling
edge detection
time series
GCNs
Image edge detection
Time series analysis
edge computing
Metrics
Smart Grids
composability
Adaptation models
Data models
Scalability
Conferences
Resiliency
resilience
pubcrawl
Anomaly Detection
security
biblio
Key-Based Enhancement of Data Encryption Standard For Text Security
Submitted by grigby1 on Thu, 05/05/2022 - 3:13pm
real-time systems
efficient encryption
Text Security
Key-Distribution Function
CBC mode
Data Encryption Standard
merging
cyber physical system security framework
cyber physical systems
encryption
Streaming media
composability
Computational modeling
Data models
Resiliency
resilience
pubcrawl
security
biblio
Security and Cost Aware Scheduling of Real-Time IoT Workflows in a Mist Computing Environment
Submitted by grigby1 on Tue, 05/03/2022 - 3:55pm
Processor scheduling
workflow scheduling
Security Heuristics
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
Cloud Computing
predictability
performance evaluation
mist computing
Fog computing
Data models
Costs
computer architecture
biblio
WAFFLE: Watermarking in Federated Learning
Submitted by grigby1 on Tue, 04/26/2022 - 10:36am
Collaborative Work
Data models
deep learning
Deterrence
federated learning
Human behavior
ownership demonstration
process control
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
Training
Training data
Watermarking
biblio
Detection of Advanced Persistent Threats using Artificial Intelligence for Deep Packet Inspection
Submitted by grigby1 on Mon, 04/25/2022 - 3:23pm
IDS
zero days
telecommunication traffic
Support vector machines
security
Scalability
Resiliency
resilience
Recurrent neural networks
pubcrawl
Payload
Inspection
threat vectors
feature extraction
deep packet inspection
Data models
Cybersecurity
cyber
Big Data
autoencoder
APT
Anomaly Detection
AI
biblio
Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation
Submitted by grigby1 on Wed, 04/20/2022 - 3:46pm
computer architecture
Monitoring
pubcrawl
Resiliency
Analytical models
Data models
Computational modeling
Planning
Metrics
Measurement
Vulnerability
modeling and simulation
cyber threat
Cyber Operations
biblio
Cyber-Physical Systems Modeling Method Based on Modelica
Submitted by grigby1 on Wed, 04/20/2022 - 9:52am
composability
Computational modeling
CPS modeling
CPS Simulation
Data models
Equations
Integrated circuit modeling
Mathematical model
Metrics
Object oriented modeling
pubcrawl
resilience
Resiliency
simulation
Solid modeling
biblio
Pitfalls and Remedies in Modeling and Simulation of Cyber Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 9:51am
faces
simulation
Resiliency
resilience
pubcrawl
Pitfalls
modeling and simulation
Metrics
Mathematical model
Complexity theory
Data models
cyber physical systems
cyber-physical systems
CPS Simulation
CPS modeling
Computational modeling
composability
biblio
A Scene-Driven Modeling Reconfigurable Hardware-in-Loop Simulation Environment for the Verification of an Autonomous CPS
Submitted by grigby1 on Wed, 04/20/2022 - 9:50am
hardware-in-loop simulation
Visual object
simulation
Scene-driven
Resiliency
resilience
Reconfigurable
pubcrawl
modeling
Metrics
Mathematical model
Atmospheric modeling
Force
Equations
Data models
cyber-physical system
CPS Simulation
CPS modeling
computer architecture
Computational modeling
composability
biblio
CP-ABE with Efficient Revocation Based on the KEK Tree in Data Outsourcing System
Submitted by grigby1 on Tue, 04/19/2022 - 4:41pm
attribute revocation
cloud storage
Computational modeling
CP-ABE
Data models
Distributed databases
encryption
KEK
outsourcing
policy-based governance
pubcrawl
Safety
Scalability
security
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »