Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data models
biblio
"A novel simulation approach for fault injection resistance evaluation on smart cards"
Submitted by grigby1 on Tue, 02/14/2017 - 1:15pm
fault simulation
Software
smart cards
smart card source code
Smart card
Side-channel attack
side-channel analyses
security
Registers
pubcrawl170102
Physical attack
Object oriented modeling
multiple fault attacks
instruction skip
Hardware
generic fault injection simulation tool
advanced encryption standard
fault injection simulations
fault injection resistance evaluation
Fault injection
embedded systems
embedded fault simulator
EFS
data modification
Data models
Cryptography
control flow fault models
complex smart card systems
combined attack
backward analyses
AES
biblio
"AD2: Anomaly detection on active directory log data for insider threat monitoring"
Submitted by abfox on Tue, 02/14/2017 - 12:14pm
Data models
pubcrawl170101
probability
Organizations
Monitoring
Markov processes
malware detection system
machine learning
learning (artificial intelligence)
invasive software
insider threat monitoring
Hidden Markov models
active directory domain service log
cyber security monitoring
computer security
Computational modeling
behavioural sciences computing
Behavioral Modeling
behavioral analytic framework
Anomaly Detection
advanced persistent threat
AD2
active directory log data
Active Directory Log Analysis
biblio
Modeling Network Medium Access Protocols for Network Quality of Service Analysis
Submitted by Katie Dey on Thu, 11/12/2015 - 1:58pm
Resilient Systems
Science of Security
Foundations
network time-varying performance
Access
analysis
Analytical models
Bandwidth
Calculus
Data models
delays
design-time analysis
distributed real-time embedded system verification
embedded systems
foundations
Medium
Network
network medium channel access protocol
network quality of service analysis
verification
protocol
Protocols
QoS
quality
quality of service
Resilient Monitoring and Control
Resilient Systems
Satellites
Science of Security
Service
SURE Project
TDMA
time division multiple access
time-varying channels
biblio
A Robust Functional-Data-Analysis Method for Data Recovery in Multichannel Sensor Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:55pm
robust data-recovery method
limited data transmission
multichannel sensor systems
multimodular integral pressurized water reactor
multivariate functional regression
nonskewed signal recovery
Predictive modelss
principal component analysis
regression analysis
reliability enhancement
integrated systems
robust functional-data-analysis method
sensor fusion
sensor readings
sensor signal smoothing
skewed distributions
smoothing methods
statistical distributions
strongly skewed signal recovery
turbofan engine data
Eigenvalues and eigenfunctions
Bandwidth
condition monitoring
coolant-flow loop
correlated signals
correlation methods
critical equipment
data analysis
Data models
data recovery
asynchronous data sampling
experimental flow-control loop
failure prevention
fault diagnosis
fault prognosis
FPCA
functional data analysis
functional principal component analysis
grand median functions
biblio
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
stochastic incomplete feedback
nearest neighbor
real-time control
root mean square error
spatial correlation
spatial data recovery scheme
Spatial databases
stochastic data
stochastic feedback data
measurement uncertainty
Stochastic processes
stochastic traffic patterns
System performance
temporal correlation
temporal data recovery scheme
temporal model identification
time-critical traffic patterns
efficient temporal and spatial data recovery
Computational modeling
Correlation
CPS
cyber-physical system
cyber-physical systems
data handling
Data models
data recovery scheme
auto regressive integrated moving average
ETSDR scheme
feedback loss
incomplete feedback data
integral of absolute error
Mathematical model
mean absolute error
mean square error methods
biblio
A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL designs
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
high level functionality verification
unified sequential equivalence checking approach
Sequential equivalence checking
sequence of states
RTL design verification
RTL design
Protocols
protocol specification implementation
Integrated circuit modeling
high-level models
high level synthesis
high level reference model
high level model
Abstracts
formal verification
formal technique
Formal Specification
electronic design automation
Educational institutions
design verification
design under verification
Data models
Computational modeling
computational margin
communication protocol
Calculators
biblio
A Robust Functional-Data-Analysis Method for Data Recovery in Multichannel Sensor Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:35pm
Robustness
multichannel sensor systems
multimodular integral pressurized water reactor
multivariate functional regression
nonskewed signal recovery
Predictive models
principal component analysis
regression analysis
reliability enhancement
robust data-recovery method
robust functional-data-analysis method
limited data transmission
sensor fusion
sensor readings
sensor signal smoothing
Sensor Systems
skewed distributions
smoothing methods
statistical distributions
strongly skewed signal recovery
turbofan engine data
Eigenvalues and eigenfunctions
Bandwidth
condition monitoring
coolant-flow loop
correlated signals
correlation methods
critical equipment
data analysis
Data models
data recovery
asynchronous data sampling
experimental flow-control loop
failure prevention
fault diagnosis
fault prognosis
FPCA
functional data analysis
functional principal component analysis
grand median functions
integrated systems
biblio
Fault subspace selection and analysis of relative changes based reconstruction modeling for multi-fault diagnosis
Submitted by BrandonB on Wed, 05/06/2015 - 2:32pm
industrial processes
Tennessee Eastman benchmark process
related statistical characteristics analysis
regression analysis
reconstruction-based fault diagnosis
reconstruction modeling
principal component analysis
partial least squares
online fault diagnosis
multifault diagnosis
multi-fault diagnosis
Monitoring
Libraries
Joints
joint fault effects
abnormal process behaviors
historical fault library
historical fault data
fault subspace selection strategy
fault subspace selection
fault diagnosis
Data models
combinatorial mathematics
combinatorial fault nature analysis
Analytical models
analysis-of-relative changes based reconstruction modeling
analysis of relative changes
alarming signal elimination
aggregative reconstruction-based fault diagnosis strategy
aggregative fault subspace calculation
biblio
Towards a Data Semantics Management System for Internet Traffic
Submitted by BrandonB on Wed, 05/06/2015 - 11:53am
Internet traffic data semantic learning
traffic data semantics
telecommunication traffic
storage management
Semantics
Protocols
ontologies (artificial intelligence)
networking semantics
LSH
locality sensitive hashing algorithm
learning behavior
learning (artificial intelligence)
latent Dirichlet allocation algorithm
Algorithm design and analysis
internet
feature extraction
dynamic ontology
DSMS
data semantics management system
data reduction
Data models
Data mining
data dimensionality reduction
cognition
cloud-like data storage technique
biblio
Big data analysis system concept for detecting unknown attacks
Submitted by BrandonB on Wed, 05/06/2015 - 10:41am
future attack detection
unknown attack detection
state agencies
service destruction
security systems
security
prevention system
personal information leakage
pattern matching methods
Monitoring
large-scale system attacks
Intrusion Detection
information management
information extraction
hacking attacks
advanced persistent threat detection
detection rate
defence technologies
Data storage systems
Data models
Data mining
data handling
cyber-attacks
critical infrastructures
Computer crime
Big Data analysis techniques
Big Data analysis system
Big Data
APT detection
Alarm systems
« first
‹ previous
…
50
51
52
53
54
55
56
57
58
next ›
last »