Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Production
biblio
A Security Audit of the OpenPGP Format
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
public domain software
OpenPGP
OpenPGP format
OpenPGP format specification
OpenPGP implementations
pattern classification
PGP
Production
Protocols
pubcrawl
open source Unix systems
Public key
Resiliency
Scalability
security audit
Security Audits
security vulnerabilities
Symantec PGP
Unix
email confidentiality
authorisation
computer security
context-free grammars
context-free languages
deterministic context free grammar
deterministic context free language
Electronic mail
email authenticity
authenticated package distributions
Formal Specification
GNU Privacy Guard
GnuPG
Grammar
Human behavior
language theoretical analysis
Language-theoretic security
malicious input data
biblio
IoT Components LifeCycle Based Security Analysis
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Insulin pumps
biomedical electronics
biomedical equipment
complex interactions
composability
computer architecture
connected insulin pump
EBIOS methodology
electronic device lifecycle
embedded systems
generic model
Hardware
Software
Internet of Things
IoT component lifecycle
lifecycle induced vulnerabilities
Metrics
performance evaluation
Production
pubcrawl
Resiliency
security
Security analysis
security of data
biblio
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
Waveform Analysis and Synthesis
security
Resiliency
Receivers
real-time systems
pubcrawl
Production
Memory management
Adaptive Programming
Hard Real-Time Systems
grammatical inference
Grammar
Expectation-Driven Receiver
Evolutionary Programming
drones
computer security
Case-Based Reasoning
biblio
Adopting Strict Content Security Policy for XSS Protection
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Licenses
XSS protection
Web application flaw
Tutorials
security policies
security of data
script source
pubcrawl
Production
policy-based governance
Policy
collaboration
internet
Government
Governance
Google
Data protection
CSP
content-injection flaw
content security policy
Conferences
computer security
biblio
Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model
Submitted by grigby1 on Wed, 03/29/2017 - 12:33pm
pubcrawl
neural network
Neural networks
neural networks security
photovoltaic rooftop power plant data
policy-based governance
power system security
power system stability
Production
neural nets
Resiliency
security of data
Smart Grid
Smart Grids
smart power grids
Voltage control
voltage distribution
Data models
artificial neural network model
Context
Context modeling
contextual anomaly detection method
cyber-physical security
cyber-physical systems
cyberphysical security
data analysis
Anomaly Detection
Density estimation robust algorithm
distributed energy resource behaviour
energy resources
intrusion detection system
low voltage distribution grid
malicious voltage control actions
Metrics
biblio
Research and practice on Aluminum Industry 4.0
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
pubcrawl170112
intelligent decision technology
Internet of Things
IoT sensing system
Management
model system
model-driven analysis
process control
Production
production engineering computing
Industry 4.0
real-time systems
securitization intelligent control
security of data
sensors
six-layer aluminum industry 4.0 architecture
standardization
supply chain management
visual monitoring
Cloud Computing
aluminium industry
aluminum electrolytic industry
aluminum industry
aluminum production
architecture
backtracking process
Big Data
big data driven analysis
accurate perception
control engineering computing
data management
Data models
Decision Making
Decision support systems
full lifecycle supply chain management
industrial cloud platform
Industries
biblio
Impact analysis of transport capacity and food safety in Bogota
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
fruits
vehicle dynamics
vegetables
transport infrastructure
transport capacity
System Dynamics
supply chains
Supply Chain
pubcrawl170112
Production
meat
groceries
Bogota
food supply chain
food security impact
food safety policies
food safety
food
dairy
customer services
customer service improvement
critical infrastructures
Cities and towns
biblio
Security in Cloud-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
Cloud Computing
cloud-based cyber-physical systems
Computer crime
cyber-physical systems
Data processing
information security
modern production devices
physical interaction
Production
pubcrawl170109
security
security of data
sensors
smart mobility services
biblio
HMAC based one t #x0131;me password generator
Submitted by BrandonB on Wed, 05/06/2015 - 11:51am
HMAC
standards
Signal processing algorithms
signal processing
Production
One Time Passwords
one time password production methods
one tıme password generator
message authentication
Keccak digest algorithm
Keccak
authentication
hashing-based message authentication code structure
Hash-Based Message Authentication Code
Hash functions
Hash Function
hash algorithm
fixed length strings
electronic media
Cryptography
Conferences
biblio
Open science, open security
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
Linux
security of data
security
production quality tools
Production
parallel processing
open security
open science
Materials
data representation
Intrusion Detection
HPC security
High performance computing
Filtering
data selection
Buildings
computer architecture
data analysis
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »