Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision Making
biblio
Big Data Analytics for Air Quality Monitoring at a Logistics Shipping Base via Autonomous Wireless Sensor Network Technologies
Submitted by grigby1 on Mon, 12/03/2018 - 1:52pm
Temperature measurement
indoor air quality
industrial workplace air quality
industrial workplace buildings
industrial workplaces
logistics shipping base
Monitoring
on-shore logistics base a regional shipping industry
oxygen displacer
perceived levels
potential BD problems
reported medical health
shipping industry
Humidity
Temperature sensors
Transportation
visualization approach
Wireless Sensor Network Technologies
wireless sensor networks
workplace environments
WSN technologies
pubcrawl
Metrics
Resiliency
Scalability
CO2
supply chain risk assessment
Logistics
Big Data
resilience
air quality
air quality monitoring
air temperature
autonomous assessment
autonomous wireless sensor network technologies
Big Data Analytics
Buildings
Carbon dioxide
supply chain management
confined spaces humans
continuous assessment
critical role
data analytics approach
Decision Making
effective decision making
Employment
ergonomics
health and safety
Heart rate
high risk industries
biblio
A Competency Model to Help Selecting the Information Security Method for Platforms of Communication by Visible Light (VLC)
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Metrics
VLC
Visible Light Communications Security
visible light communication
TOPSIS and The Game Theory
security of data
security information
security criteria
security
Scalability
right security problems
Resiliency
resilience
research project
pubcrawl
alternative methods
light emitting diodes
information security method
information security
Informatics
free-space optical communication
Decision Making
Data models
competency model
Communication by Visible Light (VLC)
business context
business communication
Bayesian Nets
Analytical models
biblio
DDoS attack defense framework for cloud using fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
Cloud Computing
Computer crime
computer network security
DDoS
DDoS attack defense framework
DDoS attack traffic
Decision Making
edge computing
Fog computing
fog defender
IP networks
Market research
Servers
telecommunication traffic
tools
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
Towards a theory of free-lunch privacy in cyber-physical systems
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Human behavior
Smart homes
Scalability
Resiliency
resilience
Public transportation
pubcrawl
privacy
optimization
multiparametric programming
mathematical programming
human factor
computational geometry
Heating systems
free-lunch privacy mechanism
Decision Making
data-informed decision making processes
data utility
Data protection
data privacy protection
data privacy
cyber-physical systems
Computing Theory
biblio
Decision-making in policy governed human-autonomous systems teams
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
machine reasoning processes
trust
social-exchange theory
social sciences computing
social exchange theory
pubcrawl
Protocols
policy governed human-autonomous system teams
multi-agent systems
military computing
Mathematical model
automated systems
learning (artificial intelligence)
Human Factors
Human behavior
decision-making
Decision Making
computer theory
collaboration
coalition environments
Biological system modeling
autonomous systems
biblio
Distributed timely-throughput optimal scheduling for wireless networks
Submitted by el_wehby on Wed, 05/23/2018 - 6:08pm
Optimal scheduling
wireless sensor networks
wireless networks
Wireless communication
virtual debts
Throughput
telecommunication traffic
telecommunication scheduling
Scheduling algorithms
Schedules
reliable data delivery
radio networks
optimal transmission decision making
arrival rate vectors
maximum network throughput
maximum network capacity region
incoming traffic rate
distributed timely-throughput optimal scheduling algorithm
distributed algorithms
delays
delay deadlines
Decision Making
data communication
CSMA-type protocols
carrier sense multiple access
1446484
biblio
Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game against Advanced Persistent Threats
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Resiliency
framing effect
game theory
Games
Human behavior
Metrics
Nash equilibria
probability
probability weighting effect
pubcrawl
resilience
expected utility theory
Scalability
scan interval
security of data
storage devices
storage management
subjective attacker
targeted attacks
uncertain attack durations
utility theory
computer security
privacy
advanced persistent threat
advanced persistent threats
APT attacker
APT defense game
attack interval
Cloud Computing
cloud storage
cloud storage defense game
Computing Theory
Conferences
CPT
cumulative decision weights
cumulative prospect theoretic study
cumulative prospect theory
data privacy
Decision Making
discrete decision weights
distortion
biblio
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Submitted by K_Hooper on Wed, 02/14/2018 - 12:02pm
Human-computer interaction
visualization
user study
T-Viz
trust visualisations
Trust visualisation
Color
data visualisation
Decision Making
Human behavior
trust statements
human computer interaction
human trust
psychology
pubcrawl
Radar
Reliability engineering
stars interface
Trusted Computing
biblio
A Graph Model for Enhancing Situational Awareness in Power Systems
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Regression tree analysis
power grid operation
power grid security assessment
power grid vulnerability analysis
power grids
power system
power system faults
power system reliability
power system security
power transmission lines
power transmission reliability
pubcrawl
power flow information
Resiliency
security
Security analysis
security issues
situational awareness
system operator
system threats estimation
system threats visualization
Transmission line measurements
visualization
vulnerable links
Indexes
blackout threats
cascading outages
composability
contingency selection
critical links
Decision Making
graph model
graph theory
IEEE 118-bus systems
IEEE 30-bus systems
immediate threats graph
blackout
ITG
LCI
LDG
Line Criticality Index
line dependency graph
line outage impact prediction
Line Vulnerability Index
Load flow
LVI
Metrics
online visualization
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »