Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
expert systems
biblio
Virtual Assistant for Forensics Recovery of IoT Devices
Submitted by grigby1 on Tue, 03/22/2022 - 1:47pm
tools
Internet of Things
Digital Forensics
IoT
pubcrawl
resilience
Resiliency
Conferences
performance evaluation
Complexity theory
expert systems
Virtual assistants
System recovery
IBoT
biblio
Expert system with Fuzzy logic for protecting Scientific Information Resources
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
Algorithm
Cyber Physical System
Databases
expert system
expert systems
Fuzzy logic
information security
Libraries
Metrics
protecting information resources
pubcrawl
resilience
Resiliency
security
Task Analysis
tools
biblio
Modeling the Structures of Threats to Information Security Risks based on a Fuzzy Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:29pm
resilience
threat
synthesis
structure
security
Scalability
risk management
Risk
Resiliency
Aggregates
pubcrawl
Probabilistic logic
Linguistics
Input variables
information security
Human behavior
fuzzy conclusion
expert systems
biblio
User behavior Pattern -Signature based Intrusion Detection
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
Intrusion Detection using Statistics
user suspicious behavior
user behavior Pattern -signature
user authentication
Statistical Based Intrusion Detection
security
Scalability
SBID model
Resiliency
resilience
pubcrawl
PIDE model
pattern recognized engine
Pattern Based Intrusion Detection
particular procedure
main concerned area
authentic user
intrusion detection system
Intrusion Detection
Human behavior
host-based IDS monitors user behavior
extensive system
expert systems
expert system
Engines
digital signatures
computer system
computer network security
Computer hacking
Computational modeling
biometrics (access control)
biometric applications
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
Toward a Network Intrusion Detection System for Geographic Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
network intrusion detection system
knowledge based systems
knowledge bases
known computer attack detection
MAS
Multi Agent System
multi-agent systems
multiagent paradigm
multiagent systems
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
time detection
unknown computer attack detection
distribution
autonomous agents
autonomy
Big Data
Big networks
DIDS
distributed file system
distributed intrusion detection system
distributed processing
Anomaly Detection
expert systems
geographic data security
geographic information systems
Geographical System
GIS.
Human behavior
IDS
biblio
Automatic Protection Implementation Considering Protection Assessment Method of DER Penetration for Smart Distribution Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:27pm
photovoltaic power systems
graphical user interfaces
Adaptive protection
adaptive rule-based method
automatic protection implementation
bidirectional power flow
DER application
DER penetration
distribution energy resources
Gorontalo sub-system network
graphical user interface
Indonesia
microhydro plant
GUI
plant location
power distribution protection
power distribution reliability
power quality
power system reliability
protection security assessment method
PSA
relay settings
smart distribution network
smart electrical system
solar photovoltaics
Load flow
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
distributed power generation
power engineering computing
power system security
Smart Grid
smart power grids
Reliability
adaptive systems
visualization
power supply quality
system reliability
Relays
power generation protection
expert systems
expert system
power generation reliability
hydroelectric power stations
smart grid systems
solar power stations
biblio
Early Combined Safety - Security Defense in Depth Assessment of Complex Systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:27pm
Large-scale systems
Unified modeling language
traditional security research
tools
system engineer
system design life-cycle phases
security design weaknesses
security defenses
security attributes
security assessments
security
Scalability
Safety
Resiliency
resilience
pubcrawl
additional system complexity
interdisciplinary system dependencies
inter-system dependencies
Human behavior
expert systems
early conceptual design
early assessment
dependency model
defense in depth
critical infrastructures
concurrent safety
computer security
complex systems
complex system
complex critical infrastructures
combined Safety - Security Defense in Depth Assessment
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
Expert System for Assessing the Efficiency of Information Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
information security efficiency assessment
technical measures
security of data
security
resilience
pubcrawl
protected information
personal data
Organizations
organizational measures
organizational and administrative documents
Monitoring
IP networks
informed decisions
information system
Security Audits
information security audit
information security
information protection system
expert systems
expert system
expert assessment method
Data protection
coefficient of significance
authorities
auditing
audit information security
Scalability
Resiliency
Human behavior
1
2
3
4
5
6
7
8
9
next ›
last »