Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security assessment
biblio
Design of Information System Security Evaluation Management System based on Artificial Intelligence
Submitted by grigby1 on Fri, 12/09/2022 - 5:55pm
Economics
Metrics
Resiliency
Artificial Intelligence
information technology
composability
network security
resilience
Stability analysis
Human behavior
artificial intelligence security
security assessment
information system
system design
information security
security
pubcrawl
biblio
Security Assessment of Enterprise Networks Based on Analytic Network Process and Evidence Theory
Submitted by grigby1 on Fri, 08/26/2022 - 10:59am
Knowledge engineering
security assessment
security
Scalability
Resiliency
resilience
Physical layer
network security
Network analyzers
pubcrawl
Human behavior
Fuses
expert systems
evidence theory
enterprise network
Analytical models
analytic network process
biblio
Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
Measurement
Games
Wireless communication
pubcrawl
Resiliency
Industries
Reinforcement learning
Compositionality
Throughput
Predictive Metrics
provable security
Contextual Multi-Armed Bandit
link adaptation
RL algorithms security
security assessment
biblio
Client-side Security Assessment and Security Protection Scheme for Smart TV Network
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
Logic gates
Web and internet services
TV network
smart TV
security protection
security assessment
security
resilience
pubcrawl
Metrics
Networked Control Systems Security
intelligent data
debugging
command injection attacks
client-side
Cable TV
Bridges
Predictive Metrics
composability
Resiliency
biblio
A Specification-Based Detection for Attacks in the Multi-Area System
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
security assessment
Damage Assessment
three-area system model
system-level
specification-based detection
rule-based method
protection measures
novel specification-based method
multiarea system
grid operation
frequency deviation
extensive power grid
cyber-physical grid
cyber-attack events
automatic generation control signals
false data injection attack detection
security of data
Frequency measurement
frequency control
automatic generation control
power system stability
power grids
Smart Grids
power system security
power engineering computing
Resiliency
resilience
pubcrawl
Anomaly Detection
security
risk management
biblio
Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
real-time attack detection
unsupervised anomaly detection method
telecommunication security
Service robots
self-driving cars
security of data
security assessment
security
ROS
Robot vision systems
robot operating systems
Robot Operating System
robot cameras
Robot
Resiliency
resilience
Attack detection
pubcrawl
policy-based governance
Perturbation methods
operating systems
object detection
mobile robots
intrusion detection system
images processing
images comparisons
image matching
Human Factors
Human behavior
car application
Cameras
automotive electronics
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
Metrics
Vulnerability
SIEM logs
security of data
Security Metrics
security assessment
security
Risk
pubcrawl
network flow
Network
Attack Circuit
IoT network security
IoT device security
Internet of Things
impact
graph theory
Exploitability
Computing Theory
attack graphs
attack graph
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 11:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
Model-based simulation and threat analysis of in-vehicle networks
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
intelligent navigation
automated controls
automobile industry
automotive systems
connectivity interfaces
Controller area network (CAN)
cyber-security risks
driving experience
in-vehicle features
in-vehicle networks
air pollution
model-based design
network simulation
operational errors
rapid pace
safety systems
SDN technologies
security assessment
software defined networking technologies
threat analysis
vehicular ad hoc networks
security of data
computer network security
Internet of Things
real-time systems
Time measurement
software defined networking
cyber-physical systems
Resiliency
pubcrawl
IoT
security threats
sensors
Threat Landscape
security risks
Atmospheric modeling
controller area network security
power control
network data
adequate testing
biblio
Multi-beam Physical Security Scheme: Security Assessment and Impact of Array Impairments on Security and Quality of Service
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
radio transmitters
multilevel constellation
multiple-input multiple-output
perfect channel state information
Phase shift keying
power amplification
pubcrawl
quality of service
quasiconstant envelope signals
multibeam physical security scheme
Receivers
security assessment
signal components
Springs
telecommunication security
transmitting antennas
wireless channels
cyber physical systems
antenna arrays
array impairments
array power gain increments
array signal processing
channel level
component signal
Compositionality
CSI
amplification branch
decomposition
envelope variations
fact constrains
high order constellation signals
Metrics
MIMO communication
mMIMO
1
2
3
4
next ›
last »