Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Communication networks
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
Internet of Things
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Cryptography
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
5G wireless networks
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
secrecy key size
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
Bayes methods
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
computer network reliability
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
coupling model
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
power information
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
computer network security
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
Decision Making
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
attack graph
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
network connectivity
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
biblio
Synthesizing Energy Consumption Data Using a Mixture Density Network Integrated with Long Short Term Memory
Submitted by grigby1 on Fri, 11/20/2020 - 1:06pm
Logic gates
privacy
Predictive models
data analysis
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
security
data privacy
Scalability
Data models
power engineering computing
smart meters
smart power grids
standards
composability
energy consumption
data storage
Probability density function
Power Grid
Communication networks
data dissemination
information dissemination
smart cities
LSTM
privacy concerns
centralized data analytics
commercial consumer energy consumption
data synthesis
fully synthetic energy consumption data
human behavioral impacts
load patterns
long short-term memory network
MDN
mixture density network
multiple critical infrastructures
residential consumer energy consumption
residential smart meters
smart grid consumer privacy
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
security of data
security
pubcrawl
graph theory
tools
Analytical models
cyber-attacks
Communication networks
resilience
program verification
Stability analysis
Local area networks
stability
attack graphs
faults
attack graph
AADL
architecture analysis-&-design language
cyber-physical-systems
generated attack scenarios
generated attack sequences
generated network models
JKind model checker integrated tool
possible attack instances
program visualisation
resilience level assessment
Resiliency
security property
system resiliency
Unity software
Resilient Security Architectures
biblio
Research on Vulnerability Ontology Model
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
security of data
Ontologies
security
Resiliency
pubcrawl
standards
Databases
Vulnerability
Economics
finance
ontologies (artificial intelligence)
Ontology
Communication networks
inference mechanisms
Compositionality
CVE
capec
CWE
industry public standards
Inference Rules
information security public databases
knowledge inference
public information systems
security vulnerability ontology model
vulnerability class
weakness class
Information Reuse and Security
biblio
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning
Submitted by grigby1 on Wed, 11/04/2020 - 12:44pm
collaborative learning
Collaborative Work
Communication networks
computer aided instruction
computer science education
cyber physical systems
cybersecurity education
cybersecurity teaching
education
firewall
firewalls
Firewalls (computing)
groupware
Guided inquiry
guided inquiry collaborative learning materials
IPsec
Logic gates
privacy
professional skills
pubcrawl
soft skills
student-centered education
teaching
teaching methods
team working
biblio
Using of an anonymous communication in e-government services: In the prevention of passive attacks on a network
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
anonymous communication
auctions
collaboration
commerce
Communication networks
communication technologies
Cybersecurity
Data protection
Delta
digital participation
E-Government
e-government services
Electronic government
government data processing
Monitoring
network attacks
networking
passive attacks prevention
policy-based governance
Protocols
pubcrawl
Receivers
resilience
Resiliency
security
telecommunication security
biblio
Vulnerability Severity Prediction With Deep Neural Network
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
computer network security
network security
Scalability
security
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Neural networks
machine learning
convolutional neural nets
text categorization
Communication networks
convolution
recurrent neural nets
Deep Neural Network
deep neural networks
network security incidents
XSS vulnerability
false negative rate
huge economic losses
multiple deep learning methods
optimal CNN network
recurrent convolutional neural networks
standard cross site scripting vulnerability text data
text classification
TextRCNN
vulnerability risk levels
vulnerability severity prediction
vulnerability text classification evaluation
vulnerability text information
Cross Site Scripting
biblio
Research on Cognitive Linkage of Network Security Equipment
Submitted by aekwall on Mon, 09/14/2020 - 11:33am
security of data
Cryptography
security
learning (artificial intelligence)
pubcrawl
composability
Computational modeling
Analytical models
Policy
Communication networks
cognition
Compositionality
Decision Making
Couplings
computational intelligence
network security devices
Cognitive Cycle
Cognitive Linkage
cognitive linkage system model
network security equipment
weak linkage ability
1
2
3
4
5
6
7
8
9
…
next ›
last »