Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
process monitoring
biblio
Generalized Reconstruction-Based Contribution for Multiple Faults Diagnosis with Bayesian Decision
Submitted by aekwall on Mon, 05/18/2020 - 9:48am
Monitoring
Bayes methods
Resiliency
pubcrawl
Metrics
PCA
cyber physical systems
Indexes
principal component analysis
Human Factors
numerical analysis
numerical simulation
belief networks
fault diagnosis
Covariance matrices
fault detection
process monitoring
bayesian decision
data-driven fault diagnosis method
generalized reconstruction-based contribution
industrial process
Multi-dimensional reconstruction based contribution
multiple fault diagnosis
multiple faults diagnosis
smearing effect
biblio
Multiple Fault Diagnosis Methods Based on Multilevel Multi-Granularity PCA
Submitted by aekwall on Mon, 05/18/2020 - 9:47am
Correlation
Covariance matrices
cyber physical systems
Data models
Data processing
fault detection
fault diagnosis
Human Factors
linear correlation
Metrics
multi-granularity
multi-level
multilevel multigranularity PCA
multiple fault diagnosis
multiple fault diagnosis methods
multiple process variables
multivariate statistical analysis
principal component analysis
process fault diagnosis
process monitoring
production engineering computing
pubcrawl
Resiliency
traditional PCA fault diagnosis
biblio
Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems
Submitted by el_wehby on Sun, 05/27/2018 - 9:13pm
Algorithms
backflow detection
Image edge detection
leak and backflow detection
leak detection
Mobile communication
mobile sensor networks
mobile sensors
Monitoring
optimization
Pipelines
process monitoring
Robot sensing systems
simulations
water distribution systems
water supply
WDS monitoring
Wireless communication
wireless sensor networks
1253968
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
Access Control
authentication
authorisation
Cryptography
cyber security
cyber security challenges
efficient key management system
Human behavior
IBC
IBE
ICs
Industrial Control Systems
industrial process
integrated circuits
internet
Internet world
key management
KMS
Metrics
Monitoring
process control
process monitoring
production engineering computing
Protocols
pubcrawl
resilience
Resiliency
Scalability
secure communication channels
security services
biblio
Ambient Rhythm: Melodic Sonification of Status Information for IoT-enabled Devices
Submitted by K_Hooper on Wed, 09/27/2017 - 12:19pm
Acoustic Atmosphere
acoustic coupling
Human behavior
Interfaces
IoT
process monitoring
pubcrawl
Resiliency
scalabilty
Sonification
biblio
A SCADA Intrusion Detection Framework That Incorporates Process Semantics
Submitted by grigby1 on Fri, 08/18/2017 - 1:25pm
i-o systems security
i/o systems security
Intrusion Detection
io systems security
network intrusion detection
network security
process monitoring
pubcrawl
SCADA Security
Scalability
biblio
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
Algorithm design and analysis
Classification algorithms
Computer crime
Cryptography
Data models
data recovery
destroyed situation
Digital Forensics
digital multisignature
digital signatures
Distributed Bragg reflectors
document fragment
document fragment reassembly algorithm
electronic data
electronic data recovery forensics
evidence recovery
ExFAT
ExFAT file system
file character code
file character code algorithm
file locating
file location algorithm
File systems
Forensics
hash authentication
judicial identification
Law
lawsuit
legal effect
media mirror
process monitoring
pubcrawl170109
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
AGA-12
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
end-to-end security
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
NTRU public key algorithm
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
SCADA communication protocols over TCP/IP
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water