Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Computer simulation
biblio
Optically Interrogated Unique Object with Simulation Attack Prevention
Submitted by aekwall on Mon, 09/21/2020 - 2:47pm
security of data
Resiliency
pubcrawl
composability
Data protection
privacy
Entropy
cyber-physical systems
quantum computing
resilience
Cameras
Adaptive optics
Computer simulation
light sources
absorption
analogue measurement
Nonlinear optics
photoconductive cells
photoluminescence
physical object
Quantum Confinement UNO responds
Quantum dots
semiconductor quantum dots
simulation attack
simulation attack prevention
simulation attack protection
simulation attacks
unique object
unique photo-luminescence properties
UNO
confinement
biblio
ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems
Submitted by grigby1 on Fri, 08/28/2020 - 2:54pm
Resilient Security Architectures
Resiliency
big data security metrics
Computer simulation
control engineering computing
Critical Service Functionality
cyber resilience
cyber resilience assessment tool
cyber resilience metrics
ICS-CRAT
industrial control
Industrial Control Systems
production engineering computing
pubcrawl
qualitative simulation tool
Qualitative Tool
R4 resilience framework
resilience
Resilience Metrics
Scalability
security guidelines
security of data
simulation engine
standards practices
subject matter experts
system architecture
biblio
Synergetic Synthesis of the Hierarchical Control System of the “Flying Platform”
Submitted by grigby1 on Fri, 07/24/2020 - 12:00pm
security
pubcrawl
”flying platform”
aircraft control
aircraft control system
Computer simulation
control laws
control system synthesis
coordinating energy-saving control
disaster zones
disasters
electric motor control
emergency management
energy saving control
fan in the ring
flying platform
functional decomposition
hierarchical control system
hierarchical systems
machine control
nonlinear control systems
position control
rescue operations
squirrel cage motors
synergetic control theory
synergetic synthesis
turbine generator
turbogenerators
vehicle spatial position balancing
vertically take-off aircraft
Control Theory
biblio
Study on Hybrid Collaborative Simulation Testing Method Towards CPS
Submitted by grigby1 on Thu, 07/16/2020 - 10:43am
Analytical models
Collaborative Simulation
collaborative simulation control strategy
composability
Computational modeling
Computer simulation
Control Strategy
CPS
CPS modeling
CPS system
dynamic adaptive time advancement
full digital nodes
full physical nodes
groupware
Hardware
hardware in the loop nodes
hybrid collaborative simulation testing method
Hybrid P2P
hybrid P2P based collaborative simulation test framework
Metrics
multipriority task scheduling
Peer-to-peer computing
preemptive time threshold
program testing
pubcrawl
real-time systems
resilience
Resiliency
scheduling
simulations
sliding window based clock synchronization
Software
Synchronization
testing
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
Hardware
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Scalability
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
scalable verification
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
SystemC VP
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
biblio
Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games
Submitted by Katie Dey on Mon, 09/09/2019 - 9:36pm
ACT-R
Algorithm
Articles for Review
C3E 2019
Cognitive Architecture
Cognitive Security
Computer simulation
deception
Instance-based learning
Mind
Cognitive Security
Articles for Review
C3E 2019
biblio
Towards a Design Studio for Collaborative Modeling and Co-Simulations of Mixed Electrical Energy Systems
Submitted by Katie Dey on Sun, 09/30/2018 - 11:23am
Cloud Computing
Co-Simulations
Collaborative Work
Computer simulation
cyber-physical systems
Distributed Simulations
Docker
Experimental Testbed
high-level architecture
model-driven engineering
modeling
power system simulation
smart-grid
Systems Simulation
biblio
On Event Detection and Localization in Acyclic Flow Networks
Submitted by el_wehby on Sun, 05/27/2018 - 9:13pm
acyclic flow networks
Computer simulation
Contamination
detect events
event detection
event localization
flow network simulator
Heuristic algorithms
Image edge detection
immense research interest
large-scale distribution systems
Mobile communication
mobile radio
mobile sensor networks
Monitoring
monitoring infrastructure
national importance
oil-gas distribution systems
optimization
sensors
water distribution systems
Water pollution
wireless sensor networks
1253968
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
accounting
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
General Deterrence Theory
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
Predictive Metrics
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
security breaches
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
biblio
Post-quantum message authentication cryptography based on error-correcting codes
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
composability
Computer simulation
Computers
Cryptography
digital signature
digital signature algorithm
digital signatures
Elliptic curve cryptography
Elliptic curve cryptography (ECC)
error correction codes
error-correcting code based Cryptography
error-correcting codes
Metrics
post-quantum code based signature
Post-quantum cryptography
post-quantum message authentication cryptography
pubcrawl
quantum computing
Reed-Solomon codes
Resiliency
software implementation
1
2
next ›
last »