Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Systems architecture
biblio
Systems Engineering Architecture Framework for Physical Protection Systems
Submitted by aekwall on Mon, 01/11/2021 - 12:39pm
architecture
Architecture Framework
computer architecture
Deterrence
Human behavior
modeling
Physical Protection Systems
pubcrawl
Resiliency
Scalability
Software Architecture
Stakeholders
Systems architecture
systems engineering
Systems engineering and theory
biblio
Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data
Submitted by grigby1 on Fri, 12/11/2020 - 1:59pm
Chemicals
Compositionality
data authenticity
data fixity
data integrity
data intensive scientific discovery
digital preservation
digital signature
digital signatures
e-science
format migration
format verification
Grammar
mapping rules
meta data
metadata
Metadata Discovery Problem
object transformation
PREMIS
preservation metadata
pubcrawl
resilience
Resiliency
Scalability
scientific information systems
Software
Software Architecture
system architecture
Systems architecture
valuable scientific data
biblio
Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
Cloud Computing
Scalability
Servers
encryption
attribute-based encryption
private key cryptography
Human behavior
pubcrawl
policy-based governance
hospitals
trusted authority
Systems architecture
TA
CP-ABE scheme
Ciphertext-policy Attributes-based Encryption (CP-ABE)
cryptographic mechanism
flexible updating policy control
personal health record testing
Personal Health Records (PHRs)
PHR testing
policy identity number
policy revocation
policy-based revolutionary ciphertext-policy attribute-based encryption scheme
revocation
Trusted authority (TA)
biblio
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Submitted by aekwall on Mon, 12/09/2019 - 11:23am
security of data
Trusted Computing
pubcrawl
composability
graph theory
Computational modeling
Metrics
Vulnerability
systems engineering
trust
Measurement
Trust management
evaluation
Risk
modeling
psychology
cognition
Compositionality
complex intersystem trust relationships
complex multitiered system architectures
Component architectures
disparate system
engineering trust
graph-based algorithm
graph-based modeling methodology
requirements analysis
System Engineering
Systems architecture
systems engineering processes
trust modeling
Computing Theory and Trust
biblio
From Secure Business Process Modeling to Design-Level Security Verification
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
Air gaps
air traffic management system
BPMN
business data processing
business process modeling security
composability
design-level security verification
Formal Specification
formal verification
Human behavior
Human Factors
Metrics
Model transformation
modeling
organisational aspects
organizational aspects
procedural system descriptions
pubcrawl
resilience
Resiliency
SecBPMN2
security
security engineering framework
security of data
security requirements
socio-technical systems
Stakeholders
system design
system developers
Systems architecture
UML
UMLsec policies
Unified modeling language
biblio
Designing agility and resilience into embedded systems
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
unmanned aerial systems
UAS
Systems architecture
systems analysis
system analysis and design
security of data
RF environment
Resilient Security Architectures
Resiliency
resilience
remotely located communicating devices
pubcrawl
mission success
mission objectives
mission assurance a challenging problem
Mission Assurance
Metrics
metric set
Measurement
high level system properties
Global Positioning System
embedded systems
design for cyber security
cyber-physical systems
cyber security
cyber resilience
CPS
computer security
best-practice security policies
autonomous aerial vehicles
attacker
attack surface
Assessment
ARES methodology
analytic process guides system developers
adversarial actors
biblio
WorkflowHunt: Combining Keyword and Semantic Search in Scientific Workflow Repositories
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
Compositionality
data analysis
metadata
Metadata Discovery Problem
Ontologies
pubcrawl
Resiliency
Scalability
Systems architecture
biblio
Challenges in the design of self-powered wearable wireless sensors for healthcare Internet-of-Things
Submitted by grigby1 on Wed, 03/08/2017 - 12:53pm
adaptive data rate sampling
batteries
biomedical electronics
biomedical transducers
circuit level innovation
clockless implementation
continuous-in-time and discrete-in-amplitude system architecture
CTDA system architecture
Electrocardiography
health care
healthcare Internet-of-Things
Internet of Things
IoT application
medical computing
optimisation
pubcrawl170110
self-powered wearable wireless sensor
SoC
system level optimization
system-on-chip
Systems architecture
Wearable sensors
Wireless communication
wireless sensor networks