Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
sensors
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
Support vector machines
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
wireless sensor networks
composability
telecommunication computing
sensors
Denial of Service attacks
Floods
service attacks
Classification algorithms
neural nets
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
smart appliances
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
biblio
A Multi-Layered Network Model for Blockchain Based Security Surveillance system
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
blockchain
composability
distributed ledger
Metrics
Multi -layer Network Model
network accountability
Peer-to-peer computing
pubcrawl
resilience
Resiliency
security
Sensor Systems
sensors
surveillance
surveillance systems
biblio
Exploiting Symmetry in Dependency Graphs for Model Reduction in Supervisor Synthesis
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
Scalability
Resiliency
pubcrawl
graph theory
Metrics
Analytical models
cyber-physical systems
sensors
automata
data visualisation
Human Factors
Compositionality
actuators
discrete event systems
cyber-physical system
Discrete-Event Systems
Cyber Dependencies
dependency graphs
even unsolvable synthesis procedures
lengthy synthesis procedures
model reduction steps
reduced order systems
required computational time
supervisor synthesis
supervisory controller
synthesis problem
system components
tunnels
biblio
Naval cyber-physical anomaly propagation analysis based on a quality assessed graph
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
security of data
Scalability
Data models
cyber-physical systems
Resiliency
pubcrawl
graph theory
Computational modeling
Metrics
Analytical models
cyber-attacks
Anomaly Detection
sensors
Human Factors
Compositionality
programmable controllers
navigation
Cyber Dependencies
Marine vehicles
Anomalies
CPS anomalies
cyber-physical system
data and information quality
data streams
data-driven decision system
digital subsystems
information quality measures vectors
naval CPS
naval cyber-physical anomaly propagation analysis
naval engineering computing
naval propulsion management system
optimized supervisory control
programmable logical controller
propagation analysis
quality assessed graph
system graph
biblio
Industrial and Home Automation, Control, Safety and Security System using Bolt IoT Platform
Submitted by grigby1 on Wed, 02/03/2021 - 11:56am
Internet of Things
learning (artificial intelligence)
security of data
Cloud Computing
security
machine learning
pubcrawl
resilience
Resiliency
security system
Scalability
industrial control
control engineering computing
Industries
integrated circuits
Industrial Control Systems
production engineering computing
sensors
Safety
industrial automation
Temperature sensors
home automation
Internet of Things (IoT)
Pins
alert sub-system
Bolt IoT platform
cloud connectivity
Fasteners
home computing
Local Area Network (LAN)
machine-learning
safety systems
security subsystem
SMS
Temperature control
temperature data
temperature monitoring
biblio
LCA-ABE: Lightweight Context-Aware Encryption for Android Applications
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
Access Control
android encryption
attribute-based encryption
Context modeling
context-aware
encryption
Human behavior
Intelligent sensors
Metrics
mobile computing
Monitoring
privacy
pubcrawl
resilience
Resiliency
Scalability
security
sensors
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
security of data
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
program verification
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
ad-hoc sub-class
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
observable actions
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
biblio
Fuzzy Extractor-Based Key Agreement for Internet of Things
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
Scalability
Cryptography
Internet of Things
feature extraction
Resiliency
pubcrawl
Metrics
authentication
fuzzy set theory
public key cryptography
sensors
biometrics (access control)
Reed-Solomon codes
data exchange
secure authentication
fuzzy extractor
Hamming codes
Biometric cryptosystem
computation times
effective key agreement scheme
fuzzy extractor-based key agreement
fuzzy vault principle
IoT actors
key agreement
recognition rate results
Reed Solomon codes
transmission data
Fuzzy Cryptography
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 12:34pm
security
Trusted Computing
game theory
cyber-physical systems
pubcrawl
composability
Peer-to-peer computing
trust
Mathematical model
trustworthiness
security threats
information and communication technology
Games
sensors
Nash Equilibrium
game-theoretic approach
ICT
secure operation
CPS sensor nodes
information and communication technologies
biblio
Wireless Interrogation of High Temperature Surface Acoustic Wave Dynamic Strain Sensor
Submitted by aekwall on Mon, 12/21/2020 - 12:32pm
Scalability
Resiliency
Human behavior
pubcrawl
wireless sensor networks
Wireless communication
condition monitoring
sensors
data acquisition
wireless
acoustic wave
surface acoustic wave resonators
surface acoustic wave sensors
acoustic coupling
Temperature sensors
temperature 293.0 K to 298.0 K
temperature 25.0 degC
Aerodynamics
Bragg gratings
Condition-based Maintenance
dynamic strain excitation
dynamic strain sensing
dynamic strain sensor
fibre optic sensors
frequency 288.8 MHz
high temperature surface acoustic wave dynamic strain sensor
high-temperature harsh-environment applications
high-temperature harsh-environment sensor
high-temperature wired commercial strain gauge
monitoring dynamic strain
room temperature
SAWR dynamic strain sensors
sensor connection
sensor stability
Strain
strain gauges
strain measurement
strain sensors
structural engineering
structural health monitoring
temperature 100.0 degC
temperature 1000.0 degC
temperature 400.0 degC
wireless interrogation
wireless sensor operation
wirelessly interrogated SAWRs
1
2
3
4
5
6
7
8
9
…
next ›
last »