Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Springs
biblio
Multi-beam Physical Security Scheme: Security Assessment and Impact of Array Impairments on Security and Quality of Service
Submitted by grigby1 on Fri, 07/03/2020 - 3:55pm
amplification branch
antenna arrays
array impairments
array power gain increments
array signal processing
channel level
component signal
Compositionality
CSI
cyber physical systems
decomposition
envelope variations
fact constrains
high order constellation signals
Metrics
MIMO communication
mMIMO
multibeam physical security scheme
multilevel constellation
multiple-input multiple-output
perfect channel state information
Phase shift keying
power amplification
pubcrawl
quality of service
quasiconstant envelope signals
radio transmitters
Receivers
security assessment
signal components
Springs
telecommunication security
transmitting antennas
wireless channels
biblio
Mathematical Formulation and Implementation of Query Inversion Techniques in RDBMS for Tracking Data Provenance
Submitted by aekwall on Mon, 03/30/2020 - 10:32am
History
Resiliency
Human behavior
pubcrawl
composability
biology
Metrics
query processing
database
Databases
finance
relational databases
Flowcharts
Provenance
data provenance
RDBMS
data origin
data provenance finding
data provenance tracking
Data-Intensive Applications
inverse queries
inversion queries
mathematical formulation
mathematical formulations
Physics
query inversion techniques
relational algebra
relational algebra operations
relational database management system
Springs
unexpected results
biblio
Spring Boot Based REST API to Improve Data Quality Report Generation for Big Scientific Data: ARM Data Center Example
Submitted by grigby1 on Fri, 03/22/2019 - 11:59am
application program interfaces
application server
arm data center example
atmospheric radiation measurement data center
auto configuration
Big Data
big data security
computer centres
CRUD
CRUD web applications
data integrity
data quality report generation
Databases
enterprise applications
internet
Java
java framework
Metrics
natural sciences computing
popular Spring Boot java-based framework
production-grade Spring applications
pubcrawl
public domain software
resilience
Resiliency
rest
REST service API
Scalability
Servers
service-oriented architecture
spring boot
spring boot application
spring configuration
spring model-view-controller framework
Springs
tools
user interfaces
web application technologies
biblio
Evaluation of metrics of susceptibility to cascading blackouts
Submitted by grigby1 on Wed, 09/05/2018 - 9:42am
Security Metrics
pubcrawl
Measurement
power system security
matrix algebra
Monitoring
Correlation
network theory (graphs)
Metrics
Springs
power system planning
power system reliability
Stress
Computing Theory
Redundancy
blackouts
cascading blackouts
DFAX matrix
line outage distribution factor matrix
LODF matrix
power system faults
power system interconnection
Power system operation
Power system protection
power system redundancy
susceptibility metric evaluation
Western interconnection
biblio
Automated U.S diplomatic cables security classification: Topic model pruning vs. classification based on clusters
Submitted by K_Hooper on Wed, 01/10/2018 - 10:14am
adversarial environment
automated US diplomatic cables security classification
automatic unstructured text security class detection
cyberattacks
data infrastructure protection
data leak prevention system
Data protection
DLP system
Edward Snowden incident
Electronic mail
email leakage
feature extraction
government data processing
Human behavior
Insider Threats
natural language processing
pattern classification
printers
protection mechanism
pubcrawl
Resiliency
Scalability
security
security of data
sensitive information leaks
sensitive text data
Sensitivity
Springs
text analysis
text leakage
text security classification
topic model pruning
Training
untrusted channels
US government
WikiLeaks dataset
biblio
SDN data path confidence analysis
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
automated system protection services
autonomous systems
collaboration
competitors costs industry
Confidence Assessment
confidence score
configuration metrics
dependable network
domestic policy
foreign policy
internet
latent network problems
Measurement
multifactor indicator analysis
network behavior
network configuration
network operation
network path confidence analysis service
OpenFlow
policy-based governance
proprietary information
pubcrawl
remediation costs
Routing
SDN data path confidence analysis
SDN hybrid networks
secure network
Security Metrics
Security Policies Analysis
sensitive data
sensitive information
single metric indicator
software defined networking
Software-defined networking (SDN)
Software-Defined Networks
specific network path
Springs
stolen information
systemic network problems
time series
Time series analysis
time series data repository
tools
Traceroute
unauthorized access