Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Foundations Of Resilient CybEr-physical Systems (FORCES)
Home
Members
Meetings and Reviews
Newsletters
Videos
NSF Acknowledgement
Resources
Files
CPS-VO
»
NSF Frontiers Projects
»
Foundations Of Resilient CybEr-physical Systems (FORCES)
» BIBLIO
Biblio
List
Filter
Show only items where
Author
Type
Term
Year
Keyword
is
Aarti Singh
Abhishek Dubey
Ákos Lédeczi
Ali Kakhbod
Ali Makhdoumi
Alvaro Cardenas
Amin Ghafouri
Amrutur Anilkumar
Anirban Bhattacharjee
Aniruddha Gokhale
Ariel Procaccia
Aron Laszka
Arul Moondra
Asuman Ozdaglar
Azarakhsh Malekian
Benjamin Gasser
Benjamin Johnson
Bernard Yett
Bo An
Bo Li
Bradley Malin
Bradley Potteiger
Brian Broll
Brian Gauch
Chao Yan
CheeYee Tang
Chris Gates
Csanad Szabo
Daniel Balasubramanian
Daniel Fabbri
Daniel Molzahn
Daron Acemoglu
Demos Teneketzis
Devendra Shelar
Dexter Watkins
Emeka Eyisi
Emmanouil Panaousis
Erik Miehling
Gabor Horvath
Gabor Karsai
Galina A. Schwartz
Gautam Biswas
George Rontidis
Goncalo Martins
Gonzalo Martins
Hamid Zare
Hamidreza Tavafoghi
Hamsa Balakrishnan
Harshad Khadilkar
Heath LeBlanc
Himanshu Neema
Ian Beil
Ian Hiskens
Jacob Avery
Jairo Giraldo
Janos Sztipanovits
Jeff Liu
Jennifer Marley
Jens Grossklags
Jian Lou
Jiani Li
Jiarui Gan
Jin Li
Jonathon Martin
Keith Stouffer
Kevin Roundy
Levente Buttyan
Lina Perelman
Lina Sela
Lina Sela Perelman
Long Ran
Maria Vrakopoulou
Mark Felegyhazi
Mark Yampolskiy
Mary Metelko
Mathieu Dahan
Michael B. Smith
Michael Fisher
MiklÓs MarÓti
Mingyi Zhao
Mohammad Rasouli
Nafaa Jabeur
Nicole Hutchins
Nika Haghtalab
Noam Hazon
Pasquale Malacaria
Peter Horvath
Peter Volgyesi
Pranav Srinivas Kumar
Richard Candell
Sagal Bhatia
Sajal Bhatia
Salman Nazir
Saqib Hasan
Saurabh Amin
Scott Backhaus
Shankar Sastry
Sherali Zeadally
Subhav Pradhan
Suli Zou
Tansu Alpcan
Tasos Dagiuklas
Thomas Maillart
Tihamer Levendovszky
Timothy Darrah
Varun Ramanujam
Waseem Abbas
William Emfinger
William Otte
Xenofon Koutsoukos
Xiangdong Liu
Xingyu Shi
Yevgeniy Vorobeychik
Yi Ouyang
Yining Wang
Yuan Xue
Yue Yin
Zhongjing Ma
Journal Article
Conference Paper
Conference Proceedings
Book Chapter
Report
Miscellaneous
Keywords - actuation capability
Keywords - actuators
Keywords - Adaptation models
Keywords - adversarial attacks
Keywords - adversary
Keywords - Analytical models
Keywords - anomaly detection systems
Keywords - Attacker Modeling
Keywords - attacker-defender games
Keywords - authentication mechanism
Keywords - authorisation
Keywords - blackouts
Keywords - Bluetooth
Keywords - Buildings
Keywords - Cascading Failures
Keywords - closed-loop systems
Keywords - communication overhead
Keywords - communication technologies
Keywords - Complexity theory
Keywords - computation overhead
Keywords - Computational modeling
Keywords - computer architecture
Keywords - computer network security
Keywords - computer security
Keywords - connected dominating set
Keywords - Consensus
Keywords - control
Keywords - control systems
Keywords - CPS attack experiments
Keywords - critical infrastructures
Keywords - Cryptography
Keywords - cyber components
Keywords - cyber physical systems
Keywords - cyber-attack
Keywords - cyber-attack effect evaluation
Keywords - cyber-attacks
Keywords - cyber-physical system
Keywords - cyber-physical systems
Keywords - cyber-security risks
Keywords - Cyber–physical systems (CPSs)
Keywords - cybersecurity design process
Keywords - Cyberspace
Keywords - Data mining
Keywords - defender modeling
Keywords - defense models
Keywords - Degradation
Keywords - denial-of-service attacks
Keywords - Distributed databases
Keywords - dominating set
Keywords - dominating sets
Keywords - embedded computers
Keywords - embedded systems
Keywords - energy management
Keywords - estimation
Keywords - Experimentation
Keywords - failure-prone circumstances
Keywords - fault tolerance property
Keywords - fundamental metrics
Keywords - game theory
Keywords - game-theoretic approach
Keywords - Games
Keywords - graph robustness
Keywords - Hardware
Keywords - hardware-in-the loop simulation
Keywords - hardware-in-the-loop
Keywords - hardware-in-the-loop simulation testbed
Keywords - hash based message authentication
Keywords - HIL testbed
Keywords - HMAC
Keywords - IIoT system security
Keywords - Industrial Internet of Things
Keywords - industrial platforms
Keywords - information and communication technologies
Keywords - information and communication technology
Keywords - integrated circuits
Keywords - internet
Keywords - Internet of Things
Keywords - Investment
Keywords - learning
Keywords - learning (artificial intelligence)
Keywords - learning and control for resilience
Keywords - Load modeling
Keywords - Local area networks
Keywords - Measurement
Keywords - message authentication
Keywords - message confidentiality
Keywords - message integrity
Keywords - mobile robots
Keywords - model based software development framework
Keywords - Model Integrated Computing
Keywords - modeling and simulation
Keywords - modeling and simulation integration platform
Keywords - Monitoring
Keywords - multitask estimation
Keywords - network connectivity
Keywords - network data communication
Keywords - network robustness
Keywords - network structure
Keywords - network theory (graphs)
Keywords - network topology
Keywords - networked control systems
Keywords - networked system control
Keywords - nonlocal information access
Keywords - performance evaluation
Keywords - physical components
Keywords - physical means
Keywords - physical system
Keywords - platform specific performance measurements
Keywords - power engineering computing
Keywords - power system faults
Keywords - Power system protection
Keywords - power system security
Keywords - power systems
Keywords - power transmission lines
Keywords - production engineering computing
Keywords - Protocols
Keywords - r-robustness
Keywords - railway transportation system
Keywords - Random faults
Keywords - Receivers
Keywords - Redundancy
Keywords - reliability property
Keywords - resilience
Keywords - resilient consensus
Keywords - resilient consensus protocol
Keywords - resilient cyber-physical systems
Keywords - Resilient diffusion
Keywords - resilient distributed consensus problem
Keywords - resilient IIoT systems
Keywords - robust graphs
Keywords - Robust monitoring diagnosis and network control
Keywords - robust network construction
Keywords - Robustness
Keywords - RTUs
Keywords - Safety
Keywords - safety property
Keywords - SCADA
Keywords - secure cyber-physical systems
Keywords - Secure Messages
Keywords - security
Keywords - security and resilience
Keywords - security economics
Keywords - security mechanisms
Keywords - security of data
Keywords - simulation environment
Keywords - Smart Grid
Keywords - smart infrastructure
Keywords - smart transportation systems
Keywords - social networking (online)
Keywords - Software
Keywords - software engineering
Keywords - Stackelberg Security Game
Keywords - structural robustness
Keywords - Substations
Keywords - Summer Camp in CPS Security
Keywords - SURE
Keywords - Switches
Keywords - Synchronization
Keywords - System Dynamics
Keywords - system functions
Keywords - system operators
Keywords - system properties
Keywords - System-security co-design
Keywords - Task Analysis
Keywords - telecommunication control
Keywords - telecommunication network reliability
Keywords - testbed
Keywords - Threat assessment and diagnostics
Keywords - time triggered architectures
Keywords - Time-Trigger Architectures
Keywords - time-triggered networked control systems
Keywords - timing behavior
Keywords - Topology
Keywords - Transportation
Keywords - Transportation Networks
Keywords - Tree graphs
Keywords - trusted nodes
Keywords - trusted nodes notion
Keywords - TTEthernet
Keywords - TTEthernet network
Keywords - Vanderbilt
Keywords - Vulnerability Analysis
Keywords - vulnerability assessment
Keywords - wireless channels
Keywords - wireless sensor networks
Submitted
2019
2018
2017
2016
2015
2014
actuation capability
actuators
Adaptation models
adversarial attacks
adversary
Analytical models
anomaly detection systems
Attacker Modeling
attacker-defender games
authentication mechanism
authorisation
Blackouts
Bluetooth
Buildings
Cascading Failures
closed-loop systems
communication overhead
communication technologies
Complexity theory
computation overhead
Computational modeling
Computer architecture
computer network security
computer security
connected dominating set
consensus
Control
control systems
CPS attack experiments
critical infrastructures
cryptography
cyber components
cyber physical systems
cyber-attack
cyber-attack effect evaluation
cyber-attacks
cyber-physical system
Cyber-physical systems
cyber-security risks
Cyber–physical systems (CPSs)
cybersecurity design process
Cyberspace
data mining
defender modeling
defense models
Degradation
denial-of-service attacks
Distributed databases
dominating set
dominating sets
embedded computers
Embedded systems
Energy management
Estimation
experimentation
failure-prone circumstances
fault tolerance property
fundamental metrics
game theory
game-theoretic approach
Games
graph robustness
Hardware
hardware-in-the loop simulation
Hardware-in-the-Loop
hardware-in-the-loop simulation testbed
hash based message authentication
HIL testbed
HMAC
IIoT system security
Industrial Internet of Things
industrial platforms
information and communication technologies
information and communication technology
integrated circuits
Internet
Internet of Things
Investment
learning
learning (artificial intelligence)
learning and control for resilience
Load modeling
Local area networks
Measurement
message authentication
message confidentiality
message integrity
mobile robots
model based software development framework
Model Integrated Computing
Modeling and Simulation
modeling and simulation integration platform
Monitoring
multitask estimation
network connectivity
network data communication
network robustness
network structure
network theory (graphs)
Network topology
networked control systems
networked system control
nonlocal information access
performance evaluation
physical components
physical means
physical system
platform specific performance measurements
power engineering computing
power system faults
Power system protection
power system security
Power systems
power transmission lines
production engineering computing
Protocols
r-robustness
railway transportation system
Random faults
Receivers
Redundancy
reliability property
resilience
resilient consensus
resilient consensus protocol
resilient cyber-physical systems
Resilient diffusion
resilient distributed consensus problem
resilient IIoT systems
robust graphs
Robust monitoring diagnosis and network control
robust network construction
Robustness
RTUs
Safety
safety property
SCADA
secure cyber-physical systems
Secure Messages
security
security and resilience
security economics
security mechanisms
security of data
simulation environment
Smart grid
smart infrastructure
smart transportation systems
social networking (online)
Software
software engineering
Stackelberg Security Game
structural robustness
Substations
Summer Camp in CPS Security
SURE
Switches
Synchronization
System Dynamics
system functions
system operators
system properties
System-security co-design
Task Analysis
telecommunication control
telecommunication network reliability
testbed
Threat assessment and diagnostics
time triggered architectures
Time-Trigger Architectures
time-triggered networked control systems
timing behavior
Topology
Transportation
Transportation networks
Tree graphs
trusted nodes
trusted nodes notion
TTEthernet
TTEthernet network
Vanderbilt
vulnerability analysis
vulnerability assessment
wireless channels
Wireless sensor networks