Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
closed loop systems
biblio
Use of ADAR Method and Theory of Optimal Control for Engineering Systems Optimal Control
Submitted by grigby1 on Thu, 09/09/2021 - 9:01am
Mathematical model
Transient analysis
synergetic control theory
security
Resiliency
resilience
pubcrawl
optimal control
nonlinear control systems
ADAR method
Manifolds
Control Theory
control synthesis
composability
closed loop systems
Asymptotic stability
ADOR method
biblio
Abnormal Behavioral Pattern Detection in Closed-Loop Robotic Systems for Zero-Day Deceptive Threats
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
intrusion detection system
zero-day threats
zero-day deceptive attacks
Zero day attacks
Service robots
security of data
Resiliency
resilience
pubcrawl
Metrics
Intrusion Detection Systems
abnormal behavioral pattern detection
defense
deceptive attacks
cyber-physical systems
control engineering computing
composability
closed-loop robotic systems
closed loop systems
Anomaly Detection
abnormal behavioral pattern detection technique
biblio
Stabilization of Cyber Physical System exposed to a random replay attack modeled by Markov chains
Submitted by aekwall on Tue, 09/08/2020 - 10:00am
linear matrix inequalities
Chained Attacks
stochastic systems
stochastic stabilization
stabilization problem
random replay attack
packet losses
Markovian jump linear system
Markov chains
linear matrix inequality formulation
jumping parameters
communication delays
Numerical stability
Cyber Physical System
computer network security
closed loop systems
closed-loop system
CPS
Trajectory
stability
Linear systems
Markov processes
Stability analysis
delays
pubcrawl
Resiliency
cyber-physical systems
Scalability
biblio
Study of hardware trojans based security vulnerabilities in cyber physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
SCADA systems
IC industry
integrated circuits
invasive software
malicious modifications
Metrics
pubcrawl
reliable functionality
resilience
Resiliency
hardware-in-the-loop based simulation platform
secure functionality
security
Security Awareness
security vulnerabilities
simulations
software peripherals
threat models
Trojan horses
CPS modeling
closed-loop systems
completely virtual simulation platform
complex computing environment
composability
Computational modeling
computing chip
computing hardware design
computing platform
closed loop systems
critical CPS application
cyber physical systems
cyber-physical systems
gas pipeline based SCADA system
Hardware
hardware internals
Hardware Trojans
hardware-in-the loop simulation
biblio
A cyber physical power system co-simulation platform
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
power engineering computing
Voltage control
Synchronization
smart power grids
simulations
simulation
Routing protocols
Resiliency
resilience
real-time systems
pubcrawl
power system stability
power system simulation
power system security
power system control
Power Grid
automatic voltage control
Metrics
information and communication technology
hardware-in-the-loop simulation function
Hardware-in-the-loop (HIL)
hardware-in-the loop simulation
denial-of-service attack
cyber-attack
Cyber Physical System (CPS)
Cyber Physical System
cyber physical power system co-simulation platform
CPS modeling
control engineering computing
composability
closed loop systems
AVC
biblio
Event-triggered Control for Networked Control Systems Under Replay Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 4:41pm
Delay effects
Networked Control Systems Security
Stability analysis
robust event-triggered controller design method
replay attacks
nonlinear control systems
NCSs
general random replay attack model
event-triggering condition
event-triggered control
control signal
consecutive replay attacks
closed-loop system stability
control system synthesis
security
power system stability
Numerical models
Metrics
stability
closed loop systems
control systems
sensors
composability
networked control systems
Resiliency
resilience
pubcrawl
biblio
Security and Stability Control System Simulation Using RTDS
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
simulation test platform
dynamic simulation
Inner Mongolia
northern 500kV transmission channel
power system low frequency oscillations
power system simulation
real time digital simulation (RTDS)
real-time simulation
RTDS
security and stability control system
digital dynamic experimental model
stability control device
stability control devices
stability control strategy
stability control system simulation
Stability criteria
stability system
stable device
time digital simulation
Networked Control Systems Security
Metrics
pubcrawl
resilience
Resiliency
Circuit faults
composability
control systems
closed loop systems
power grids
power system control
security
Power Grid Network
power system stability
safe operation
stable operation
power transmission lines
Circuit stability
control characteristics
control system synthesis
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
biblio
Modelling, analysis and design of active queue management to mitigate the effect of denial of service attack in wired/wireless network
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Metrics
wireless sensor networks
wireless network
wired network
Time delay
telecommunication congestion control
TCP/AQM system
stochastic systems
stabilizing control syntheses
stability
Router Systems Security
Resiliency
resilience
queue router attacks
pubcrawl
active queue management
Markovian jump linear system
Linear systems
Guaranteed cost approach
feedback control
distributed denial of service attacks
denial of service attack
delays
delay-dependent conditions
DDoS Attacks
Congestion Control
computer network security
closed-loop system
closed loop systems
AQM security
biblio
Secure estimation for intelligent connected vehicle systems against sensor attacks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Acceleration
Security Risk Estimation
state estimator
sensor attacks
Sensor attack
intelligent control
Intelligent connected vehicles
intelligent connected vehicle system
Channel estimation
closed loop systems
secure estimation
vehicular ad hoc network
telecommunication control
wireless channels
connected vehicles
road vehicles
estimation
Human Factors
Stability analysis
cyber-attacks
Metrics
Wireless communication
Communication system security
vehicular ad hoc networks
telecommunication power management
wireless sensor networks
pubcrawl
Resiliency
telecommunication security
Scalability
1
2
next ›
last »