Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Generators
biblio
Authentication of k Nearest Neighbor Query on Road Networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:36pm
query processing
Voronoi diagram
visual databases
third-party service provider
spatial query integrity
Spatial databases
Spatial database outsourcing
smart phones
Roads
road networks
road network k-nearest-neighbor query verification technique
Artificial Neural Networks
query authentication
outsourcing
location-based services
k nearest neighbor query
Google Android mobile devices
Generators
Euclidean space
database outsourcing paradigm
computational geometry
authentication
biblio
A novel trust evaluation method for Ubiquitous Healthcare based on cloud computational theory
Submitted by BrandonB on Thu, 04/30/2015 - 1:33pm
Pragmatics
user profile attributes
uncertainty handling
uncertain reasoning
UH environment
ubiquitous healthcare
ubiquitous computing
TV
Trusted Computing
trust evaluation method
cloud computational theory
MIMICs
Medical services
MATLAB software
MATLAB
health care
Generators
Conferences
cloud theory
Cloud Computing
biblio
Model-Based Attack Detection and Mitigation for Automatic Generation Control
Submitted by BrandonB on Thu, 04/30/2015 - 1:27pm
power system operation reliability
Intrusion Detection Systems
kernel density estimation
model-based anomaly detection algorithm
model-based mitigation algorithm
network-based security technologies
physical system
Power measurement
power system control
power system frequency
host-based security technologies
power system reliability
power system stability
ramp attacks
scaling attacks
security of data
smart attack detection
smart attack mitigation
supervisory control and data acquisition
cyber-attack-resilient control techniques
Anomaly Detection
attack mitigation algorithm
attack resilient control
automatic generation control
critical assets protection
cyber layer
cyber security measures
cyber systems
AGC
data integrity
Data Integrity Attacks
electricity market operation
Electricity supply industry
electronic threats
frequency control
Frequency measurement
Generators
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Thu, 04/30/2015 - 11:54am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection
« first
‹ previous
…
14
15
16
17
18
19
20
21
22