Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
actuators
biblio
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 12:07pm
linear system control
Vectors
system stabilization
state estimation
stability
Sensor Systems
sensor attacks
security of data
secure local control loop
secure cyber-physical system estimation
secure cyber-physical system control
resilient state estimators
resilient output feedback controller design
Linear systems
actuators
feedback controller
feedback control loops
feedback
fault tolerant control
estimation
Decoding
critical infrastructures
critical infrastructure
control system synthesis
compressed sensing
Algorithm
adversarial attacks
biblio
An Integrated WSAN and SCADA System for Monitoring a Critical Infrastructure
Submitted by BrandonB on Thu, 04/30/2015 - 12:07pm
power system measurement
wireless sensor networks
wireless sensor and actuator networks (WSAN)
wireless sensor and actuator networks
Web-based SCADA
web services
surveillance
supervisory control and data acquisition systems
supervisory control and data acquisition (SCADA) systems
Substations
security
SCADA systems
SCADA system
remote monitoring
Protocols
actuators
power grids
power engineering computing
multihop WSAN
Monitoring
Logic gates
internet
integrated WSAN
gateway
electrical power grid
critical infrastructures
critical infrastructure monitoring
Critical infrastructure (CI) monitoring
control engineering computing
CI
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Thu, 04/30/2015 - 12:05pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Robust H #x221E; cyber-attacks estimation for control systems
Submitted by BrandonB on Thu, 04/30/2015 - 11:59am
Markovian stochastic process
Symmetric matrices
stochastic systems
Stochastic processes
stochastic data DoS attack
stochastic data deception attack
stochastic cyber-attacks
Robustness
robust H∞ cyber-attacks estimation
robust control
quadruple-tank process
QTP
actuators
Markov processes
LMI
linear matrix inequalities
H∞ filters
H∞ filter
H∞ control
estimation
Cyber Attacks
control systems
control system synthesis
Computer crime
biblio
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
Submitted by BrandonB on Thu, 04/30/2015 - 11:58am
malicious unmanned air vehicles
Weapons
unmanned air vehicles (UAVs)
uav
sensors
security of data
security
reckless attacker behaviors
random attacker behaviors
Pricing
opportunistic attacker behaviors
multiagent system
multi-agent systems
Monitoring
actuators
malicious attacks
Intrusion Detection
IDS
Gears
distributed system
BRUIDS
behavior rule specifications
autonomous aerial vehicles
ant-colony clustering model
ant colony optimisation
airborne system
adaptive intrusion detection
biblio
Research of stability control of distributed drive electric vehicles under motor failure modes
Submitted by BrandonB on Thu, 04/30/2015 - 11:57am
permanent magnet motors
Wheels
vehicles
vehicle security
Vehicle safety
vehicle control
Torque
synchronous motors
stability control
Stability analysis
permanent magnet synchronous motor
actuator reliability
motor failure modes
Motor failure
machine control
Electric Vehicles
distributed drive electric vehicles
DC motors
Control allocation algorithm
CarSim environment
actuators
biblio
Combating False Data Injection Attacks in Smart Grid using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:55am
Kalman filters
χ2-square detector
state process
smart power grids
smart power grid security
Smart Grids
sensors
security
predictor variable series
power system state estimation
power system security
power system faults
power system
power engineering computing
Mathematical model
actuators
Kalman filter
fault diagnosis
fault detection
false data injection attack detection
Euclidean distance metrics
Euclidean detector
Equations
electric sensing devices
DoS attacks
Detectors
control systems
computer network security
communication infrastructure
« first
‹ previous
…
2
3
4
5
6
7
8
9
10