Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Stability analysis
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
biblio
A Framework to embed the Unit Commitment Problem into Time Domain Simulations
Submitted by grigby1 on Thu, 07/16/2020 - 11:43am
power system security
unit commitment
time-domain analysis
time periods scheduling
time domain simulations
time domain simulation
Stability analysis
software framework
simulations
security
SCUC
rolling horizon
Resiliency
resilience
pubcrawl
power system stability
39-bus system
Power system dynamics
power system dynamic simulator
power generation scheduling
power generation dispatch
net-load variability
mixed-integer linear programming security constrained unit commitment problem
Metrics
Mathematical model
Load modeling
integer programming
Generators
frequency stability
CPS modeling
composability
biblio
A Cyber-Nuclear Deterrence Game
Submitted by grigby1 on Fri, 07/03/2020 - 12:43pm
nuclear brinksmanship
strategic stability
standard game theoretic model
stabilizing destabilizing effects
Stability analysis
security of data
reliability theory
preemptive cyber attacks
opponent cyber capabilities
offensive cyber weaponry
Nuclear weapons
nuclear states
nuclear command
asymmetric cyber capabilities
information structure
incomplete information games
Games
game theory
Deterrence
cyberattack
cyber-nuclear deterrence game
cyber capabilities conflict
critical component
complete information game
Bayes methods
biblio
Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
radiofrequency identification
wireless sensor networks
Throughput
telecommunication congestion control
tags collision
Tag matching
Tag group
Stability analysis
Smart tags
slot assignment algorithm
simulation
Resiliency
resilience
ALOHA algorithm
pubcrawl
object detection
Multitarget tags assignment slots algorithm
Multitarget RFID system
Multitag identification technique
Heuristic algorithms
Hash functions
Hash Function
hash algorithms
Compositionality
anti-collision algorithms
Anti-collision
biblio
Enabling Secure Voice Input on Augmented Reality Headsets using Internal Body Voice
Submitted by grigby1 on Thu, 06/04/2020 - 11:47am
speech-based user interfaces
primary input method
privacy
pubcrawl
resilience
Resiliency
security of data
smart phones
Speech recognition
multi-agent systems
Stability analysis
Synchronization
voice spoofing attack
voice verification techniques
voice-based input
voice-spoofing attacks
voice-spoofing defense system
voice-spoofing defense systems
human voices
AR headsets
augmented reality
augmented reality headsets
composability
cyber physical systems
Eigenvalues and eigenfunctions
handy recorders
Human Factors
Aerospace electronics
immersive systems
inaudible voice commands
internal body propagation
internal body voice
Laplace equations
Linear systems
liveness detection
biblio
Event-triggered Control for Networked Control Systems Under Replay Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 4:41pm
Delay effects
Networked Control Systems Security
Stability analysis
robust event-triggered controller design method
replay attacks
nonlinear control systems
NCSs
general random replay attack model
event-triggering condition
event-triggered control
control signal
consecutive replay attacks
closed-loop system stability
control system synthesis
security
power system stability
Numerical models
Metrics
stability
closed loop systems
control systems
sensors
composability
networked control systems
Resiliency
resilience
pubcrawl
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
file
Robust Verification of Cyber-Physical Systems
Submitted by Pavithra Prabhakar on Fri, 04/10/2020 - 10:15am. Contributor:
Pavithra Prabhakar
Robust Verification
hybrid systems
Stability analysis
stochastic systems
Lightning Talks
1854318
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
Secure estimation for intelligent connected vehicle systems against sensor attacks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Acceleration
Security Risk Estimation
state estimator
sensor attacks
Sensor attack
intelligent control
Intelligent connected vehicles
intelligent connected vehicle system
Channel estimation
closed loop systems
secure estimation
vehicular ad hoc network
telecommunication control
wireless channels
connected vehicles
road vehicles
estimation
Human Factors
Stability analysis
cyber-attacks
Metrics
Wireless communication
Communication system security
vehicular ad hoc networks
telecommunication power management
wireless sensor networks
pubcrawl
Resiliency
telecommunication security
Scalability
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 2:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »