Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
delays
biblio
Detection of False Data Injection Attacks in smart grids based on cubature Kalman Filtering
Submitted by grigby1 on Tue, 07/05/2022 - 11:24am
delays
Square root cubature Kalman filter
cosine similarity
false data injection attacks
False Data Detection
Power measurement
Prediction algorithms
Smart Grids
Attack detection
pubcrawl
composability
Data models
Filtering
Heuristic algorithms
Resiliency
resilience
Human behavior
biblio
Quickest Detection of Stochastic False Data Injection Attacks with Unknown Parameters
Submitted by grigby1 on Tue, 07/05/2022 - 11:23am
Internet of Things
signal processing
pubcrawl
Human behavior
resilience
Resiliency
Data models
Computational modeling
composability
delays
Cybersecurity
Detectors
Numerical models
false data injection attacks
False Data Detection
Sequential change detection
biblio
INTCP: Information-centric TCP for Satellite Network
Submitted by grigby1 on Fri, 07/01/2022 - 1:18pm
Bandwidth
policy governance
clean slate
Satellites
satellite network
Technological innovation
TCP
ICN
Unicast
pubcrawl
Metrics
Congestion Control
delays
Jitter
Throughput
Resiliency
resilience
Human behavior
biblio
Distributed Control for Nonlinear Multi-Agent Systems Subject to Communication Delays and Cyber-Attacks: Applied to One-Link Manipulators
Submitted by aekwall on Fri, 07/01/2022 - 9:46am
simulation
delays
pubcrawl
Scalability
Resiliency
sufficient conditions
Quantization (signal)
Stability analysis
communication delays
cyber-attacks
Decentralized Control
manipulators
Nonlinear Multi-Agent
Single-Link Manipulators
Chained Attacks
biblio
Fault-tolerance to Cascaded Link Failures of Video Traffic on Attacked Wireless Networks
Submitted by aekwall on Fri, 07/01/2022 - 9:44am
Pandemics
Chained Attacks
wireless network
Traffic.
Routing Video
Link failure
Fraudulent Attacks
Fault-Tolerance
Enhanced Genetic Algorithm
delays
wireless networks
Fault tolerant systems
fault tolerance
Resiliency
Scalability
pubcrawl
Bandwidth
Routing
biblio
Configurable Butterfly Unit Architecture for NTT/INTT in Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:44pm
pubcrawl
resilience
Resiliency
field programmable gate arrays
Hardware
Scalability
Cryptography
delays
Metrics
resource management
Homomorphic encryption
Transforms
Human Factors
butterfly unit
Number theoretic transform (NTT)
ring learning with error
biblio
Confirmation of Mutual Synchronization of the TPMs Using Hash Functions
Submitted by grigby1 on Thu, 06/09/2022 - 2:37pm
Hash Function
tree parity machines
synchronization time
ping
learning rules
input neurons
Hebbian rule
Resiliency
delay
hash algorithms
hash
Hash functions
Cryptography
Network
Market research
Synchronization
graphics processing units
Compositionality
Task Analysis
Neural networks
delays
resilience
pubcrawl
encryption
biblio
An Efficient Congestion Control Model utilizing IoT wireless sensors in Information-Centric Networks
Submitted by grigby1 on Tue, 05/24/2022 - 3:55pm
composability
wireless sensor networks (WSNs)
Information-Centric Networking (ICN)
Future Internet (FI)
Congestion Control
information-centric networking
Internet of Things (IoT)
Compositionality
Metrics
Information Centric Networks
delays
pubcrawl
Wireless communication
telecommunication traffic
wireless sensor networks
Medical services
Scalability
Throughput
Resiliency
resilience
collaboration
Human behavior
biblio
Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
pubcrawl
resilience
Resiliency
Hardware
composability
delays
hardware trojan
Trojan horses
testing
Degradation
Time measurement
Memristive
memristors
Nano crossbar
Sneak Path
trojan horse detection
biblio
Deoxyribonucleic Acid Based Nonce-Misuse-Resistant Authenticated Encryption Algorithm
Submitted by grigby1 on Fri, 05/06/2022 - 10:33am
Metrics
nonce
Deoxys
Advanced Encryption Standard in Galois Counter mode (AES-GCM)
codes
DNA coding
DNA cryptography
DNA
resilience
computer architecture
network security
encoding
delays
privacy
Resiliency
Human behavior
pubcrawl
encryption
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »