Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
Fast Generation Redispatch Techniques for Automated Remedial Action Schemes
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
IEEE 24-bus system
automated intrusion response
automated remedial action schemes
contingency analysis
fast generation redispatch techniques
fast greedy algorithm
generation cost
generation redispatch
IEEE 118-bus systems
greedy algorithms
online application
online RAS applications
optimal power flow
power system operational security
power system resiliency
power systems resiliency
remedial action scheme
resilience-oriented optimal power flow
Generators
security of data
Resiliency
pubcrawl
composability
internet
optimisation
Mathematical model
Automated Response Actions
cyberattack
power engineering computing
power system security
failure analysis
Load flow
power generation dispatch
power system stability
Linear programming
biblio
The Survey on Intellectual Property Based on Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
bitcoin
ip protection
transaction throughput
transaction anonymity
Time delay
Tamper-Resistance
resource consumption
Proof of Stake
optimization mechanisms
encryption algorith
cross-chain
copyrights
copyright
consensus mechanism
blockchain system
cryptocurrencies
optimisation
composability
Industries
internet
blockchain technology
intellectual property
optimization
Resiliency
resilience
policy-based governance
pubcrawl
Distributed databases
blockchain
biblio
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
key policy attribute based encryption
Vectors
searchable encryption
Scalability
pubcrawl
Probabilistic logic
policy-based governance
optimization
optimisation
KP-ABE-AE scheme
KP-ABE
key-policy attribute-based encryption with attribute extension
key-policy attribute-based encryption
Access Control
Iron
IPE schemes
Identity-based encryption
functional encryption scheme integration
functional encryption
fine-grained access control
encryption
Cryptography
collaboration
authorisation
access policy
access policies
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
An Algorithmic Approach to Highly Resilient SATCOM
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
optimisation
time-varying systems
Throughput
theoretic game
satellite communication
SATCOM networks
resource optimization
Resiliency
resilience
predictive analysis
optimization
Bandwidth
pubcrawl
military communication
Jamming
highly resilient SATCOM
generic SATCOM control loop
generic multivector structure
Games
game theory
Control Theory and Resiliency
biblio
Reasoning about Sequential Cyberattacks
Submitted by aekwall on Mon, 07/06/2020 - 10:15am
Human Factors
Cyber Dependencies
vulnerability dependencies
simulated vulnerability data
sequential cyberattacks
sequential chained attacks
NP-complete problem
fixed-point operator
cyber-attack modeling
cyber-adversary
cyber adversaries
Cost function
adversarial reasoning
computer systems
Compositionality
Scalability
cognition
Complexity theory
computational complexity
Lattices
Mathematical model
optimisation
Cybersecurity
Metrics
Computational modeling
Social network services
pubcrawl
Resiliency
invasive software
biblio
Automatic Generation of Hierarchical Contracts for Resilience in Cyber-Physical Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
resilience
Monitoring
multiobjective optimization problem
nonfunctional properties
numerous contracts
object-oriented programming
operating conditions
optimisation
power system stability
pubcrawl
rapid fault detection
Metrics
Resilience Decentralized Algorithms
Resiliency
root contract
Scalability
Silicon
system design
System Level
System performance
web services
Cyber Dependencies
cyber physical systems
Automatic Contract Generation
automatic contract refinement
automatic generation
communication overhead
Compositionality
Contract Synthesis
contracts
core issue
CPS resilience
cyber-physical systems
fault diagnosis
growing scale
hierarchical contract-based resilience framework
hierarchical contracts generation
Human Factors
large-scale CPS
lower-level contract
manufacturing domain
biblio
Cyber-Physical Emulation and Optimization of Worst-Case Cyber Attacks on the Power Grid
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Remote Terminal Units
optimisation
power control
power control area
power engineering computing
power grid operations
power grids
power system control
power system security
power system simulation
pubcrawl
notional electric system
Resiliency
SCADA systems
SCADA/ICS controls
Scalability
security of data
substation controlling
Substations
worst-case cyber attacks
worst-case loss
cyber-physical emulation
cyber physical systems
bulk electric system
Compositionality
control engineering computing
CrashOverride
CrashOverride malware
CrashOverride malware attack
Cyber Dependencies
cyber experiments
cyber interdiction optimization
CPS resilience
cyber-physical systems
DC optimal power flow
DC power transmission
design of experiments
Human Factors
interdiction optimization
load control
Load flow
Metrics
biblio
Resource Allocation for Threat Defense in Cyber-security IoT system
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT
Dynamical Systems
threat defense
resource allocation problem
optimal control variables
open loop solution
game theory
feedback solution
Dynamic scheduling
dynamic game
cyber-security IoT system
cyber-physical systems
Games
Internet of Things
Resiliency
Metrics
composability
pubcrawl
optimisation
Wireless communication
resource management
resource allocation
Mathematical model
security of data
security
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
real-time systems
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
memory efficient high-performance rotational image encryption
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
gpu
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
coalesce
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »