Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linear programming
biblio
Object-Oriented Security Constrained Quadratic Optimal Power Flow
Submitted by grigby1 on Mon, 10/04/2021 - 3:03pm
composability
Contingency
distributed power generation
Linear programming
Load flow
Mathematical model
Metrics
Object oriented modeling
object oriented security
Object-Oriented Modeling
pubcrawl
Resiliency
security
Security Constrained Quadratic Optimal Power Flow
Sequential Linear Programming
Syntactics
biblio
Redundancy Cyber Resiliency Technique Based on Fast ReRouting under Security Metric
Submitted by grigby1 on Thu, 09/16/2021 - 11:50am
Bandwidth
cyber resilience
Fast ReRoute
Linear programming
Mathematical model
Measurement
Numerical models
probability
Probability of Compromise
pubcrawl
Redundancy
resilience
Resiliency
security metric
biblio
The Coordination of Dual Setting DOCR for Ring System Using Adaptive Modified Firefly Algorithm
Submitted by grigby1 on Wed, 08/11/2021 - 3:26pm
composability
Time dial setting
Pickup current
Dual setting protection scheme
Directional overcurrent relay
Adaptive modified firefly algorithm
Electrical Engineering
ip protection
Relays
Linear programming
IP networks
Circuit faults
optimization
Generators
Resiliency
resilience
collaboration
policy-based governance
pubcrawl
biblio
Impact of Minimizing the Eavesdropping Risks on Lifetime of Underwater Acoustic Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:59pm
pubcrawl
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater
security
Scalability
Resiliency
resilience
Receivers
batteries
optimization
Numerical models
network lifetime
Metrics
Linear programming
Energy Efficiency
eavesdropping attack
eavesdropping
Cyber Physical System
biblio
The Role of Combinatorial Mathematical Optimization and Heuristics to improve Small Farmers to Veterinarian access and to create a Sustainable Food Future for the World
Submitted by aekwall on Tue, 04/27/2021 - 1:34pm
Agriculture
Z3
Solvers
Pyomo
mathematical formulation
IoT device
Hanumayamma
GLPK
edge
CPLEX
Cow Necklace
CBC
Scalability
predictability
Security Heuristics
Linear programming
Artificial Intelligence
Unified modeling language
Mathematical model
optimization
pubcrawl
Resiliency
security
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding
Submitted by aekwall on Mon, 02/22/2021 - 1:41pm
natural language processing
word embedding-based feature extraction
word embedding techniques
word embedding
vanilla word embeddings
telecommunication traffic
security of data
security
Scalability
Resiliency
representative features
pubcrawl
network traffic logs
anomalous IP address detection algorithm
machine learning-based anomaly detection
Log Mining
Linear programming
learning (artificial intelligence)
IP networks
IP addresses
Human behavior
feature extraction
detection performance
Clustering algorithms
Anomaly Detection
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Joint Bidding and Geographical Load Balancing for Datacenters: Is Uncertainty a Blessing or a Curse?
Submitted by grigby1 on Tue, 12/01/2020 - 4:36pm
real-time systems
joint electricity procurement
Linear programming
Load management
market prices
Metrics
multiple geo
Policy Based Governance
price uncertainty
Pricing
Procurement
pubcrawl
joint bidding
realistic setting
resilience
Resiliency
resource allocation
Scalability
standards
strategic bidding
total electricity
uncertainty
wholesale markets
workloads
datacenters
bidding curve
Cloud Computing
cloud service provider
collaboration
composability
computer centres
convex programming
cost reduction
cost-saving performance
CSP
data centers
bandwidth cost
deregulated electricity market
Electricity supply industry
Geographic load balancing
geographical load balancing
GLB
Human behavior
Human Factors
IEEE transactions
Internet-scale Computing Security
Internet-scale service
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 2:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »