Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linear programming
biblio
Methodology for determining the energy deficit penalty function for hydrothermal dispatch
Submitted by grigby1 on Mon, 11/02/2020 - 11:41am
Linear programming
valor esperado condicional
sustainable development
Surges
security
Scalability
Reservoirs
pubcrawl
power system interconnection
power system economics
power generation planning
power generation economics
power generation dispatch
planejamento da operação
planejamento da expansão
objective function
Brazilian system
Input-Output Matrix
i/o systems security
i-o systems security
hydrothermal power systems
hydrothermal dispatch
hydroelectric reservoirs
hydroelectric power stations
government policies
função de penalização
energy deficits
energy deficit penalty function
Economics
economic deficit cost
custo de déficit
critério de suprimento
biblio
Resilience by Reconfiguration: Exploiting Heterogeneity in Robot Teams
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
mobile robots
simulated annealing method
simulated annealing
resource failure
Resiliency
resilience
quadrotors
pubcrawl
Path Planning
networked heterogeneous multirobot system
multi-robot systems
motion planning
active inter-robot communication links
mixed integer semi-definite programming
maximal resource distribution
Linear programming
inter-robot distances
integer programming
helicopters
graph theory
Computing Theory
communication topology
communication graph
biblio
An Efficient Recommender System by Integrating Non-Negative Matrix Factorization With Trust and Distrust Relationships
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
recommender system
user-item ratings
trust relationships
Task Analysis
Sparse matrices
social trust information
Social trust
social regularization method
security
Scalability
Resiliency
resilience
recommender systems
collaborative filtering
pubcrawl
optimization
nonnegative matrix factorization framework
MF-based recommenders
matrix factorization
Matrix decomposition
Linear programming
Human Factors
distrust relationships
convergence
computer theory
Complexity theory
biblio
Distributed Black-Box optimization via Error Correcting Codes
Submitted by grigby1 on Fri, 09/04/2020 - 4:11pm
convergence
Black Box Security
structured search directions
structured exploration methods
stragglers
Optimization methods
objective function
Linear programming
evolution strategies
error correcting codes
distributed black-box optimization
derivative-free optimization framework
deep convolutional neural networks
decoding step
telecommunication security
black-box adversarial attacks
Perturbation methods
Iterative methods
error correction codes
neural nets
encoding
Decoding
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
concave programming
brute force attacks
utility measure
privacy-preserving data release
privacy-leakage budget
piecewise linear techniques
piece-wise linear function
Mutual information
Linear programming
linear program
guessing leakage
f-information
data privacy
concave function
brute-force inference attacks
Markov processes
probability
policy-based governance
Entropy
Human Factors
sensitive data
optimization
pubcrawl
privacy
biblio
Fast Generation Redispatch Techniques for Automated Remedial Action Schemes
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
IEEE 24-bus system
automated intrusion response
automated remedial action schemes
contingency analysis
fast generation redispatch techniques
fast greedy algorithm
generation cost
generation redispatch
IEEE 118-bus systems
greedy algorithms
online application
online RAS applications
optimal power flow
power system operational security
power system resiliency
power systems resiliency
remedial action scheme
resilience-oriented optimal power flow
Generators
security of data
Resiliency
pubcrawl
composability
internet
optimisation
Mathematical model
Automated Response Actions
cyberattack
power engineering computing
power system security
failure analysis
Load flow
power generation dispatch
power system stability
Linear programming
biblio
Fast Reconfigurable Hash Functions for Network Flow Hashing in FPGAs
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
high-quality hash functions
Resiliency
resilience
Registers
reconfigurable hash function
reconfigurable design
reconfigurable architectures
pubcrawl
network flow hashing
multiobjective linear genetic programming
Monitoring
Linear programming
IP networks
Compositionality
high speed computer networks
hash function design
hash algorithms
hardware acceleration
Hardware
genetic programming
genetic algorithms
FPGA
field programmable gate arrays
field programmable gate array
fast reconfigurable hash functions
Cryptography
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Vulnerability Analysis of Smart Grid under Community Attack Style
Submitted by grigby1 on Fri, 04/24/2020 - 4:37pm
Community theory
Power Grid Vulnerability Assessment
Vulnerability Analysis
Power system protection
power system faults
power lines
Power Grid
Power cables
MLRM
minimum load reduction model
linear programming problem
Linear programming
information network
England 39 nodes system
cyber network
controllable power nodes
pubcrawl
community attack style
cascading failure process
cascading failure
failure analysis
Metrics
network topology
power system control
Smart Grids
Load modeling
composability
smart power grids
Smart Grid
Generators
Resiliency
resilience
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »