Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
Surrogate models assisted by neural networks to assess the resilience of networks
Submitted by grigby1 on Thu, 06/07/2018 - 3:06pm
Neural Network Resilience
Topology
topological metrics
targeted failures simulations
surrogate models
supervised learning
robustness analysis
Robustness
Resiliency
resilience
random failures simulations
pubcrawl
Optical Networks Resilience
Optical fiber networks
node failure simulations
Neural networks
ANN
neural nets
network resilience
network blocking probability
Network Assessment
Monte Carlo simulations
Monte Carlo methods
Measurement
link failure simulations
learning (artificial intelligence)
failure simulators
Entropy
Eigenvalues and eigenfunctions
computer networks
complex networks
Artificial Neural Networks
biblio
On optimal diversity in network-coding-based routing in wireless networks
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
packet transmissions
wireless sensor networks
wireless networks
Topology
single path routing protocol
Silicon
shortest path routing
Routing protocols
Routing
CTP
optimal diversity
opportunistic routing protocols
ONCR
network-coding-based routing
network coding
greedy algorithms
greedy algorithm
1536086
biblio
Vulnerability Analysis of Electrical Cyber Physical Systems Using a Simulation Platform
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
power grid vulnerability analysis
Vulnerability Analysis
Vulnerability
transmission lines
Topology
splitting incident
Simulation Platform
Resiliency
resilience
pubcrawl
protection procedure
power transmission
power system security
Power system protection
power system faults
power grids
cascading failure propagation
power grid system
Power Grid
Metrics
Mathematical model
Integrated circuit modeling
IEEE 39-bus system
Generators
framework
electrical cyber physical systems
ECPS
cyber-physical systems
Cyber Attacks
Compositionality
composability
Communication networks
biblio
Motif-Based Analysis of Power Grid Robustness under Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 12:29pm
network motifs
Topology
tools
subgraphs
Robustness
Resiliency
resilience
pubcrawl
power systems
power system networks
Power system dynamics
power system classification
power grids
power grid vulnerability analysis
power grid system
node degree distribution
building blocks
motifs
Motif-based analysis
Metrics
Measurement
local topological properties
local network structure
local dynamics
global network topology
fragility analysis
Europe
Compositionality
composability
complex networks
complex network
biblio
IPv6 Routing Protocol for Low-Power and Lossy Networks Implementation in Network Simulator \#x2014; 3
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
wireless sensor networks
Topology
telecommunication power management
RPL multiple instances
RPL
Routing protocols
Routing
reliable communication
pubcrawl
protocol verification
privacy
policy-based collaboration
Compositionality
physical environments
NS3
ns-3 implementation
network simulator
maintenance engineering
lossy networks implementation
lossy environments
Linear programming
IPv6 Routing Protocol
IP networks
Hardware
efficient energy management system
biblio
Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks
Submitted by el_wehby on Mon, 05/14/2018 - 4:07pm
physical attack mask
unobservable state-and-topology
two-stage optimization problem
two-stage optimization
Transmission line measurements
topology data
Topology
sub-network
state estimation
power systems
power system security
power system reliability
physical system consequences
Cyber-physical attacks
optimization
optimisation
Noise measurement
network topology
line outages
line failures
limited attack resources
false data injection attack
energy management
cyber-physical systems
cyber-physical system
1449080
biblio
A Multiple Paths Scheme with Labels for Key Distribution on Quantum Key Distribution Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
resilience
universal net topologies
trusted relay
Trust Routing
Topology
Three-dimensional displays
strategy of stochastic paths with labels
Stochastic processes
Scalability
Resiliency
combined security proportion
quantum key distribution network
quantum cryptography
pubcrawl
probability model
probability
multiple paths scheme with labels
multiple paths scheme
composability
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
biblio
Link Reliable and Trust Aware RPL Routing Protocol for Internet of Things
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
Scalability
QoS
QoS guarantees
quality of service
resilience
Resiliency
Routing
Routing protocols
RPL
pubcrawl
security
standardized protocols
telecommunication security
Topology
trust model
Trust Routing
trust value computation
composability
processing resources
power consumption
network routing topology
multidimensional approach
memory usage
low-power lossy networks
link reliable-trust aware RPL routing protocol
IoT environment
IoT entities
IoT
Internet of Things
heterogeneous devices
Energy Efficiency
deployed devices
Computational modeling
biblio
False data injection attack in smart grid topology control: Vulnerability and countermeasure
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
smart power grids
pubcrawl
real power flow measurement
reliability perspectives
renewable energy sources
residue based bad data detection
Resiliency
security of data
Smart Grids
smart grid topology control
power system state estimation
stability check
state estimation
Substations
system control operation
Topology
topology control
Transient analysis
vulnerability detection
Metrics
Compositionality
Conferences
crucial factor
cyber security issue
false data injection attack
FDIA
Human behavior
IEEE 24 bus reliability test system
Load flow
AC state estimation
modern power system
online stability check result
physical system stability
power engineering computing
power flow measurement
power system reliability
power system security
power system stability
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »