Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
False Data Injection Attacks Targeting DC Model-Based State Estimation
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
power system state estimation
Transmission line measurements
Topology
state variable target
state estimation
specific targets
smart power grids
Smart Grid
security of data
secure operation
Scalability
Resiliency
resilience
Q measurement
pubcrawl
pre-specified meter target
adversary
power system security
power engineering computing
network topology
Metrics
Meters
Manganese
Human behavior
grid operator
false data injection attack
economic operation
DC model
cyber-attacks
attacking vector
Adversary Models
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
A Security Routing Protocol for Internet of Things Based on RPL
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
RPL network security
Resiliency
route discovery phase
Routing
Routing attack
routing attacks
Routing protocols
routing recurity
RPL based security routing protocol
pubcrawl
security
security problems
security routing protocol
telecommunication network topology
telecommunication security
test network
test prototype network
Topology
IP networks
collaboration
composability
data routing
flexible topological structure
hierarchical clustering network topology
intelligent device
Internet of Things
IoT
backup path
ipv6 security
lightweight IPv6 network routing protocol
Logic gates
M-RPL network
Metrics
multipath routing
network topology
biblio
Privacy-preserving consensus-based energy management in smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
smart grid consumer privacy
Algorithm design and analysis
convergence
energy management
Human behavior
Human Factors
privacy
pubcrawl
resilience
Resiliency
Scalability
Sensitivity
Smart Grid Privacy
Smart Grids
Topology
biblio
Multiple fault diagnosis in analog circuits using the indirect compensation theorem
Submitted by grigby1 on Thu, 02/15/2018 - 10:46am
public domain software
linear subcircuits
Metrics
multiple fault diagnosis
multiple faults diagnosis techniques
multiport networks
nullor
parameter estimation
Ports (Computers)
pubcrawl
linear network analysis
resilience
Resiliency
symbolic analysis
symbolic analysis process
symbolic circuit analysis
Topology
two-port network
Voltage measurement
equivalent circuits
Analog circuits
analogue circuits
circuit analysis computing
circuit determinant expressions
Circuit faults
circuit simulation
Cirsym freeware computer program
Current measurement
analog circuit diagnosis
fault diagnosis
generalized parameter extraction method
Human behavior
human factor
Human Factors
indirect compensation theorem
linear analog circuits
linear models
biblio
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching
Submitted by grigby1 on Tue, 02/06/2018 - 1:05pm
optimization
two-stage stochastic programming approach
Topology
Target Reconnaissance Attacks
stochastic programming
social networks analysis
social networking (online)
Social network services
social graph
Resiliency
Reconnaissance
pubcrawl
privacy
optimization problem
Adaptive Approximation Algorithms
online social networks
network topology
Network reconnaissance
near-optimal parallel batching
Max-Crawling
graph theory
data privacy
approximation ratio
Algorithm design and analysis
Adaptive Stochastic Optimization
adaptive reconnaissance attacks
adaptive monotonic submodular properties
biblio
Effects of Topology Information on Routing in Contention-Based Underwater Acoustic Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
Relays
Underwater acoustics
underwater acoustic networks
underwater acoustic communication
topology information
Topology
terrestrial wireless network topology information
telecommunication network topology
telecommunication network routing
telecommunication network reliability
routing efficiency
Routing
robust information distribution
retransmission reduction
Resiliency
Reliability
acoustic communication
pubcrawl
Protocols
propagation delays
opportunistic flooding approach
network topology
network simulations
Network reconnaissance
network protocols
mine countermeasures
local topology information
Load modeling
energy consumption
degree-of-topology information
contention-based channel access method
Ad-Hoc Network
biblio
Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid
Submitted by grigby1 on Tue, 01/23/2018 - 2:45pm
emulation
Intrusion Detection
Power measurement
process control
pubcrawl
Scalability
scalable
Scalable Security
security
Smart Grids
Topology
Training
biblio
Multi-agent based intrusion prevention and mitigation architecture for software defined networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
multi-agent system
Topology
Software Defined Networks
Software
security
Resiliency
real-time systems
pubcrawl
network topology
composability
Metrics
Knowledge engineering
Intrusion Detection
Human behavior
DDoS Attack Prevention
DDoS
computer architecture
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »