Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
model-based approach
biblio
D-IDS for Cyber-Physical DER Modbus System - Architecture, Modeling, Testbed-based Evaluation
Submitted by grigby1 on Fri, 04/09/2021 - 10:32am
IDS detection accuracy
cyber-physical DER Modbus devices
D-IDS
data-integrity attacks
DER
DER inverters
DER Modbus communication
discrete data points
DoS packets
DoS type attacks
hardware-in-the-loop
hardware-in-the-loop CPS DER
analog data points
IDS detection rate
IEEE 13-bus distribution grid
Modbus-specific IDS rule sets
model-based approach
native clear-text packet
open- source IDS rule syntax formats
physics-based threshold bands
testbed-based evaluation
time 0.25 ms
transaction-based threshold bands
CPS Security
pubcrawl
Resiliency
computer network security
Data models
Computational modeling
Smart Grid
standards
composability
Denial of Service attacks
Protocols
computer architecture
standard protocols
Syntactics
resilience
data integrity
timing
distribution networks
IDS
distributed energy resources
distributed intrusion detection system
Modbus
biblio
Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System
Submitted by BrandonB on Wed, 05/06/2015 - 12:25pm
Airports
early performance evaluation
externally observable security parameters
Identity management
Inspection
Magnetic resonance
measurable security effect maximization
model-based approach
Performance - security tradeoff
Performance modeling
performance sensitivity analysis
proactive model-based performance analysis
resource allocation
security
complicated control coordination
Analytical models
Atmospheric modeling
BIMS
Biological system modeling
security of data
security tradeoff mechanisms
sensitivity analysis
traveler arrival rate
traveler identification security guarantees
border inspection management system
Border security
complex system
biblio
Building Trust in the Human?Internet of Things Relationship
Submitted by BrandonB on Thu, 04/30/2015 - 12:30pm
digital systems
Internet of Things
Internet of Things relationship
IoT technologies
model-based approach
privacy
prototype implementation
security
Senior citizens
Smart homes
Trust management
Trusted Computing
trusted human-IoT relations