Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human operators
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by aekwall on Mon, 12/02/2019 - 12:05pm
security
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
human-unmanned aerial vehicle
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
geolocation strategies
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
autonomous aerial vehicles
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
biblio
Integrity Assessment Scheme for Situational Awareness in Utility Automation Systems
Submitted by BrandonB on Fri, 05/01/2015 - 7:41am
graph theory
utility automation systems
Unsupervised Learning
Switches
state estimation
situational awareness
power systems
power distribution control
partial internal failure
multiagent technology
Monitoring
interconnected devices
integrity assessment scheme
IEEE 34-bus test distribution system
human operators
graph-theoretic fuzzy cognitive maps
advanced automation systems
fuzzy set theory
Fuzzy cognitive maps
fuzzy cognitive map
FCM
external damage
expert systems
event analysis
distributed intelligence
cognitive systems
Capacitors
automation system vulnerabilities
automation system
automation framework
automation
Artificial Intelligence
biblio
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust
Submitted by BrandonB on Thu, 04/30/2015 - 1:35pm
information flow security
Trusted Computing
trust state manipulation
Stuxnet attacks
Stuxnet
Software
security of data
security models
security
nondeducibility
multiple security domains nondeducibility
MSDND
Monitoring
modal model
modal frames
Analytical models
information flow disruption attacks
implicit trust
human operators
event system analysis
electronic monitors
doxastic logic
cyber-physical systems
cyber security
Cyber Physical System
CPS
Cost accounting
cognition
Bismuth
belief manipulation