Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
estimation theory
biblio
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin
Submitted by aekwall on Mon, 03/29/2021 - 10:50am
game theoretic security
stealthy estimation attack
Signaling Game with Evidence
physical system
online digital model
intelligent attackers
estimation theory
digital twin
Data-Integrity Attack
clandestine attack strategies
Chi-square detector
CPSS
defense strategies
Covariance matrices
game-theoretic approach
security of data
state estimation
Predictive Metrics
estimation
Human Factors
Games
control systems
pubcrawl
Resiliency
cyber-physical systems
game theory
Scalability
Monitoring
Detectors
biblio
Dynamically Reconfigurable Slice Allocation and Admission Control within 5G Wireless Networks
Submitted by grigby1 on Fri, 04/03/2020 - 11:19am
Radio Access Network
integrated user application-specific demand characteristics
intra-slice resource sharing elasticity
massive machine type communication
network characteristics evaluation
network load
network utility
online slice allocation model
quality of experience
heterogeneous traffic demand
resource allocation decision metric
resource allocation framework performance
resource management
service demand
slice resource block-size
ultra-reliable low-latency communication
predictive security metrics
Internet of Things
estimation theory
enhanced mobile broadband
Dynamic scheduling
dynamic intra-slice decision boundary estimation model
Bandwidth
admission control strategy
Admission control
5G wireless network
resource allocation
Metrics
telecommunication congestion control
telecommunication traffic
quality of service
5G mobile communication
pubcrawl
biblio
Actuator deception attack detection and estimation for a class of nonlinear systems
Submitted by grigby1 on Mon, 01/21/2019 - 11:30am
pubcrawl
H∞optimisation
H∞performance optimization
Human behavior
Metrics
Monitoring
nonlinear control systems
nonlinear discrete-time systems
nonlinear systems
estimation theory
Resiliency
Safety
Safety Monitoring System
security of data
state/output estimator
system running status monitoring
unknown deception attacks
unknown inputs
attack/attacker action estimator
active safety monitoring system
Actuator Deception Attack
actuator deception attack detection
actuator security
actuators
Attack detection
attack detector
Attack Estimation
active attack estimator
composability
control system analysis
control system synthesis
control systems safety
Detectors
discrete time systems
estimation
biblio
Kalman Filter with Diffusion Strategies for Detecting Power Grid False Data Injection Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 11:33am
security of data
power grid states estimation
power grid states measurement
power system measurement
power system security
power system state estimation
pubcrawl
resilience
Resiliency
power grid false data injection attacks
sensor networks
sensor readings
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
state estimation models
electronic power grid
Computer crime
control system signals
Detectors
diffusion Kalman filter
diffusion strategies
distributed estimation models
distributed Kalman filtering
distributed network
Compositionality
estimation
estimation theory
Human behavior
Human Factors
Kalman filters
Meters
power engineering computing
biblio
A Gradient-Based Pixel-Domain Attack against SVM Detection of Global Image Manipulations
Submitted by grigby1 on Mon, 03/19/2018 - 12:51pm
Nonlinear distortion
image enhancement
image filtering
limited knowledge
LK
median filtering
median filters
Metrics
noise figure 50 dB to 70 dB
Histograms
PSNR
pubcrawl
resilience
Resiliency
Scalability
Support vector machines
SVM detection
adaptive filtering
histogram stretching
high-dimensional SPAM features
gradient-based pixel-domain attack
gradient methods
gradient estimation
gradient descent methodology
global image manipulations
Forensics
forensic techniques
feature extraction
estimation theory
equalisers
Detectors
computational complexity
adaptive histogram equalization
biblio
PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices
Submitted by K_Hooper on Wed, 01/10/2018 - 10:09am
modulation
wearable computers
user personal portable devices
secure proximity estimation
Resiliency
pulse modulation
pubcrawl
proximity based continuous and secure authentication
Protocols
Portable computers
PCASA
password
acoustic communication
message authentication
Human behavior
fingerprint scan
estimation theory
estimation
differential pulse position modulation
composability
authorisation
authentication
Acoustic Fingerprints
Acoustic communication (telecommunication)
biblio
Dense Continuous-Time Tracking and Mapping with Rolling Shutter RGB-D Cameras
Submitted by grigby1 on Wed, 03/08/2017 - 12:54pm
pose estimation
trajectory optimization
trajectory estimation
Trajectory
Three-dimensional displays
splines (mathematics)
SLAM (robots)
SLAM
simultaneous localization and mapping
rolling shutter RGB-D camera
pubcrawl170110
B-spline
optimisation
image representation
Image reconstruction
image alignment
estimation theory
dense continuous-time tracking
continuous trajectory representation
Cameras
camera trajectory representation
biblio
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
internet
Trojan horses
trees (mathematics)
risk analysis
pubcrawl170109
probability estimation
probability
online financial service
Online banking
IRT
Computer crime
incident response tree
fraud prevention modelling
fraud
financial data processing
Europe
estimation theory
cyber criminal
conditional fraud value
biblio
Mapping of Dengue Outbreak Distribution Using Spatial Statistics and Geographical Information System
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
GIS
Urban areas
spatial statistics
Rivers
risk map
risk analysis
pubcrawl170108
pubcrawl170107
pattern classification
kernel density estimation
Kernel
KDE
Aedes mosquito-borne disease
geographical information system
geographic information systems
estimation theory
estimation
diseases
dengue fever outbreak distribution
data analysis
buffer analysis
average nearest neighbor
Artificial Neural Networks
ANN
biblio
Evaluating the complexity and impacts of attacks on cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
estimation theory
time-to-shutdown
Sensor phenomena and characterization
security risks
security of data
security attributes
quantitative security evaluation
pubcrawl170108
pubcrawl170107
process control
probability
modeling
graph theory
actuators
cyber-to-physical attack
cyber-to-cyber attack
cyber-physical systems
cyber-physical system security
cross-domain attack
CPS
consequence estimation process
Computer crime
attack probability
attack graph
attack consequences
1
2
next ›
last »