Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integer programming
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Lifetime Analysis of Underwater Wireless Networks Concerning Privacy with Energy Harvesting and Compressive Sensing
Submitted by aekwall on Mon, 10/26/2020 - 11:03am
lifetime analysis
underwater acoustic communication
energy harvesting
compressive sensing
civil operations
classical wireless sensor networks
improved network lifetime
integrated limited batteries
invasion detection
lifetime
compressed sensing
listening
mixed integer programming model
novel encryption decision method
silent positioning
underwater life monitoring
underwater sensor nodes
Underwater Wireless Networks
Location Privacy in Wireless Networks
energy conservation
encryption
data privacy
Resiliency
Human behavior
pubcrawl
batteries
wireless sensor networks
privacy
Cryptography
telecommunication power management
Metrics
optimization
Energy Efficiency
military operations
Compositionality
integer programming
UWSN
biblio
Resilience by Reconfiguration: Exploiting Heterogeneity in Robot Teams
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
mobile robots
simulated annealing method
simulated annealing
resource failure
Resiliency
resilience
quadrotors
pubcrawl
Path Planning
networked heterogeneous multirobot system
multi-robot systems
motion planning
active inter-robot communication links
mixed integer semi-definite programming
maximal resource distribution
Linear programming
inter-robot distances
integer programming
helicopters
graph theory
Computing Theory
communication topology
communication graph
biblio
A Security-Constrained Islanding Feasibility Optimization Model in the Presence of Renewable Energy Sources
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
pubcrawl
off-line evaluation
optimal control
optimal control actions
optimization
possible islanding event
power distribution control
power distribution faults
power grids
power system security
power systems
Numerical models
renewable energy sources
representative HV subtransmission grid
RES available
resilience
Resiliency
security-constrained islanding feasibility optimization model
simulations
Smart Grids
supplied load
Wind farms
islanded operation feasibility
composability
CPS modeling
distributed power generation
dynamic simulations
frequency control
Generators
genetic algorithms
HV subtransmission level
integer programming
Islanded Operation
actual islanding
islanding conditions
load/generation shedding
loads
long-term security
Mathematical model
Metrics
mixed integer nonlinear problem
network operation
nonlinear programming
biblio
A Framework to embed the Unit Commitment Problem into Time Domain Simulations
Submitted by grigby1 on Thu, 07/16/2020 - 10:43am
power system security
unit commitment
time-domain analysis
time periods scheduling
time domain simulations
time domain simulation
Stability analysis
software framework
simulations
security
SCUC
rolling horizon
Resiliency
resilience
pubcrawl
power system stability
39-bus system
Power system dynamics
power system dynamic simulator
power generation scheduling
power generation dispatch
net-load variability
mixed-integer linear programming security constrained unit commitment problem
Metrics
Mathematical model
Load modeling
integer programming
Generators
frequency stability
CPS modeling
composability
biblio
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Submitted by grigby1 on Tue, 02/18/2020 - 11:06am
resilience
Virtualization
virtualisation
virtual security function
software-defined networking
software defined networking
smart power grids
Smart Grids
Servers
security function virtualization
security
SDN-enabled smart grid
SDN security
Scalability
Resiliency
Bandwidth
pubcrawl
power system security
power engineering computing
nonlinear programming
moving target defense
Monitoring
Metrics
integer programming
integer nonlinear programming problem
dynamic defense methods
computer network security
Communication networks
centralized SDN controller
biblio
Data Caching Optimization in the Edge Computing Environment
Submitted by grigby1 on Tue, 02/18/2020 - 10:55am
mobile users
information retrieval
Integer Problem (IP)
integer programming
integer programming problem
Metrics
mobile computing
mobile data traffic
mobile devices
Energy Efficiency
network delay reduction
Page-Hinckley-Test (PHT)
resilience
Resiliency
Scalability
service provider
Web Caching
pubcrawl
edge servers
edge computing environment
edge computing
delays
data popularity
data optimization
data handling
data caching problem
data caching optimization
data cache problem
data access latency
data access
Cloud Computing
centralized cloud
cache storage
biblio
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
primary safety requirement
Benders decomposition algorithm
bi-level integer programs
DSPTI
dynamic defense strategy
Loss measurement
model predictive control strategy
multi-stage dynamic game
predictive control
advanced persistent threat attacks
Real-Time Decision Making
shortest-path tree interdiction Stackelberg game
specialized anti-malware program
SSPTI
static game
stealth malware propagation
Zero Day Attacks and Defense
Safety
APT attacks
CPS
integer programming
Predictive Metrics
Games
Decision Making
composability
pubcrawl
Resiliency
cyber-physical systems
invasive software
game theory
security
malware
Conferences
biblio
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
mobile computing
generation IoT-based services
greedy algorithm
greedy algorithms
integer programming
Internet of Things
IoT
IoT applications
location awareness
mixed integer nonlinear optimisation
FogAtlas
nonlinear programming
optimization
placement
pubcrawl
raw data transfers
Resiliency
resource allocation
Scalability
delays
Bandwidth
central cloud
Cloud Computing
cloud computing technology
cloud module
communication demands
Computation offloading
Containers
app-aware placement
dynamic computation
edge computing
edge devices
fog application
Fog computing
Fog Computing and Security
fog computing platform
fog module
biblio
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework
Submitted by aekwall on Mon, 12/30/2019 - 11:16am
Internet of Things
Task Analysis
Servers
security-sensitive computation task
security of data
security
Scalability
resource allocation
Resiliency
pubcrawl
mobile computing
mixed integer programming multicommodity flow
Mixed integer programming
joint offloading approach
IoT application
IoT
Bandwidth
integer programming
greedy algorithms
greedy algorithm
fog-cloud provider
fog-cloud framework
Fog-cloud computing
Fog Computing and Security
delays
delay-aware secure computation offloading mechanism
Computational modeling
computation resources
computation offloading problem
completion delays
Cloud Computing
1
2
3
next ›
last »