Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system management
biblio
Micro grid Communication Technologies: An Overview
Submitted by aekwall on Fri, 01/20/2023 - 4:18pm
real-time systems
pubcrawl
Resiliency
composability
Power system protection
Smart Grids
renewable energy sources
Smart Grid
Predictive Metrics
Communications technology
communication infrastructure
communication technologies
Micro grid
Power supplies
power system management
Smart Grid Situational Awareness
biblio
A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit
Submitted by grigby1 on Mon, 01/25/2021 - 11:30am
power consumption
Voltage regulators
voltage regulator module
Voltage control
Switches
side-channel vulnerability
side-channel
security of data
Resiliency
resilience
Regulators
Receivers
pubcrawl
power system management
Power Management.
power management unit
Air gaps
Phasor measurement units
modern microprocessors
modern computers
microprocessor chips
Microarchitecture Vulnerability
microarchitectural vulnerability
Metrics
Human Factors
Human behavior
electromagnetic-based side-channel
electromagnetic emanations
DVFS
computer power supplies
composability
Capacitors
biblio
Non-intrusive Runtime Monitoring for Power System Intelligent Terminal Based on Improved Deep Belief Networks (I-DBN)
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
Cyber Attack Detection
power system management
power system intelligent terminal equipment
power system faults
Power management
power companies
nonintrusive runtime monitoring
nonintrusive data collection
nonintrusive business-level monitoring platform
improved deep belief networks
business-level security monitoring
business-level monitoring platform
Deep Belief Network
runtime monitoring
Power industry
Resiliency
fault diagnosis
Power Grid
power distribution
power meters
belief networks
power system measurement
data acquisition
fault detection
power system security
smart power grids
power system analysis computing
composability
pubcrawl
biblio
POWERT Channels: A Novel Class of Covert CommunicationExploiting Power Management Vulnerabilities
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
Resiliency
Power management
power management algorithms
power management vulnerabilities
power system management
POWERT channel capacity
pubcrawl
representative commercial systems
resilience
power headroom modulation
resource allocation
Runtime
runtime power management
Scalability
Software
system-wide shared resource
tight power budget
application performance requirements
Power demand
power aware computing
multiprocessing systems
Monitoring
microprocessor chips
instantaneous power demand timely
Hardware
critical shared resource
covert communication
covert channels
control systems
Compositionality
composability
channel capacity
bit rate 121.6 bit/s
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
biblio
Research of Security Risk in Electric Power Information Network
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
power engineering computing
synthesis evaluation model
styling
security weaknesses
security risk
security of data
Security Evaluation
risk management
risk assess
Resiliency
resilience
pubcrawl
Production
power systems
power system management
collaboration
policy-based governance
password
operating systems
network security
multilevel fuzzy comprehensive judgment
Metrics
Human Factors
Human behavior
fuzzy set theory
fuzzy judgment
evaluation index system
electric power information network
Communication networks
biblio
Security and privacy for smart grid using scalable key management
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
Public key
symmetric key technique
symmetric key scheme works
smart power grids
Smart Grids
Smart Grid
sensors
secure key management
Scalable Security
scalable key management
Scalability
replay attack
public key cryptography
authentication
pubcrawl
Protocols
power system security
power system management
Needham-Schroeder authentication protocol
Needham Schroder Authentication
man-in-the-middle attack
key management
Fault-Tolerance
fault tolerance
elliptic curve public key technique
Cryptographic Protocols
biblio
The achieve of power manager application honey-pot based on sandbox
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
power manager application honey-pot
Sandboxing technology
sandbox
pubcrawl170114
power systems
power system simulation
power system security
power system management
power system
application layer simulation
power manager application
Power industry
Packaging
implementation
honeypot
Decision support systems
cyber-attack reduction
attack capture method
biblio
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
operating systems (computers)
Substations
smart power grids
Smart Grid
Security Risk Management
security
SCADA Security
risk management
pubcrawl170108
pubcrawl170107
power system management
power system control
power grids
power engineering computing
Communication equipment
off-the-shelf vulnerable operating systems
noncooperative game theory
Non-cooperative Game Theory
Nash Equilibrium
Mathematical model
interdependent ICT
Games
game-theoretical model
game theory
electrical infrastructures
cyber-physical system
communication infrastructure
biblio
Robust optimization of risk for power system based on information gap decision theory
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
power system security
uncertainty
Robustness
robust optimization operation method
robust optimization of power system
risk optimization
risk management
risk control optimization
pubcrawl170108
pubcrawl170107
power systems
Decision support systems
power system risk control
power system management
Power industry
optimization
optimisation
nonprobabilistic uncertainties
Non-probabilistic uncertainty
information gap decision theory
IEEE-30 system
decision theory
1
2
next ›
last »