Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
set theory
biblio
Secret Sharing Schemes with Hidden Sets
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
Metrics
uniform distribution
telecommunication security
Shamirs secret sharing scheme
set theory
Resiliency
resilience
pubcrawl
Protocols
polynomials
polynomial
multifactor authentication
Analytical models
malicious dealer
interpolation
Human Factors
Human behavior
detect hidden sets
Cryptography
Cryptographic Protocols
cryptographic keys
Computers
Computational modeling
cloud providers
biblio
Asymptotically Optimal Pruning for Nonholonomic Nearest-Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
distance evaluations
tree searching
set theory
sampling-based motion planning algorithms
pruning techniques
Path Planning
optimal pruning
nonholonomic constraints
k-d tree algorithm
geodesic distance
explicit distance comparisons
exact Nearest-Neighbor Search
pubcrawl
differential geometry
computationally demanding task
asymptotic properties
asymptotic computational bottleneck
nearest neighbor search
search problems
computational complexity
nearest neighbour methods
Measurement
Metrics
mobile robots
biblio
Semi-Finite Length Analysis for Secure Random Number Generation
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
upper bounds
random key generation
STEM
Solids
semifinite length analysis
secure random number generation
secure key generation length
lower bounds
imperfect random numbers
asymptotic expansion
Upper bound
Scalability
set theory
random number generation
Lattices
Entropy
Distribution functions
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
operators defense cost reduction
distributed flexible AC transmission system devices
flexible AC transmission systems
game-theoretic approach
grids transmission line reactances
IEEE bus systems
links subset
MATPOWER simulator
Moving Target Defense strategy
MTD design criteria
D-FACTS device deployment
power transmission economics
power transmission lines
power transmission reliability
sensor measurements
systems operational time
Transmission line matrix methods
Transmission line measurements
undetectable line outages
Smart Grid Sensors
power engineering computing
security of data
telecommunication security
game theory
cyber-physical systems
Resiliency
pubcrawl
cost reduction
power grids
False Data Injection
cyberattack
power system security
Human Factors
state estimation
Compositionality
set theory
CCPA detection
Coordinate measuring machines
coordinated cyber-physical attacks detection
biblio
Fixed Point Computation by Exponentiating Linear Operators
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
linear operators
three-term control
set theory
Scalability
Resiliency
pubcrawl
piecewise linear techniques
PID controller
multivalued linear map
Linear systems
approximation
linear multivalued operators
Iterative methods
iterated functions
fixed point computation
fixed point arithmetic
exponentiation
control function
arbitrary time
approximation theory
biblio
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human behavior
telecommunication channels
set-theoretic control framework
set theory
Science of Security
Scalability
resilient control
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
internet
Human Factors
actuators
FDI attacks
encryption algorithms
Detectors
cyber-physical systems
cyber false data injection attacks
Cryptography
control remediation strategy
composability
Communication channels
collaboration
anomaly detector module
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
Anomaly Detection Using Persistent Homology
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Metrics
vulnerability detection
tools
Three-dimensional displays
summary statistics
statistical analysis
set theory
security of data
Resiliency
pubcrawl
Ports (Computers)
persistent homology
Anomaly Detection
IP networks
Indexes
Human Factors
Human behavior
dynamic point cloud
detection algorithms
Cybersecurity
cyber network
Compositionality
anomaly detection algorithm
biblio
Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
data sharing
set theory
secure data exchange
public network
pubcrawl170107
private key cryptography
private key attribute set
military aircraft
file sharing
encryption
electronic data interchange
data sharing systems
Access Control
Data Security
data encryption
data authentication
CP-ABE
confidentiality feature
ciphertext-policy attribute-based encryption
authentication feature
authentication
asymmetric encryption mechanism
Ad hoc networks
biblio
Towards a Set Theoretical Approach to Big Data Analytics
Submitted by BrandonB on Tue, 05/05/2015 - 1:24pm
H&M
text sentiment analysis
text analysis
tagging
SODATO
social networking (online)
social network analysis
Social Data Analytics
social data analytic tool
social big data analytics
set theory
set theoretical approach
relational sociology
Media
Mathematical model
Analytical models
graph theoretical approach
formal model
formal methods
fast fashion company
Facebook page
Facebook
data science
Data models
data analysis
conceptual model
Computational Social Science
Big Social Data
Big Data
« first
‹ previous
1
2
3
next ›
last »