Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
simulation
biblio
Efficient Modeling of IEC-61850 Logical Nodes in IEDs for Scalability in CPS Security Testbed
Submitted by aekwall on Tue, 05/25/2021 - 3:20pm
Protocols
wide-area measurement system (WAMS)
Substations
security
Scalability
SCADA
Resiliency
Relays
real-time systems
pubcrawl
CPS modeling
Predictive Metrics
IEC-61850
Heuristic algorithms
hardware-in-the-loop
DNP3
cyber-physical system (CPS) testbed
CPS Modeling and Simulation
composability
simulation
biblio
A Feasibility Study of Cache in Smart Edge Router for Web-Access Accelerator
Submitted by aekwall on Tue, 05/18/2021 - 3:23pm
Topology
Study
smart edge router
Web Caching
Technological innovation
CDN
Time factors
Wireless fidelity
edge computing
IP networks
delays
simulation
Metrics
pubcrawl
Resiliency
Servers
Scalability
biblio
A Physical Layer Encryption Algorithm Based on Length-Compatible Polar Codes
Submitted by grigby1 on Wed, 05/05/2021 - 12:41pm
physical layer encryption
Vehicular and wireless technologies
simulation
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
polar codes
physical layer security
Analytical models
Metrics
length-compatible
Human Factors
Human behavior
Generators
generator matrix
frozen bits
encryption
collaboration
biblio
GDGCA: A Gene Driven Cache Scheduling Algorithm in Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
information distribution scheduling algorithm
data popularity
Distributed cache scheduling
future network architecture
GDGCA
gene driven cache scheduling algorithm
gene driven greedy caching algorithm
ICN edge router
ICN environment
ICN scenario
information centered concept
content cache replacement
information epilepsy
Information Gene
information gene value
information-centric network
optimal simulation model
Poisson data volumes
QoE index
satisfaction degree
self-caching network
user-centered concept
information entropy
Data models
Resiliency
pubcrawl
simulation
internet
resource allocation
telecommunication network routing
Throughput
ICN
Information Centric Networks
Scalability
scheduling
greedy algorithms
Stochastic processes
cache storage
Scheduling algorithms
telecommunication scheduling
information-centric networking
Accurate Poisson stream
cache capacity
Content analysis
biblio
EFM: An Edge-Computing-Oriented Forwarding Mechanism for Information-Centric Networks
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
edge computing
edge networks
forwarding strategy
Image edge detection
Information Centric Networks
information-centric networking
Logic gates
optimization
Packet loss
pubcrawl
Resiliency
Scalability
simulation
biblio
Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Games
optimized k selection
optimal anonymization level
k-anonymization technique
different Nash equilibria solutions
data record
game-theoretic framework
information loss
game-theoretic approach
game theoretic security
Predictive Metrics
Human Factors
Scalability
Mathematical model
simulation
privacy
privacy preservation
pubcrawl
Resiliency
game theory
security
Organizations
data privacy
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Data-driven fault model development for superconducting logic
Submitted by grigby1 on Tue, 03/16/2021 - 2:10pm
Analytical models
Circuit faults
clean slate
collaboration
fault diagnosis
Human behavior
Integrated circuit modeling
Manuals
Metrics
policy-based approach
pubcrawl
resilience
Resiliency
Semiconductor device modeling
simulation
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
Human behavior
simulation
security
reverse engineering
pubcrawl
policy-based governance
Logic gates
Intellectual Property (IP) Protection
integrated circuits
Human Factors
intellectual property security
High Efficiency
Force
Camouflage Integrated Circuit (IC)
brute force attacks
Brute Force Attack
Benchmark testing
Resiliency
composability
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »