Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
simulation
biblio
A Resilient Scheme for Mitigating False Data Injection Attacks in Distributed DC Microgrids
Submitted by aekwall on Thu, 12/01/2022 - 4:39pm
simulation
cooperative systems
Distributed databases
pubcrawl
Resiliency
Electric potential
Microgrids
Systems operation
cyber attack detection and mitigation
DC microgrid
distributed control
Energy conversion
Resilient Security Architectures
biblio
Physical Layer Security in Power Domain NOMA through Key Extraction
Submitted by aekwall on Thu, 12/01/2022 - 4:24pm
simulation
data privacy
Metrics
Resiliency
composability
Resistance
physical layer security
Data Security
spectral efficiency
NOMA
channel state information
Non-Orthogonal Multiple Access (NOMA)
superposition coding (SC)
biblio
Experimental Evaluation of a Modular Coding Scheme for Physical Layer Security
Submitted by aekwall on Thu, 12/01/2022 - 4:24pm
security
simulation
Measurement
Metrics
Resiliency
composability
encoding
Decoding
physical layer security
Error analysis
wiretap channel
modular scheme
Software-defined radio
biblio
Understanding the impact of cyber-physical correlation on security analysis of Cyber-Physical Systems
Submitted by grigby1 on Thu, 10/20/2022 - 3:37pm
Physical layer
interdependence
impact
Stochastic game
Costs
Resiliency
Stochastic Computing Security
q-learning
cyber-physical system
pubcrawl
simulation
Games
Security analysis
Stochastic processes
Scalability
Correlation
resilience
biblio
Transient Security and Dependability Analysis of MEC Micro Datacenter under Attack
Submitted by grigby1 on Thu, 10/20/2022 - 3:37pm
simulation
Transient analysis
Stochastic Reward Nets
quantitative analysis
Multi-access Edge Computing
Resiliency
Stochastic Computing Security
markov chain
Random access memory
security
Numerical models
Resistance
Virtual machining
Scalability
resilience
pubcrawl
Servers
biblio
Game-Theoretic Intrusion Prevention System Deployment for Mobile Edge Computing
Submitted by aekwall on Sun, 10/16/2022 - 6:04pm
simulation
IP networks
delays
Human Factors
Games
pubcrawl
Scalability
Predictive Metrics
denial-of-service attack
Pricing
Multi-access Edge Computing
game theoretic security
biblio
FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Mon, 10/03/2022 - 12:48pm
wireless networks
time slot assignment
relay selection
Backtracking
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
underwater acoustic sensor networks
Interference
simulation
pubcrawl
Compositionality
Routing
composability
privacy
Safety
Resiliency
resilience
Metrics
Human behavior
biblio
Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient
Submitted by grigby1 on Fri, 09/09/2022 - 2:23pm
simulation
wireless communication network security
time-frequency domain features
histogram of oriented gradient
variational mode decomposition
Resiliency
Zigbee
specific emitter identification
Time Frequency Analysis
Time-frequency Analysis
feature extraction
resilience
Histograms
Wireless communication
Scalability
performance evaluation
Metrics
pubcrawl
security
biblio
Edge Differential Privacy for Algebraic Connectivity of Graphs
Submitted by grigby1 on Fri, 08/26/2022 - 1:27pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
privacy
Topology
network topology
simulation
social networking (online)
differential privacy
consensus protocol
Control Theory
biblio
A Three-dimension Resilience State Space-based Approach to Resilience Assessment of CBTC system
Submitted by grigby1 on Fri, 08/26/2022 - 1:21pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
malware
control systems
fault tolerance
simulation
Three-dimensional displays
Human Factors
Resists
Control Theory
State-space methods
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »