Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber system
biblio
Wide-Area Damping Control Using Multiple DFIG-Based Wind Farms Under Stochastic Data Packet Dropouts
Submitted by grigby1 on Fri, 11/20/2020 - 1:54pm
observer-driven reduced copy approach
Communication channels
cyber system
damping performance
distributed phasor measurement units
Gilbert-Elliott model
Monte Carlo simulation
multiple DFIG-based wind farms
networked phasor measurement units
nonlinear time-domain simulations
phasor measurement
Observers
ORC
remote feedback signals
smart power grid
stochastic data packet dropouts
wide-area oscillation damping control
wind energy resources
wind power plants
Stochastic Computing Security
Stochastic processes
pubcrawl
resilience
Resiliency
computer network security
Scalability
power engineering computing
power system security
smart power grids
telecommunication channels
cyber-physical systems
asynchronous generators
power generation control
damping
power system stability
Monte Carlo methods
Communication Network
time-domain analysis
feedback
biblio
Accounting for the Human User in Predictive Security Models
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
security breaches
predictive security metrics
predictive security models
psychology
pubcrawl
quantitative security metrics
Science of Security
secure system
Security Audits
Predictive Metrics
security designs
Security Metrics
security of data
security researchers
social sciences
software metrics
system security
User behavior
General Deterrence Theory
Computational modeling
Computer crime
computer security
Computer simulation
Computers
Computing Theory
Cyber Attacks
cyber system
accounting
Human behavior
Human Factors
human user
Measurement
Metrics
modeling
Organizations
password security requirements policy
biblio
Data Generation and Analysis for Digital Forensic Application Using Data Mining
Submitted by BrandonB on Wed, 05/06/2015 - 10:38am
firewall logs
Web browser
transactional data
storage management
security
remote system forensic
packet captures
network traffic
network traces
network forensic analysis
network attack detection
memory forensic analysis
Log Data collection
intrusion detection system
FTK 4.0
firewalls
clustering
Digital Forensics
Digital forensic tool
digital forensic application
Databases
Data visualization
data storage
Data mining
data generation
Data collection
data analysis
cyber system
cyber crime huge log data
Computers
Computer crime