Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power control
biblio
Privacy-Preserving Cloud Data Model based on Differential Approach
Submitted by grigby1 on Fri, 06/30/2023 - 2:47pm
privacy
power control
privacy preservation
classification
image recognition
differential privacy
Cloud Computing
composability
Protocols
Support vector machines
Scalability
Radio frequency
Resiliency
resilience
Human behavior
pubcrawl
machine learning
biblio
Vulnerability Assessment of Power System Under N-1 Contingency Conditions
Submitted by grigby1 on Fri, 02/03/2023 - 2:41pm
security
pubcrawl
Metrics
resilience
Resiliency
Indexes
Computers
composability
Measurement
uncertainty
power grids
power control
power grid vulnerability analysis
Cascading Index
power flow
Vulnerability Metrics
biblio
Resource Allocation Scheme for Secure Transmission in D2D Underlay Communications
Submitted by grigby1 on Mon, 02/07/2022 - 3:49pm
simulation
Microelectronics Security
Secure-aware
power control
Physical lay security
Device-to-Device(D2D)
Microelectronics
Systems architecture
physical layer security
pubcrawl
Receivers
composability
Cellular networks
performance evaluation
Resiliency
resilience
Metrics
biblio
Model-based simulation and threat analysis of in-vehicle networks
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
intelligent navigation
automated controls
automobile industry
automotive systems
connectivity interfaces
Controller area network (CAN)
cyber-security risks
driving experience
in-vehicle features
in-vehicle networks
air pollution
model-based design
network simulation
operational errors
rapid pace
safety systems
SDN technologies
security assessment
software defined networking technologies
threat analysis
vehicular ad hoc networks
security of data
computer network security
Internet of Things
real-time systems
Time measurement
software defined networking
cyber-physical systems
Resiliency
pubcrawl
IoT
security threats
sensors
Threat Landscape
security risks
Atmospheric modeling
controller area network security
power control
network data
adequate testing
biblio
Cyber-Physical Emulation and Optimization of Worst-Case Cyber Attacks on the Power Grid
Submitted by aekwall on Mon, 07/06/2020 - 9:14am
Remote Terminal Units
optimisation
power control
power control area
power engineering computing
power grid operations
power grids
power system control
power system security
power system simulation
pubcrawl
notional electric system
Resiliency
SCADA systems
SCADA/ICS controls
Scalability
security of data
substation controlling
Substations
worst-case cyber attacks
worst-case loss
cyber-physical emulation
cyber physical systems
bulk electric system
Compositionality
control engineering computing
CrashOverride
CrashOverride malware
CrashOverride malware attack
Cyber Dependencies
cyber experiments
cyber interdiction optimization
CPS resilience
cyber-physical systems
DC optimal power flow
DC power transmission
design of experiments
Human Factors
interdiction optimization
load control
Load flow
Metrics
biblio
Two Methods for Authentication Using Variable Transmission Power Patterns
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
pattern locks
Human behavior
Scalability
Resiliency
Access Control
authentication
Communication system security
Hardware
Mathematical model
power control
pubcrawl
Relays
source authentication
variable power
wireless authentication
Wireless communication
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 11:26am
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
biblio
Optimizing Performance of Anonymity Based Secure Routing Protocol Utilizing Cross Layer Design for Mobile Adhoc Networks
Submitted by grigby1 on Mon, 08/26/2019 - 10:09am
power control
telecommunication security
telecommunication network topology
telecommunication control
SHORT
secure cross layer routing protocol
secure cross layer based power control protocol
SCLPC protocol
SCLPC
Routing protocols
Routing
Resiliency
resilience
pubcrawl
anonymity based Secure routing protocol
optimizing route technique
Mobile adhoc Network
mobile ad hoc networks
MANET
delays
Cryptography
Cross Layer Security
Cross layer designs
Cross layer design
cross layer based designs
composability
anonymous secure routing
biblio
A Multi-channel MAC Protocol in Underwater Acoustic Sensor Networks
Submitted by K_Hooper on Wed, 09/27/2017 - 12:24pm
medium access control protocol
Metrics
multi-channel
power control
pubcrawl
Resiliency
scalabilty
Underwater Networks
UWASNs
biblio
Network-Wide Optimization of Uplink Fractional Power Control in LTE Networks
Submitted by grigby1 on Wed, 03/08/2017 - 12:56pm
network-wide optimization
uplink transmitter
uplink fractional power control
Uplink
telecommunication control
Signal to noise ratio
radiofrequency interference
radio transmitters
pubcrawl170110
power control
optimization
optimisation
next generation networks
next generation cellular networks
Bandwidth
network optimization
multiKPI optimization problem
LTE networks
Long Term Evolution
Load modeling
key performance indicators
interference environment
Interference
FPC parameters
discrete optimization problem
dense deployment
coordinate interference
cellular radio
1
2
next ›
last »