Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Dynamical Systems
biblio
Privacy in Feedback: The Differentially Private LQG
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
CPS
CPS Privacy
trajectory control
state trajectory
optimal feedback control values
malicious advisory
LQR problem
LQG problem
linear-quadratic-Gaussian problem
linear quadratic Gaussian control
interacting agents
infinite-horizon linear-quadratic-regulator problems
feedback privacy
Feedback loop
cloud computer
Cloud Computing
numerical simulation
numerical analysis
optimal control
Trajectory
Sensitivity
Dynamical Systems
Human Factors
cyber physical systems
feedback
privacy
pubcrawl
Human behavior
cyber-physical systems
data privacy
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by aekwall on Tue, 09/08/2020 - 10:11am
chaotic communication
reconfigurable hardware
random number sequence
human body
Hopfield neural networks
Hopfield neural nets
encryption circuit
dynamic systems
chaotic synchronization
chaotic signal simulation
asymmetric cryptography method
reconfigurable architectures
chaotic cryptography
field programmable gate arrays
Predictive Metrics
Dynamical Systems
random number generation
Neural networks
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
Cryptography
FPGA
biblio
Resource Allocation for Threat Defense in Cyber-security IoT system
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT
Dynamical Systems
threat defense
resource allocation problem
optimal control variables
open loop solution
game theory
feedback solution
Dynamic scheduling
dynamic game
cyber-security IoT system
cyber-physical systems
Games
Internet of Things
Resiliency
Metrics
composability
pubcrawl
optimisation
Wireless communication
resource management
resource allocation
Mathematical model
security of data
security
biblio
An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
security event database
intelligent defense
Network Security Architecture
pubcrawl
Resiliency
resource allocation
security
security architecture
security capability pool
security decision center
intelligent cyberspace defense architecture
security load
security of data
security payload
security resource allocation
Software
top-level security framework
unprecedented hard situation
versatile cyberspace
containerization technology
Metrics
Dynamic Networks and Security
aggregated security events
Cloud Computing
cloud computing platform
computer architecture
container library
containerization
composability
Containers
Cyberspace
decision rule base
dynamic container orchestration
Dynamic decision making
Dynamical Systems
elastic resource infrastructure
Hardware
biblio
Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
neural network
wavelet transforms
wavelet transform
unauthorized external influences
signal processing security
security of data
security management process
Resiliency
pubcrawl
privacy
Neural networks
Dynamical Systems
neural nets
Metrics
mathematical modeling
information system
impact
dynamic analysis
conflict
composability
adaptive response unit
biblio
Hardware Implementation of A Chaotic Pseudo Random Number Generator Based on 3D Chaotic System without Equilibrium
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
lightweight systems
chaotic pseudorandom number generator
cryptography systems
deterministic chaotic systems
digital communication
digital communication systems
dynamical behavior
Dynamical Systems
Hardware Implementation
chaotic dynamics
low computational overhead
low-cost chaotic hardware
low-cost hardware platforms
simple nonlinear systems
three-dimensional chaotic flows
Three-dimensional displays
chaotic cryptography
field programmable gate arrays
chaotic behaviors
chaotic based digital systems
3D chaotic system
3D chaotic flows
chaotic communication
Predictive Metrics
random number generation
Generators
Mathematical model
composability
pubcrawl
Resiliency
embedded systems
Hardware
Cryptography
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
Dynamic programming for solving unit commitment and security problems in microgrid systems
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
renewable energy
Microgrids
power generation dispatch
power generation economics
power generation planning
power generation scheduling
power system security
pubcrawl
Reliability
microgrid systems
Resiliency
security
security problem
Smart Grid
Smart Grids
UC problem
unit commitment
unit commitment problem
energy management systems
composability
distributed generation
distributed power generation
DP
dynamic programming
dynamic programming algorithm
Dynamical Systems
electrical energy
batteries
generation system
Heuristic algorithms
MATLAB software
MCEMS
Metrics
microgrid
microgrid central energy management system
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »