Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Networked Control System
biblio
Networked Control System Information Security Platform
Submitted by grigby1 on Thu, 08/24/2023 - 1:59pm
Training
information security
pubcrawl
resilience
Resiliency
Safety
Scalability
industrial control
Industries
industrial control system
Production
networked control systems
Industrial Control Systems
industrial internet
Networked Control System
biblio
Black-box System Identification of CPS Protected by a Watermark-based Detector
Submitted by aekwall on Tue, 03/09/2021 - 11:05am
Networked Control System
Watermarking
System Identification
support vector regression
Support vector machines
sensors
security
pubcrawl
process control
Particle separators
CPS Modeling and Simulation
Metrics
Detectors
cyber-physical security
black-box
black box encryption
Predictive Metrics
composability
Resiliency
biblio
Multi-Agent Framework for Resilience Enhancement over a WSAN
Submitted by aekwall on Mon, 11/16/2020 - 1:49pm
networked control systems
Resilient Security Architectures
Resiliency
wireless sensor
security world
resilience enhancement
multiagent framework
IPv6 test-bed
installation costs
hierarchical multiagent system
distributed devices
actuator networks
Networked Control System
IP networks
physical world
actuators
wireless nodes
cyber world
resilience
multi-agent systems
Wireless communication
wireless sensor networks
pubcrawl
computer architecture
security
biblio
A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
Submitted by aekwall on Mon, 06/08/2020 - 10:22am
game theoretic security
zero-sum game
undirected tree
undirected topology
system L2 gain
Stackelberg equilibrium
security-aware sensor placement problem
optimal sensor placement strategy
Networked Control System
game-theoretic framework
game leader
detector decision
attacker-detector game
attacker decision
attack signals
Symmetric matrices
security of data
Nash Equilibrium
Cyber-physical attacks
networked control systems
Predictive Metrics
Human Factors
Games
optimisation
trees (mathematics)
sensor placement
pubcrawl
game theory
security
Scalability
Monitoring
Detectors
biblio
Bandwidth Allocation Strategy of Networked Control System under Denial-of-Service Attack
Submitted by grigby1 on Fri, 05/08/2020 - 3:40pm
Metrics
time-constrained DoS attack
Stability criteria
security
Resiliency
resilience
pubcrawl
Networked Control Systems Security
networked control systems
networked control system (NCS)
Networked Control System
NCS communication channel
Bandwidth
Dynamic scheduling
Dynamic Networks and Security
dynamic bandwidth allocation structure
dynamic bandwidth allocation
denial-of-service attack
denial of service attack
control systems
computer network security
composability
Channel allocation
bandwidth allocation
biblio
Countermeasure for Identification of Controlled Data Injection Attacks in Networked Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:22am
countermeasure
Networked Control Systems Security
Transfer functions
System Identification
Networked Control System
man-in-the-middle
malicious agent
link monitoring strategy
linear time-invariant transfer functions
Linear systems
industrial control system
Gaussian noise
data injection attack
security of data
controlled data injection attack identification
Identification
networked control systems
Predictive Metrics
Communication networks
production engineering computing
Industry 4.0
composability
pubcrawl
Resiliency
security
Monitoring
biblio
Cyber Security and Vulnerability Analysis of Networked Control System Subject to False-Data Injection
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
Networked Control System
vulnerability level
Vulnerability Analysis
sensors
security of data
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
networked control systems
networked control system cyber security
Networked Control Systems Security
NCS
Monitoring
malicious outsiders
geometric approach
false-data injection
false trust
false data injection attacks
controlled system
control engineering computing
Computer hacking
collaboration
biblio
Towards trustworthy data in networked control systems: A hardware-based approach
Submitted by grigby1 on Fri, 10/26/2018 - 3:52pm
malfunctioning systems
trustworthy data
transferred data needs
telecommunication security
smart factories
security
Scalability
Resiliency
pubcrawl
process control
networked control systems
Networked Control System
NCS
captured sensor data
Loss measurement
hardware-based approach
forward error correction
encryption
encrypted data
denial-of-service attacks
delays
Cryptography
correct functionality
controlled process
Communication channels
biblio
Cyber-attack detection in the networked control system with faulty plant
Submitted by K_Hooper on Wed, 04/04/2018 - 8:52am
networked control systems
Underwater vehicles
Underwater Networks
Trajectory
tools
standards
security
Scalability
ROV
Resiliency
remotely operated underwater vehicle
pubcrawl
predictive control
Adaptation models
Networked Control System
Metrics
mathematical framework
intelligent generalized predictive controller
intelligent control
IGPC
faulty plant
fault-tolerant ability
fault tolerant control
fault accommodation technique
cyber-attack detection
autonomous underwater vehicles
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
1
2
next ›
last »