Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control systems
biblio
Multipath Traffic Engineering for Software Defined Networking
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IP networks
telecommunication traffic
Streaming media
software defined networking
service quality criteria
Scalability
Resiliency
resilience
quality of service
pubcrawl
Protocols
packet communication
network bandwidths
multipath traffic engineering
multimedia market
IPS
application-aware mechanism
Internet video sharing
internet
Inspection
IDS
Firewalls (computing)
firewall
dpi
deep packet inspection
control systems
communication bottlenecks
Broadcasting
broadcast television
bandwidth restrictions
ASA systems
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
biblio
Intelligent Border Security Intrusion Detection using IoT and Embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
control systems
water bodies
thermal imaging camera
intelligent border security intrusion detection
infrared imaging
harsh weather
geographical conditions
FLIR
border area monitoring
Robot sensing systems
video surveillance
Internet of Things
computerised monitoring
security
Cameras
Metrics
composability
pubcrawl
Resiliency
Raspberry Pi
embedded systems
Software
Monitoring
security of data
IoT
biblio
SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
SDN security
log management
Metrics
network forensics
pubcrawl
resilience
Resiliency
Scalability
SDN forensics
log file identification
SDNLog-Foren
Secure log files
security enhancement
sensitive log data
software defined networking
Southbound interfaces
system monitoring
fine-grained access control
blockchain
Blockchain-based security
Computer crime
Computer hacking
computer network security
control systems
Cybersecurity
Digital Forensics
authorisation
global network configuration
Human behavior
Human Factors
information forensics
Integrity and Tamper Resistance.
log file analysis
log file collection
biblio
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
Resiliency
virtual ports
virtual port numbers
virtual IPs
virtual IP addresses
Synchronization
Static Network
Software-Defined Networks
software-defined networking-based MTD technique
software defined networking
Servers
scanning attacks
Scalability
RHSM
attack success probability
resilience
Reconnaissance
random IP addresses
random host and service multiplexing technique
pubcrawl
proactive defense mechanism
Network reconnaissance
Multiplexing
MTD technique
IP networks
control systems
computer network security
biblio
Event-triggered Control for Networked Control Systems Under Replay Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 4:41pm
Delay effects
Networked Control Systems Security
Stability analysis
robust event-triggered controller design method
replay attacks
nonlinear control systems
NCSs
general random replay attack model
event-triggering condition
event-triggered control
control signal
consecutive replay attacks
closed-loop system stability
control system synthesis
security
power system stability
Numerical models
Metrics
stability
closed loop systems
control systems
sensors
composability
networked control systems
Resiliency
resilience
pubcrawl
biblio
Solutions Verification for Cloud-Based Networked Control System using Karush-Kuhn-Tucker Conditions
Submitted by grigby1 on Fri, 05/08/2020 - 4:41pm
NCS
Networked Control Systems Security
Security of NCS
resource-constrained network control system
predictive control
network security challenges
local control system
KKT Conditions
Karush-Kuhn-Tucker conditions
cloud-based networked control system
Cloud-based Control System
cloud server
cloud computing technologies
Analysis of Solution verification for NCS
Cloud Computing
Metrics
stability
control systems
composability
control engineering computing
networked control systems
Computational modeling
Mathematical model
Resiliency
resilience
pubcrawl
Servers
security
biblio
Bandwidth Allocation Strategy of Networked Control System under Denial-of-Service Attack
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
Metrics
time-constrained DoS attack
Stability criteria
security
Resiliency
resilience
pubcrawl
Networked Control Systems Security
networked control systems
networked control system (NCS)
Networked Control System
NCS communication channel
Bandwidth
Dynamic scheduling
Dynamic Networks and Security
dynamic bandwidth allocation structure
dynamic bandwidth allocation
denial-of-service attack
denial of service attack
control systems
computer network security
composability
Channel allocation
bandwidth allocation
biblio
Security and Stability Control System Simulation Using RTDS
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
simulation test platform
dynamic simulation
Inner Mongolia
northern 500kV transmission channel
power system low frequency oscillations
power system simulation
real time digital simulation (RTDS)
real-time simulation
RTDS
security and stability control system
digital dynamic experimental model
stability control device
stability control devices
stability control strategy
stability control system simulation
Stability criteria
stability system
stable device
time digital simulation
Networked Control Systems Security
Metrics
pubcrawl
resilience
Resiliency
Circuit faults
composability
control systems
closed loop systems
power grids
power system control
security
Power Grid Network
power system stability
safe operation
stable operation
power transmission lines
Circuit stability
control characteristics
control system synthesis
biblio
A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
moving target defense
software-defined networking
software defined networking
Software Defined Network
security response measures
security of data
SDN
Resiliency
real-time systems
Real-time intrusion detection
pubcrawl
protection requirement analysis
Predictive Metrics
Networked Control Systems Security
closed-loop security control
IP networks
Intrusion Detection
Industrial Control Systems
industrial control system
industrial control
Anomaly Detection
ICs
dynamic cybersecurity protection method
cybersecurity protection
control systems
control engineering computing
computer security
composability
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »