Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control systems
biblio
Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
industrial control system
Safety
Resiliency
pubcrawl
Protocols
production engineering computing
Predictive Metrics
power systems
power industry control system intrusion
Networked Control Systems Security
network invasion
network intrusion
Control Theory
industrial control network space security
industrial control
control systems
control engineering computing
computer network security
composability
Business
behavior characteristics analysis
attack model
attack behavior analysis
security
biblio
SDN Enabled Secure IoT Architecture
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
resource-constrained devices
Software Defined Network (SDN) Security
Precision agriculture
Policy based Secure IoT Architecture
lightweight protocol
IoT network infrastructure security
IoT Authentication and Access Control
Internet of Things (IoT) Security
integrated security approach
authenticated malicious IoT devices
Network Security Architecture
cyber systems
critical national infrastructure
computer network security
Software Defined Networks
Logic gates
control systems
SDN
authentication
pubcrawl
Resiliency
software defined networking
computer architecture
Protocols
Cryptographic Protocols
Internet of Things
biblio
Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
Submitted by grigby1 on Fri, 04/24/2020 - 4:38pm
algorithmic approaches
Power Grid Vulnerability Assessment
Voltage measurement
SCADA
power system stability
power related errors
power grid control systems
power flow cyber-attack vulnerabilities
power flow constraints
Numerical Resilience
Load flow
Economic dispatch
cyber-attacks
contingency analysis
attack models
security of data
Metrics
power grids
convergence
control systems
composability
Smart Grid
power system security
power engineering computing
state estimation
Indexes
Resiliency
resilience
pubcrawl
biblio
Investigation of time delay effects on the current in a power converter regulated by Phase-Shift Self-Oscillating Current Controller
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
switching convertors
power converter
power convertors
power factor correction
privacy
PSSOCC
pubcrawl
resilience
Resiliency
robust control
robust current controller
phase-shift self-oscillating current controller
Switching frequency
time delay effects
«Control methods for electrical systems»
«Frequency-Domain Analysis»
«High frequency power converter»
«Modulation strategy»
«Non-linear control»
«Regulation»
«Robust control»
electric current control
active filters
Bandwidth
composability
control systems
current sensor bandwidth
current spectrums analysis
DC-AC power convertors
Delay effects
delays
AC-DC power convertors
electric sensing devices
Europe
Low pass filters
low-pass effect
maximum oscillation frequency
Metrics
motor control
oscillating behaviors
Oscillators
biblio
A behavior analysis of Permanent Magnet Synchronous Generator - Vienna rectifier set for marine current energy conversion
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
permanent magnet synchronous generator
vienna rectifier
synchronous generators
Resiliency
resilience
Rectifiers
pubcrawl
privacy
phase-shift self-oscillating current controller
Permanent magnets
composability
oscillating behaviors
neutral connected to the mid-point DC bus
Metrics
Mathematical model
marine renewable energies
integrated circuits
Energy conversion
control systems
biblio
Q-DATA: Enhanced Traffic Flow Monitoring in Software-Defined Networks applying Q-learning
Submitted by aekwall on Mon, 04/13/2020 - 10:07am
SDN controllers
forwarding performance status
Network Statistics and Software-Defined Networking
optimal traffic flow matching policy
policy formulation
proactive forwarding device protection
Q-DATA framework
Q-learning algorithm
Reinforcement learning
reinforcement learning approach
REST SDN application
SDN based networks
Degradation
SDN environment
SDN switches
SDN-based traffic flow
SDN-based traffic flow matching control system
support vector machine based algorithm
traffic flow granularity
traffic flow information
traffic flow monitoring
traffic forwarding performance degradation protection
Security by Default
control systems
Monitoring
Scalability
telecommunication traffic
computer network management
software defined networking
Support vector machines
learning (artificial intelligence)
Resiliency
pubcrawl
software-defined networking
computer network security
Security analysis
Software-Defined Networks
computer network reliability
data plane
centralised control
centralized network control
centralized network management
control framework
control plane
Control System
biblio
A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Linear systems
zero vulnerability encrypted password
Vulnerability
security
Router Systems Security
router mechanism
Resiliency
resilience
pubcrawl
process control
Metrics
Mathematical model
Aerodynamics
internet
high-level security
encryption
Cryptography
convergence
control systems
computer network security
authorisation
authentication
Approximation error
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
biblio
PSA: An Architecture for Proactively Securing Protocol-Oblivious SDN Networks
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
pubcrawl
unified security defense framework
telecommunication control
software-defined network (SDN)
software-defined network
software defined networking
security defense function
security defense application
security
SDN security
SDN infrastructure
Scalability
Resiliency
resilience
Bandwidth
Protocols
protocol-oblivious forwarding (POF)
proactively securing protocol-oblivious SDN networks
proactive security layer
proactive security framework PSA
proactive security
Optical fibers
data-to-control plane saturation attack
control systems
computer network security
computer architecture
business logic
Business
biblio
SDN Enabled Secure IoT Architecture
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
authentication
computer architecture
control systems
Internet of Things
Logic gates
Protocols
pubcrawl
Science of Security
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »