Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control systems
biblio
Power-Electronics-Enabled Autonomous Power Systems
Submitted by grigby1 on Wed, 09/05/2018 - 10:47am
Smart Grid
power system resiliency
power system scalability
power system security
power system stability
pubcrawl
resilience
Resiliency
Scalability
power system reliability
smart power grids
solar cell arrays
solar panels
Special issues and sections
Stability analysis
Voltage control
wind turbines
Human behavior
Control Theory
distributed energy resources
distributed generation
distributed power generation
Electric Vehicles
energy management
energy storage systems
Frequency synchronization
control systems
Inverters
power electronic converters
power electronics-enabled autonomous system
power generation control
power generation reliability
power system control
Power system dynamics
biblio
A graph-based trust-enhanced recommender system for service selection in IOT
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
IoT
Trusted Computing
trust
Temperature measurement
Social network services
Social Internet of Things
service selection problem
security of data
reliable service
recommender systems
pubcrawl
collaboration
Internet of Things
Human Factors
Human behavior
graph-based trust-enhanced recommender system
graph theory
control systems
computer theory
collaborative filtering recommendation algorithm
collaborative filtering
biblio
Control systems and the internet of things \#x2014; Shrinking the factory
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
pubcrawl
Logic gates
Monitoring
network capable computer
passive infrared detectors
powerful ARM processor
Production facilities
programmable I-O interface
programming interfaces
Lips
Radio network
Raspberry Pi
Scalability
sensor network
sensors
smart interconnected society
user interfaces
wireless LAN
feedback mechanisms
component
control loop
control systems
control-monitoring systems
domestic Internet solution
factory automation
factory control systems
Factory System
battery life
I-O Systems
i-o systems security
industrial control
infrared detectors
Interfaces
internet
Internet of Things
IoT
biblio
Using k-nearest neighbor method to identify poison message failure
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
pubcrawl
unstable network
Toxicology
Telephony
telecommunications networks
telecommunication security
telecommunication network reliability
telecommunication network management
telecommunication computing
System testing
statistical distributions
Scalability
Routing
Resiliency
resilience
AI Poisoning
Protocols
Probability distribution
probabilistic k-nearest neighbor method
poison message failure identification
network fault management
machine learning
learning (artificial intelligence)
Large-scale systems
IP networks
Human behavior
Data mining
control systems
computer science
Computer bugs
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
physical unclonable function protection
Xilinx SoC
system-on-chip
system security techniques
Software
security protection
security policies
security compromises
security challenges
secure architecture extension
Resiliency
resilience
PUFSec framework
PUF workflow
PUF hardware
pubcrawl
Access Control
Networked Control Systems Security
Monitoring
Modeling Attacks
Metrics
internal PUF design
hardware isolation
Hardware
DoS attacks
Denial of Service attacks
Data protection
control systems
computer network security
computer architecture
composability
ARM Processor
biblio
Modeling software defined security using multi-level security mechanism for SDN environment
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
packet features
vulnerable threats
thirdly controllers
Software Defined Security
Software Defined Networking support
software defined networking
security based challenges
secure controller
SDN-security
SDN environment
SDN architecture design
risk level
Resiliency
resilience
quality of service
pubcrawl
authentication
OpenFlow
nonbenign flow
Networked Control Systems Security
multilevel security mechanism
Metrics
Measurement
IP networks
fuzzy logic system
Fuzzy logic
flow packet
dual-fuzzy logic design
control systems
computer network security
composability
benign flow packets
biblio
A Notion of Robustness for Cyber-Physical Systems
Submitted by el_wehby on Sun, 05/27/2018 - 6:53pm
Computational modeling
Concrete
control systems
Cost function
Robustness
Software
Stability analysis
1552668
biblio
Cross-Layer Codesign for Secure Cyber-Physical Systems
Submitted by el_wehby on Fri, 05/25/2018 - 4:22pm
cyber-physical system security
sensors
security of data
security attacks
security
schedulability
resource-constrained cyber-physical systems
functional layer technique
cybersecurity techniques
cyber-physical systems
automotive domain
Cryptography
cross-layer codesign framework
cross-layer
control-theoretic methods
control systems
control performance
Computational modeling
Codesign
Automotive engineering
1553757
biblio
An Efficient Control-Driven Period Optimization Algorithm for Distributed Real-Time Systems
Submitted by el_wehby on Fri, 05/25/2018 - 4:22pm
optimization
system schedulability
Search methods
scheduling
schedulability constraints
sampling periods
real-time systems
Real-time embedded control system
real-time embedded control functions
programming
piecewise linear function
period optimization
Partitioning algorithms
approximated functions
optimisation
GP formulations
geometric programming
distributed systems
Distributed real-time systems
control-driven period optimization algorithm
control systems
control performance
control models
control loops
communication resources
automotive industrial case study
1553757
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »