Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Numerical models
biblio
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
Success Rate
side-channel analysis
Monte-Carlo simulation
Masking Scheme
Information-Theoretic Metric
Human Factors
maximum likelihood estimation
information theoretic security
Upper bound
Monte Carlo methods
Numerical models
collaboration
Measurement
side-channel attacks
composability
Scalability
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Resilience of multi-object density fusion against cyber-attacks
Submitted by grigby1 on Fri, 05/12/2023 - 9:19am
pubcrawl
Human behavior
Human Factors
resilience
Scalability
Numerical models
cyberattack
automation
Resiliency
Control Theory
Clutter
Behavioral sciences
numerical analysis
biblio
Optimal Energy Storage System Placement for Robust Stabilization of Power Systems Against Dynamic Load Altering Attacks
Submitted by grigby1 on Fri, 05/12/2023 - 9:15am
power system stability
energy storage systems
Dynamic Load Altering Attacks
cyber-physical security
Resiliency
Control Theory
numerical simulation
robust control
Power system dynamics
pubcrawl
Numerical models
uncertainty
Scalability
security
Heuristic algorithms
resilience
Human Factors
Human behavior
biblio
Physical-Layer Security in Underlay Cognitive Radio System with Full-Duplex Secondary User over Nakagami-m Fading Channel
Submitted by aekwall on Fri, 04/28/2023 - 8:41am
pubcrawl
receiving antennas
Interference
transmitting antennas
Upper bound
Resiliency
Numerical models
fading channels
energy harvesting
Cognitive Radio (CR)
Full-Duplex (FD) mode
Full-duplex system
Strictly Positive Secrecy Capacity (SPSC)
Cognitive Radio Security
biblio
The Computational and Symbolic Security Analysis Connections
Submitted by grigby1 on Fri, 02/17/2023 - 4:21pm
pubcrawl
Metrics
resilience
Resiliency
Protocols
Computational modeling
automata
Compositionality
Numerical models
scientific computing
Data integration
cloud storage
computational security
Light rail systems
Symbolic Security Analysis
Scientific Computing Security
biblio
Power System Forced Oscillation Caused by Malicious Mode Attack via Coordinated Charging
Submitted by grigby1 on Fri, 02/03/2023 - 2:41pm
power grids
malicious mode attack
large-scaled electric vehicle load
forced oscillation
Coordinated charging
power grid vulnerability analysis
numerical simulation
Stability analysis
power system stability
pubcrawl
Numerical models
composability
process control
Hardware
Resiliency
resilience
Metrics
biblio
CVSS-based Vulnerability and Risk Assessment for High Performance Computing Networks
Submitted by aekwall on Thu, 02/02/2023 - 4:45pm
real-time systems
standardization
pubcrawl
Scalability
Resiliency
Knowledge engineering
Throughput
network security
Stochastic processes
CVSS
attack graph
Numerical models
HPC
Vulnerability
risk assessment
Stochastic Computing Security
biblio
An Accurate False Data Injection Attack (FDIA) Detection in Renewable-Rich Power Grids
Submitted by aekwall on Fri, 01/20/2023 - 3:18pm
Data models
deep learning
Conferences
pubcrawl
Resiliency
composability
Smart Grids
uncertainty
renewable energy sources
Predictive Metrics
Numerical models
Smart Grid Situational Awareness
biblio
Smartphone screen to camera uplink communication with enhanced physical layer security by low-luminance space division multiplexing
Submitted by grigby1 on Tue, 12/20/2022 - 1:36pm
pubcrawl
Metrics
resilience
Resiliency
Scalability
Wireless communication
Numerical models
Meters
Cameras
physical layer security
visible light communication
Symbols
screen camera communication
space division multiplexing
Visible Light Communications Security
biblio
Transient Security and Dependability Analysis of MEC Micro Datacenter under Attack
Submitted by grigby1 on Thu, 10/20/2022 - 2:37pm
simulation
Transient analysis
Stochastic Reward Nets
quantitative analysis
Multi-access Edge Computing
Resiliency
Stochastic Computing Security
markov chain
Random access memory
security
Numerical models
Resistance
Virtual machining
Scalability
resilience
pubcrawl
Servers
1
2
3
4
5
6
7
next ›
last »