Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Numerical models
biblio
The Relation Between Local Hysteresis Losses and Remanent Magnetic Fields in HTSC Films
Submitted by grigby1 on Wed, 05/16/2018 - 1:50pm
remanence
local hysteresis loss
low-temperature scanning Hall probe microscopy
Magnetic field measurement
magnetic fields
magnetic hysteresis
Magnetization
Numerical models
pubcrawl
local hysteresis loops
remanent magnetic fields
resilience
Resiliency
scanning Hall probe microscopy
scanning probe microscopy
superconducting critical field
superconducting thin films
barium compounds
Kim critical state model
HTSC films
high-temperature superconductors
high-temperature superconducting films
GdBCO coated conductor
GdBCO
GdBa2Cu3O7
gadolinium compounds
demagnetizing effect
demagnetisation
Critical state model
Critical current density (superconductivity)
Conductors
Compositionality
Bean critical state model
biblio
Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Metrics
state estimation
Scalability
Resiliency
resilience
pubcrawl
power transmission control
power system state estimation
power grids
power grid state estimation
Phase measurement
phase angle measurements
optimization
Numerical models
AC power flow model
Mathematical model
load flow control
line failures detection problem
IEEE 300-bus systems
IEEE 118-bus systems
Human behavior
failure analysis
Cyber-physical attack
convex programming
convex optimization problem
Convex functions
Adversary Models
biblio
Data centric trust evaluation and prediction framework for IOT
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Experience
Trustworthy Systems
standardization
Resiliency
reputation
pubcrawl
Numerical models
Measurement
Knowledge
collaborative filtering
Ensemble Learning
Decision Making
data trust
Data models
cyber physical systems
Computational modeling
composability
biblio
Model study of automatic and automated control of hysteretic object
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
feedback
Velocity control
variable structure systems
Uniform resource locators
Switches
sliding mode control
Resiliency
Regulators
pubcrawl
PI control
Oscillators
Numerical models
hysteresis
human reaction
feedback signal
artificial additional fluctuation
fast switching
Engines
control systems
control system synthesis
control signal
control loop
composability
closed loop systems
automobiles
automatic hysteretic object control
Automatic control
Automated Response Actions
automated hysteretic object control
biblio
A Quantity-Flexibility Contract in Two-Stage Decision with Supply Chain Coordination
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
optimal replenishment strategy
wholesale price
updated inventory status
two-period dynamic programming model
supply chains
supply chain coordination
Stackelberg game
returning units
retailing
retailer
quantity-flexibility supply contract
pubcrawl170112
Pricing
buyback price
Numerical models
Mathematical model
manufacturing
manufacturer price scheme
inventory management
incremental units
game theory
fixed quantity
dynamic programming
Decision Making
contracts
biblio
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
computer architecture
Computer crime
intrusion tolerance
Markov processes
Numerical models
Preventive maintenance
pubcrawl170109
Servers
System Availability
biblio
Defending mechanisms for protecting power systems against intelligent attacks
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
defending mechanisms
game theory
Games
generalized game models
intelligent attacks
Load modeling
Nash Equilibrium
Numerical models
Power system protection
power system security
power systems
pubcrawl170107
pubcrawl170108
risk assessment
zero-sum game model
biblio
"Stealthy attacks meets insider threats: A three-player game model"
Submitted by abfox on Tue, 02/14/2017 - 1:18pm
advanced persistent threat
Computational modeling
computer security
cyber security
Face
game theory
Games
Insider Threats
Numerical models
pubcrawl170101
real-time systems
security of data
stealthy attacks
three-player attacker-defender insider game
three-player game model
two-player FlipIt game model
« first
‹ previous
1
2
3
4
5
6
7