Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
VSM
biblio
Computing the Worst Case Scenario for Electric Power System Dynamic Security Assessment
Submitted by grigby1 on Fri, 06/26/2020 - 12:17pm
Hopf Bifurcation
worst case scenario
VSM
voltage stability margin
safety operation
saddle-node bifurcation
power transfer limit
power system dynamic stability
operation centers
load growth direction
LGD
power system security
electric power system dynamic security assessment
bifurcation
IEEE 39 bus system
Dynamic security assessment
cyber-physical systems
Resiliency
Metrics
composability
pubcrawl
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by aekwall on Mon, 07/01/2019 - 9:12am
CVSS-metric
vulnerability Similarity Measure
vulnerabilities
VSM
VACC
threats
Security Metrics
pubcrawl
Protocols
probability
network security tools
Network
Monitoring
Metrics
Measurement
analysis
CVSS metric-based VACC
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
computer-based networks
computer security
computer science
computer networks
computer network threats
computer network security vulnerabilities
computer network security
common vulnerability scoring system metric-based technique
CNSVT
classification
Assessment
biblio
All-optical switching behaviours in synthetic ferrimagnetic heterostructures with different ferromagnetic-layer Curie temperatures
Submitted by grigby1 on Wed, 05/16/2018 - 12:49pm
Magnetic multilayers
perpendicular Hall hysteresis loops
perpendicular anisotropy
opto-spintronics devices
optical switches
optical retarders
optical multilayers
optical lithography
normalized Hall voltage
magnetoelectronics
magneto-optical devices
perpendicular hysteresis loops
magnetic configurations
left-handed beam
layer structure
laser sweeping measurement
laser polarization
Laser beams
laser beam position
laser beam polarizations
laser beam effects
size 5 mum
wavelength 800 nm
VSM
vibrating sample magnetometry
time 43 fs
Ti: sapphire fs-laser
temperature-dependent magnetization scans
temperature 524 K
temperature 293 K to 298 K
synthetic ferrimagnetic heterostructures
sputtering
iron alloys
single layer
single FM layers
Ru layer
room temperature
quarter-wave plate
pulse duration
Pt layers
power 0.45 mW
photolithography
Magnetometers
circularly polarized beam
boron alloys
AOS
antiferromagnetic RKKY interlayer exchange coupling
anomalous Hall effect measurements
all-optical switching behaviours
all-optical control
cobalt alloys
ferromagnetic materials
Measurement by laser beam
CoFeB
Resiliency
resilience
Temperature measurement
Frequency modulation
composite materials
magnetic properties
magnetic hysteresis
remanence
pubcrawl
ferromagnetic-layer Curie temperatures
ion milling
initial magnetic state
initial magnetic configuration
Hall effect
Hall cross
glass substrates
FM2 layers
FM1 layers
final magnetic configuration
Compositionality
ferromagnetic layers
ferrimagnetic materials
DC magnetron sputtering
DC current density
current carrying wire
Curie temperature
controlled helicity-dependent switching
composite CoFeB layer
complex magnetic multilayers
biblio
P2V: Effective Website Fingerprinting Using Vector Space Representations
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
online activists
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl170109
passive traffic analysis attack
packet to vector approach
P2V
anonymous communication
natural language processing
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
Context
Computer crime
Computational modeling
biblio
"P2V: Effective Website Fingerprinting Using Vector Space Representations"
Submitted by grigby1 on Thu, 02/23/2017 - 11:45am
natural language processing
word vector representations
Web sites
Web site fingerprinting attack
Web pages
Web page destination
VSM
vector space representations
users navigation privacy
Servers
real-valued vector
pubcrawl
passive traffic analysis attack
packet to vector approach
P2V
online activists
anonymous communication
Mathematical model
machine learning
learning (artificial intelligence)
language vector space models
Internet users
Fingerprint recognition
features extraction
feature extraction
data privacy
cyber security
pubcrawl170105
Context
Computer crime
Computational modeling