Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious adversaries
biblio
Cybersecure Distributed Voltage Control of AC Microgrids
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
secondary voltage control
power system security
Protocols
pubcrawl
Reactive power
reactive power control
resilience
resilience threshold
Resiliency
resilient control approach
resilient flocking
multi-robot systems
security of data
Synchronization
synchronization behavior
utilized control protocols
virtual time-varying communication graph
Voltage control
voltage restoration
weighted mean subsequence reduced algorithm
WMSR algorithm
distributed energy resources
communication links
Computing Theory
control engineering computing
cyber-attacks
cybersecure distributed voltage control
Cybersecurity
cyberthreats
Decentralized Control
DERs
distributed control
AC microgrids
distributed power generation
distributed secondary voltage control
frequency control
graph theory
malicious adversaries
microgrid test system
Microgrids
mobile robot team
mobile robots
biblio
Investigating Attack Propagation in a SoS via a Service Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 3:55pm
Safety
systems of systems
system of systems
system decomposition
SoS structure
SoS risk assessment
SoS development life cycle
SoS design
service-guarantees
service levels
service decomposition
Service
sensors
security of data
security
attack propagation
risk management
pubcrawl
Metrics
malicious adversaries
independent systems
decomposition
cyber physical systems
connected systems
Compositionality
Complexity theory
communication as a service
autonomous vehicles
autonomous quarry
attack propagation problem
biblio
Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting
Submitted by K_Hooper on Wed, 10/04/2017 - 9:54am
Adversary Models
biometrics
gshade
Human behavior
malicious adversaries
pubcrawl
Resiliency
scalabilty
secure two-party computation
semi-honest adversaries