Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control functions
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
Detection and prevention of DoS attacks in Software-Defined Cloud networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
Resiliency
IP networks
IPS security
Metrics
network device
network scenarios
OFP
OpenFlow protocol
Protocols
pubcrawl
intrusion prevention system
SDC
SDN
Software Defined Clouds
software defined networking
Software-Defined Networking technology
Switches
SYN flooding attacks
vulnerable attacks
DDoS attack detection
Cloud Computing
Cloud Computing networks
composability
computer network security
control functions
control plane
data plane
DDoS
centralized controller
Denial-of-Service
distributed DoS attacks
distributed Firewall
distributed security mechanism
Firewall and IPS
Firewalls (computing)
Human behavior
ICMP flooding attacks