Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
Combined Compressive Sampling Techniques and Features Detection using Kullback Leibler Distance to Manage Handovers
Submitted by aekwall on Mon, 09/14/2020 - 12:29pm
Akaike information criterion
Small Cells
signal sampling
received signal probability density function
primary signals sparsity
manage handovers
Kullback Leibler Distance
Handovers
Handover technique
features detection
Distribution Analysis Detector
Compressive Sampling Techniques
Compressive Sampling algorithm
compressive sampling
Akaike weights
Akaike Weight
Detectors
Probability density function
compressed sensing
mobility management (mobile radio)
Handover
signal detection
Complexity theory
probability
privacy
Computational modeling
composability
pubcrawl
Resiliency
feature extraction
cyber-physical systems
biblio
Stabilization of Cyber Physical System exposed to a random replay attack modeled by Markov chains
Submitted by aekwall on Tue, 09/08/2020 - 10:00am
linear matrix inequalities
Chained Attacks
stochastic systems
stochastic stabilization
stabilization problem
random replay attack
packet losses
Markovian jump linear system
Markov chains
linear matrix inequality formulation
jumping parameters
communication delays
Numerical stability
Cyber Physical System
computer network security
closed loop systems
closed-loop system
CPS
Trajectory
stability
Linear systems
Markov processes
Stability analysis
delays
pubcrawl
Resiliency
cyber-physical systems
Scalability
biblio
A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 10:00am
electricity grid
Chained Attacks
data injection attack scenario
attack models
PLADD
Cyber-physical security assessment
bad data injection
attack propagation
attack graph
markov chain
cyber-physical system
Power Grid
security of data
Markov processes
power system security
power engineering computing
password
power grids
pubcrawl
Resiliency
cyber-physical systems
Data models
Scalability
IP networks
biblio
A Hybrid Attack Model for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
execution stage
Planning
markov chain
attack graph
attack propagation
bad data injection
bad data injection attack
Cyber-physical security assessment
Dynamic Defender model
Power Grid
execution stages
HAM
hybrid attack model
Markov Chain model
PLADD
preparation stage
Probabilistic Learning Attacker
Chained Attacks
smart power grids
Scalability
security
Data models
cyber-physical systems
learning (artificial intelligence)
Resiliency
pubcrawl
Mathematical model
security of data
Substations
power grids
power engineering computing
power system security
Games
Markov processes
electricity grid
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
biblio
Software Defined Cyber-Physical Testbed for Analysis of Automated Cyber Responses for Power System Security
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
Industrial Control Systems
system resilience
software defined networking
software defined cyber-physical testbed
Smart Grid
security of data
Resiliency
pubcrawl
power system security
power grids
Power Grid
power engineering computing
microgrid
intelligent decisions
CPS resilience
cyber-physical testbed
cyber-physical systems
cyber security
composability
automated responses
automated response system
Automated Response Actions
automated response
automated health assessment system
Automated Health Assessment
automated cyber responses
attack surface
cyber physical systems
biblio
Identification of Critical-Attacks Set in an Attack-Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
Industrial Control Systems
water treatment cyber-physical system
water treatment
system-level security property
system vulnerabilities
strongly-connected-components
security administrators
SCC
Min Label-Cut
critical-attacks set
complex attacks scenarios
attack-paths
attack-graph
advanced multifaceted attacks
attack graphs
attack scenarios
security of data
attack graph
Predictive Metrics
security measurements
control engineering computing
industrial control
system security
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
security
Internet of Things
biblio
Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems
Submitted by grigby1 on Fri, 08/07/2020 - 3:39pm
power plants
Logic gates
long time-sequence data
LSTM-based deep learning approach
Metrics
power engineering computing
power generation
power generation control
power plant control system
learning-based time delay attack characterization
pubcrawl
recurrent neural nets
resilience
Resiliency
security of data
Smart Grids
system control commands
Air gaps
learning (artificial intelligence)
Human Factors
Human behavior
delays
delay systems
Delay effects
deep learning model
Data models
cyber-physical systems
cyber-attacks
control systems
control engineering computing
composability
built-in attack characterization scheme
bidirectional long short-term memory units
biblio
Detection of False Data Injection Attacks in Cyber-Physical Systems using Dynamic Invariants
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Power system dynamics
Kalman filters
learning (artificial intelligence)
Meters
Metrics
National security
power engineering computing
Power measurement
power system
Kalman filter
power system security
pubcrawl
Resiliency
robust estimation
Scalability
security of data
state estimation
traditional anomaly detection approaches
data-driven temporal causal relationships
adaptive filtering
adaptive robust thresholding
Anomaly Detection
bad data detection
Bayesian filtering
complex cyber-physical systems
cyber-physical systems
data-driven functional relationships
False Data Detection
dynamic invariant network
false data injection attack detection
false data injection attacks
G-KART
Granger causality based Kalman filter
graph theory
invariant graph
Jacobian matrices
biblio
Towards Real-Time-Aware Intrusion Tolerance
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
cyber-physical realtime systems
control engineering computing
intrusion tolerance
cyber physical systems
ISO 26262
safety systems
assisted/autonomous driving
automotive use-cases
cyber-physical real-time systems
authentication
EN IEC 62061
EN ISO 13849
functional safety regulations
real-time-aware intrusion tolerance
real-time-aware intrusion-tolerant architectures
safety requirements
security holes
security
Attack vectors
mobile robots
composability
pubcrawl
Resiliency
cyber-physical systems
real-time systems
Protocols
traffic engineering computing
security of data
Safety
road vehicles
road safety
Automotive engineering
automobiles
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »