Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
Application of Machine Learning for Online Dynamic Security Assessment in Presence of System Variability and Additive Instrumentation Errors
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
PMU measurements
erroneous measurements
grid security assessment
IEEE-118 bus system
large-scale blackouts
Load modeling
machine learning (ML)
phasor measurement unit (PMU)
phasor measurement unit data
PMU data
dynamic security assessment (DSA)
power grids
power system measurement
renewable generation
seasonal load profiles
security prediction
synchrophasor technology
Transient analysis
Voltage measurement
cyber-physical systems
power engineering computing
power system security
pubcrawl
composability
Metrics
Resiliency
Databases
learning (artificial intelligence)
machine learning
security
measurement errors
online dynamic security assessment
phasor measurement
Phasor measurement units
power system control
power system stability
additive instrumentation errors
DSA scheme
biblio
Resource Allocation for Threat Defense in Cyber-security IoT system
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT
Dynamical Systems
threat defense
resource allocation problem
optimal control variables
open loop solution
game theory
feedback solution
Dynamic scheduling
dynamic game
cyber-security IoT system
cyber-physical systems
Games
Internet of Things
Resiliency
Metrics
composability
pubcrawl
optimisation
Wireless communication
resource management
resource allocation
Mathematical model
security of data
security
biblio
The Model and Algorithm for Ensuring the Survivability of Control Systems of Dynamic Objects in Conditions of Uncertainty
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
Control System
uncertainty conditions
survivability evaluation
Survivability
minimal control systems
fuzzy control
feedback
dynamic objects
dynamic object
pubcrawl
conditions of uncertainty
graph theory
cyber-physical systems
Fuzzy logic
Resiliency
Metrics
composability
biblio
Dynamic Mulitiple Agent Based IoT Security Management System
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT security
strong security
security related resources
security functions
security
Resiliency
pubcrawl
multiple security protocol compatibility
multi-agent
Metrics
IoT system
IoT security management system
applications security requirements
IoT devices
IoT
Internet of Things
efficient energy management
dynamic security agent management framework
dynamic mulitiple agent
Dymatic mangagement
cyber-physical systems
computer network security
composability
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
multiple encryption modes
energy limited internet of things applications
energy-adaptive lightweight hardware security module
high power consumption
high security levels
Internet of Things (IoT)
low power consumption
low power IoT applications
low security level
maximum dynamic power dissipation
Encryption Modes
partial dynamic reconfiguration
power 10.08 mW
power budget
power constraint
power-security level trade-off
security level values
security strength
Throughput
composability
Cryptography
encryption
Internet of Things
security
security attacks
Hardware
Data Security
pubcrawl
Ciphers
Metrics
Resiliency
cyber-physical systems
Applicability and Robustness (CAESAR)
Competition for Authenticated Encryption: Security
DPR system
dynamic partial reconfiguration
Dynamic Partial Reconfiguration (DPR)
biblio
Computing the Worst Case Scenario for Electric Power System Dynamic Security Assessment
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
Hopf Bifurcation
worst case scenario
VSM
voltage stability margin
safety operation
saddle-node bifurcation
power transfer limit
power system dynamic stability
operation centers
load growth direction
LGD
power system security
electric power system dynamic security assessment
bifurcation
IEEE 39 bus system
Dynamic security assessment
cyber-physical systems
Resiliency
Metrics
composability
pubcrawl
biblio
PMU Based Data Driven Approach For Online Dynamic Security Assessment in Power Systems
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
real time synchronized measurements
power engineering computing
power system
power system control
Power system dynamics
power system security
power system stability
power system transient stability
pubcrawl
Random Forest
PMU based data driven approach
real-time systems
security
synchronized phasor measurements
system control
system operator
system pertaining
transient instability
wide-area dynamic security assessment
Decision Tree
Intelligent Data Security
Compositionality
Resiliency
Scalability
composability
cyber-physical systems
Data mining
data mining model
Data models
Intelligent Data and Security
Dynamic security assessment
IEEE 39 bus system
intelligent framework based approach
measurement data
Metrics
online dynamic security assessment
phasor measurement
Phasor measurement units
biblio
Efficient Technique Image Encryption with Cipher Block Chaining and Gingerbreadman Map
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
efficient technique image encryption
unified average change intensity
testing
secure communication
Resiliency
resilience
pubcrawl
pixel change rate
key cipher block chaining
Image Processing
Gingerbreadman map
encryption
button sensitivity
efficient encryption
digital images
digital image security
Digital Image Crypthography
cyber-physical systems
Cryptography
computer science
composability
Ciphers
cipher block chaining
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
highly advanced technologies
secured procedure
secured image processing
Rotors
Resiliency
resilience
red intensity
pubcrawl
pixel
original RGB value
military communication
Mathematical model
image security
image encryptions
image encryption
image colour analysis
Algorithm
green intensity
enigma machine
enigma algorithm
enigma
encryption
encrypting decrypting images
efficient encryption
decryption
cyber-physical systems
Cryptography
computationally efficient procedure
composability
Breadboard
blue intensity
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »