Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
On the implications of plug-and-learn adaptive hardware components toward a cyberphysical systems perspective on evolvable and adaptive hardware
Submitted by el_wehby on Thu, 05/17/2018 - 6:52pm
evolving intramodule relationships extraction
plug-and-learn adaptive hardware components
Oscillators
model-checking
model checking
Legged locomotion
Learning systems
Hardware
formal verification
Adaptation models
evolvable and adaptive hardware
evolutionary computation
EAH systems
cyberphysical systems
cyber-physical systems
Atomic measurements
Antenna measurements
1239196
biblio
Attack-Resilient State Estimation for Noisy Dynamical Systems
Submitted by el_wehby on Wed, 05/16/2018 - 6:37pm
attack-resilient state estimation
control systems
cyber-physical systems
cyberphysical systems security
Linear systems
Noise measurement
robustness of state estimators
security
standards
state estimation
Symmetric matrices
1505701
biblio
Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks
Submitted by el_wehby on Mon, 05/14/2018 - 4:07pm
physical attack mask
unobservable state-and-topology
two-stage optimization problem
two-stage optimization
Transmission line measurements
topology data
Topology
sub-network
state estimation
power systems
power system security
power system reliability
physical system consequences
Cyber-physical attacks
optimization
optimisation
Noise measurement
network topology
line outages
line failures
limited attack resources
false data injection attack
energy management
cyber-physical systems
cyber-physical system
1449080
biblio
From Fingerprint to Footprint: Revealing Physical World Privacy Leakage by Cyberspace Cookie Logs
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
cookie
CPS Privacy
cyber-physical systems
I-O Systems
Metrics
privacy
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
security
trajectories
biblio
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity
Submitted by grigby1 on Wed, 05/09/2018 - 2:57pm
software errors
real-time systems
resilience
Resiliency
Safe Coding
safe diversity approach
safety-critical real-time systems
safety-critical software
security
security of data
real-time processes
software vulnerabilities
static WCET analysis
timing
timing guarantees
timing properties
unacceptable performance overheads
WCET
WCET-aware artificial diversity
worst case execution time
Layout
artificial software diversity
block-level diversity
code-reuse attacks
collaboration
cyber-physical systems
embedded systems
hardware resources
Human Factors
individual probability
Artificial Diversity
Metrics
movable instruction sequences
policy-based governance
Policy-Governed Secure Collaboration
probability
pubcrawl
real-time
real-time cyber-physical systems
biblio
Verifying Attack Graphs through Simulation
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
Metrics
time-consuming process
Temperature sensors
simulation
simulated environment
security of data
security
Resiliency
resilience
pubcrawl
Predictive models
Nuclear Reactor
Analytical models
Inductors
hybrid attack graph
graph theory
Data models
cyber-physical systems
cyber physical system simulation
Cyber Physical System
control systems
composability
attack graphs
attack graph verification
biblio
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Metrics
worst-case communication cost
wireless sensor networks
untrusted cloud server query
sensors
Sensor-Cloud
security
Resiliency
resilience
Query-Anonymity
query receiver-anonymity
query processing
pubcrawl
privacy
network diameter
provable security
Internet of Things security
Internet of Things
Human behavior
Games
data privacy
cyber-physical systems
composability
communication-cost
cloud-based IoT system
cloud services
Cloud Computing
authorisation
anonymity
biblio
Application of Congestion Notifications in a Cyber-Physical System
Submitted by el_wehby on Thu, 03/29/2018 - 1:52pm
intelligent cyber control
smart-grid
smart power grids
Smart Grids
smart grid operation
real-time systems
power system stability
power system control
power engineering computing
Nominations and elections
network congestion
internet
Communication networks
intelligent control
distributed systems
distributed system reconfiguration
distributed processing
cyber-physical systems
cyber-physical system
cyber controls
control systems
control engineering computing
congestion notifications
communications congestion
1505610
biblio
Identifying Key Cyber-Physical Terrain
Submitted by grigby1 on Mon, 03/26/2018 - 1:00pm
controller area network security
composability
cyber-physical systems
malware spread
Metrics
mobile tactical networks
pubcrawl
resilience
Resiliency
wireless mesh networks
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
« first
‹ previous
…
57
58
59
60
61
62
63
64
65
…
next ›
last »