Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
control unit
Networked Control Systems Security
security threat
secure hard disk
ordinary hard disk
new technology challenge
network attack
management defect
local area network computer security control circuit
LAN security
LAN computers
LAN computer security control circuit
Hard disks
cyberattack
Circuit synthesis
circuit design
Predictive Metrics
security management
Local area networks
Information systems
composability
pubcrawl
Resiliency
information security
computer network security
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
biblio
A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
moving target defense
software-defined networking
software defined networking
Software Defined Network
security response measures
security of data
SDN
Resiliency
real-time systems
Real-time intrusion detection
pubcrawl
protection requirement analysis
Predictive Metrics
Networked Control Systems Security
closed-loop security control
IP networks
Intrusion Detection
Industrial Control Systems
industrial control system
industrial control
Anomaly Detection
ICs
dynamic cybersecurity protection method
cybersecurity protection
control systems
control engineering computing
computer security
composability
biblio
Design and Implementation of a New Intelligent Substation Network Security Defense System
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
power system security
Networked Control Systems Security
protection demand
network security protection level
intelligent substation network security risk
intelligent substation network security protection
intelligent substation network security defense system
defense system
intelligent substation
Predictive Metrics
Power system protection
defense mechanism
Monitoring
Communication networks
Substations
Business
composability
pubcrawl
Resiliency
network security
real-time systems
Protocols
security
biblio
Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
industrial control system
Safety
Resiliency
pubcrawl
Protocols
production engineering computing
Predictive Metrics
power systems
power industry control system intrusion
Networked Control Systems Security
network invasion
network intrusion
Control Theory
industrial control network space security
industrial control
control systems
control engineering computing
computer network security
composability
Business
behavior characteristics analysis
attack model
attack behavior analysis
security
biblio
L2 Control for Networked Control Systems Subject to Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
DoS jamming attacks
Networked Control Systems Security
Un-known Periodic Dos Jamming Attacks
trigger parameters
time-varying systems
switching system model
state feedback controller
state feedback
piecewise Lyapunov function
linear matrix inequalities
L2 control
Jamming
exponential stability analysis
event-triggering mechanism
telecommunication security
Denial of Service jamming attacks
Control Theory
Asymptotic stability
control system synthesis
Symmetric matrices
Lyapunov methods
stability
networked control systems
Predictive Metrics
control engineering computing
composability
pubcrawl
Resiliency
biblio
Improving Privacy in Graphs Through Node Addition
Submitted by aekwall on Mon, 04/20/2020 - 10:32am
Privacy-Preserving Mechanism (PPM)
k- automorohism
k- isomorphism
Measurement
Metrics
naïve ID removal
node addition
Peer-to-peer computing
Predictive Metrics
privacy
privacy models and measurement
k- anonymity
privacy-preserving mechanisms
pubcrawl
Resiliency
Routing
Scalability
seed-based attack
strongest attacks
structural attack
structure-based attack
structure-based de-anonymization attacks
edge addition
anonymity privacy
anonymization and de-anonymization
attack graphs
Autonomous System (AS)level graph
composability
computer security
Control Theory and Privacy
cyber-physical systems
data privacy
degree attacks
Computing Theory and Privacy
fake edges
fake nodes
graph data
graph data necessitates
graph privacy
graph theory
Human behavior
Inter-domain routing
internet
biblio
Authenticated Network Coding for Software-Defined Named Data Networking
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Switches
Software-Defined named Data Networking
MIP problem
Internet architecture
homomorphic signature scheme
cooperative network coding mechanism
authenticated network coding
cyber physical systems
cache storage
network coding
Homomorphic encryption
encoding
Predictive Metrics
security of data
named data networking
cooperative communication
digital signatures
internet
optimization
Routing
composability
pubcrawl
Resiliency
software defined networking
security
biblio
When Analog Meets Digital: Source-Encoded Physical-Layer Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Relays
wireless networks
TWRC PLNC
two-hop node coordination
Topology
Throughput
telecommunication traffic
spread spectrum communication
Source-Encoded PLNC scheme
Source-Encoded Physical-Layer Network Coding
source coding
SE-PLNC
Resiliency
Ad hoc networks
relay networks (telecommunication)
pubcrawl
Predictive Metrics
physical-level network coding
network topology
network coding
multipath relaying opportunities
multihop wireless networks
cyber physical systems
composability
channel coding
ad-hoc networks
biblio
Research on Network Malicious Code Detection and Provenance Tracking in Future Network
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
malicious code detection
classification algorithm
Predictive Metrics
cyber physical systems
network coding
Behavior features
detection method
feature selection methods
host node
software defined networking
malware detection system
matching classification method
Mobile communication
network controller
network malicious code detection
optimal feature subset
propagation model
switch node
Feature Selection
malware
security
invasive software
Classification algorithms
machine learning algorithms
SDN network
network security
feature extraction
computer network security
Resiliency
pubcrawl
composability
Computational modeling
pattern classification
Analytical models
mobile network
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »