Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
An SMT-Based Approach to Secure State Estimation under Sensor and Actuator Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:48pm
Metrics
state estimation
sparse strong observability
SMT-based approach
sensors
sensor attacks
security
secure state estimator
satisfiability modulo theory
Resiliency
resilience
pubcrawl
Observability
actuator attacks
Mathematical model
linear time-invariant system
Linear systems
Human behavior
fault tolerance
computability
composability
adversarial attack
adversarial agent
actuators
actuator security
biblio
Internet of Things: Raging Devices and Standardization in Low-Powered Protocols
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
low-powered protocols
Thread
The Thing
standardization
standard communication protocols
sensors
security
Resiliency
resilience
raging devices
pubcrawl
Protocols
OSI model
OSI
open systems
6LoWPAN
IP networks
IoT system architecture
IoT devices
IoT
Internet of Things
internet
IEEE 802.15.4
IEEE 802.15 Standard
data centers
Cyber Physical Systems Security
computer centres
composability
CoAP
Capacity planning
biblio
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
sensor nodes
personal area networks
power consumption
Protocols
pubcrawl
remote server
resilience
Resiliency
resource-constrained sensors
S3K technique
Scyther security protocol verification tool
personal area network identification
sensors
Servers
session key distribution
symmetric key establishment method
telecommunication network routing
telecommunication power management
telecommunication security
trust anchor
wireless sensor networks
Cryptography
6LoWPAN wireless sensor networks
authentication
CBC mode
cipher block chaining
composability
Contiki
ContikiOS
Cooja Simulator
Cryptographic Protocols
6LoWPAN
Cyber Physical Systems Security
datagram transport layer security
DTLS
EAKES6Lo technique
Edge router
LAUP
lightweight authentication protocol
Lucky Thirteen attack
PAN ID
biblio
A Self-Healing Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
radio links
wireless sensor networks
telecommunication security
sensors
self-healing networks
self-healing key pre-distribution scheme
security
Resiliency
resilience
composability
Q-composite key scheme
pubcrawl
node compromising attacks
multiphase WSN
multiphase wireless sensor networks
Measurement
insecure communication links
Electronic mail
biblio
Compromising Security of Economic Dispatch in Power System Operations
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
power generation dispatch
true line capacity ratings
Software
Smart Grids
sensors
semantics-based attack generation
security
Resiliency
resilience
pubcrawl
power system operations
Power system dynamics
power grids
power grid operations
power generation economics
bilevel optimization problem
network security seem like the most relevant keywords
mixed integer linear program
Metrics
Linear programming
integer programming
false data injection attacks
energy management systems
energy management
Economics
Economic dispatch
dynamic networks
cyber-physical systems
composability
biblio
Compromising Security of Economic Dispatch in Power System Operations
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
power generation dispatch
true line capacity ratings
Software
Smart Grids
sensors
semantics-based attack generation
security
Resiliency
resilience
pubcrawl
power system operations
Power system dynamics
power grids
power grid operations
power generation economics
bilevel optimization problem
network security seem like the most relevant keywords
mixed integer linear program
Metrics
Linear programming
integer programming
false data injection attacks
energy management systems
energy management
Economics
Economic dispatch
dynamic networks
cyber-physical systems
composability
biblio
Compromising Security of Economic Dispatch in Power System Operations
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
power generation dispatch
true line capacity ratings
Software
Smart Grids
sensors
semantics-based attack generation
security
Resiliency
resilience
pubcrawl
power system operations
Power system dynamics
power grids
power grid operations
power generation economics
bilevel optimization problem
network security seem like the most relevant keywords
mixed integer linear program
Metrics
Linear programming
integer programming
false data injection attacks
energy management systems
energy management
Economics
Economic dispatch
dynamic networks
cyber-physical systems
composability
biblio
SPE: Security and Privacy Enhancement Framework for Mobile Devices
Submitted by K_Hooper on Wed, 02/28/2018 - 11:35am
Multimedia communication
unmodified mobile operating systems
SPE
sensors
sensing
security of data
security and privacy enhancement
security
Resiliency
pubcrawl
privacy
operating systems (computers)
operating systems
Ontology
ontologies (artificial intelligence)
Ontologies
android
Mobile Security
mobile privacy
Mobile handsets
mobile devices
mobile computing
Metrics
iOS Security
iOS (operating system)
ios
Human Factors
encryption
data privacy
Compositionality
Android (operating system)
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure
biblio
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
secure autonomous aerial surveillance
Multicore Computing
multicore computing security
near-sensor data analytics pipeline
Neural networks
parallel architectures
pubcrawl
regular computing task
remote recognition
resilience
Resiliency
Scalability
Metrics
security of data
seizure detection
sensitive data protection
sensors
size 65 nm
SoC
software programmability
system-on-chip
tightly-coupled multicore cluster
voltage 0.8 V
energy 3.16 pJ
CNN
compute-intensive data processing
computer architecture
computerised instrumentation
Cryptography
data analysis
Data Security
deep convolutional neural network
electroencephalogram
encrypted data collection
encryption
approximate computing
energy conservation
Engines
equivalent reduced instruction set computer operation
Face detection
feature extraction
Fulmine tight power envelope
Internet of Things
Internet-of-Things endpoint
IoT endpoint system-on-chip
low-power electronics
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »