Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Thu, 04/30/2015 - 1:39pm
sensors
sensor information flow
sensing infrastructure
security
secure systems
processing architecture
information sharing
information management
information dissemination
Data mining
computer architecture
Buildings
architecture
biblio
The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface
Submitted by BrandonB on Thu, 04/30/2015 - 1:39pm
Force
cyber environment
deception
decision maker
Decision Making
C4ISR interface attacking
combat
command and control
command and control systems
cyber attack
cyber deception
Aircraft
information network attack
kinetic deception
Kinetic theory
operational effect
risk management
security of data
sensors
surveillance
Synchronization
trust
biblio
Fingerprinting Internet DNS Amplification DDoS Activities
Submitted by BrandonB on Thu, 04/30/2015 - 1:19pm
geolocation
storage capacity 720 Gbit
sensors
packet size
network-layer
Monitoring
IP networks
Internet-scale DNS amplification DDoS attacks
internet
Grippers
anti-spam organizations
fingerprinting Internet DNS amplification DDoS activities
distributed denial of service
detection period
darknet space
cyber security intelligence
computer network security
Computer crime
backscattered analysis
attack duration
biblio
Secure Estimation in the Presence of Integrity Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 12:47pm
minimisation
worst-case expected cost minimization
Vectors
true state value
symmetric estimator
state estimation
sensors
security
secure estimation
scalar state estimation
Robustness
optimal worst-case estimator
monotone estimator
a-priori information
minimax techniques
minimax optimization
measurement value
local estimators
integrity attack presence
Gaussian processes
Gaussian measurements
fault tolerance
explicit analysis
estimation
Cryptography
Cost function
biblio
Security architecture for at-home medical care using Wireless Sensor Network
Submitted by BrandonB on Thu, 04/30/2015 - 12:46pm
low-energy secure data transmission
wireless sensor networks
vital health parameter continuous monitoring
Servers
sensors
security architecture
security
patient monitoring
MWSN
medical wireless sensor network
Medical services
medical data sensors
at-home medical care
hospitals
hospital wireless networks
healthcare industries
health care
encryption
distributed wireless sensor network technologies
Data Transmission
Cryptography
compressed sensing-encryption
compressed sensing
body sensor networks
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Thu, 04/30/2015 - 12:05pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
Distributed Semantic Discovery for Web-of-Things Enabled Smart Buildings
Submitted by BrandonB on Thu, 04/30/2015 - 11:59am
open systems
wireless sensor networks
web services
Software Architecture
smart buildings
smart building
service invocation
sensors
Semantics
semantic sensor Web of Things
Resource description framework
actuator
ontology covering heterogeneous sensor
ontologies (artificial intelligence)
Ontologies
knowledge automatic assimilation
intrinsic properties
interoperability
Internet of Things
home automation
distributed semantic discovery protocols
data invocation
biblio
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
Submitted by BrandonB on Thu, 04/30/2015 - 11:58am
malicious unmanned air vehicles
Weapons
unmanned air vehicles (UAVs)
uav
sensors
security of data
security
reckless attacker behaviors
random attacker behaviors
Pricing
opportunistic attacker behaviors
multiagent system
multi-agent systems
Monitoring
actuators
malicious attacks
Intrusion Detection
IDS
Gears
distributed system
BRUIDS
behavior rule specifications
autonomous aerial vehicles
ant-colony clustering model
ant colony optimisation
airborne system
adaptive intrusion detection
biblio
Combating False Data Injection Attacks in Smart Grid using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:55am
Kalman filters
χ2-square detector
state process
smart power grids
smart power grid security
Smart Grids
sensors
security
predictor variable series
power system state estimation
power system security
power system faults
power system
power engineering computing
Mathematical model
actuators
Kalman filter
fault diagnosis
fault detection
false data injection attack detection
Euclidean distance metrics
Euclidean detector
Equations
electric sensing devices
DoS attacks
Detectors
control systems
computer network security
communication infrastructure
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Thu, 04/30/2015 - 11:54am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
next ›
last »