Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Exponential distribution
biblio
Physical-Layer Security of Visible Light Communications with Jamming
Submitted by aekwall on Mon, 07/13/2020 - 10:16am
PLS scheme
Wireless communication
Visual Light Communications Security
visible light communications
visible light communication
uniform distribution
truncated generalized normal distribution
telecommunication security
signal processing
security
secrecy rate
Scalability
Resiliency
Radio frequency
pubcrawl
Entropy
physical-layer security
Photodetectors
normal distribution
multiple eavesdroppers
Metrics
light emitting diodes
jamming LED
Jamming
input signal
indoor VLC system
indoor communication
free-space optical communication
Exponential distribution
biblio
A Privacy Preserving Model for Energy Internet Base on Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 10:57am
Monitoring
user behavior privacy
Sensitivity
Scalability
Resiliency
pubcrawl
privacy preserving model
privacy preserving data release
privacy preserving data mining
privacy preserving
privacy
power engineering computing
nonintrusive load monitoring
Non-intrusive Load Monitoring
NILM
Algorithm design and analysis
Load management
Human behavior
Exponential distribution
energy Internet privacy protection
energy internet
electrical data use analysis
differential privacy
Data Security
Data protection
data privacy
Data mining
data availability
composability
batteries
biblio
Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Mathematical model
zero-sum repeated game
Zero-Sum Games
security of data
security
Scalability
Resiliency
resilience
rational strategy
rational attacker
pubcrawl
optimal cyber-defense strategies
network security
network administrator
Metrics
advanced persistent threats
Human behavior
graph edges
Games
game theory
game theoretical analysis
expressive model
Exponential distribution
defense budget
Data models
cyber attackers
Cyber attack modeling
cognition
budget constrained network administrators