Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure operation
biblio
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
information and communication technology
trustworthiness
Trusted Computing
trust
sensors
security threats
security
secure operation
pubcrawl
Peer-to-peer computing
Nash Equilibrium
Mathematical model
game theoretic security
information and communication technologies
ICT
Games
game-theoretic approach
game theory
cyber-physical systems
CPS sensor nodes
composability
Predictive Metrics
Scalability
Human Factors
biblio
A Practical Attestation Protocol for Autonomous Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
remote device
secure operation
safe operation
PASTA
network disruptions
Mesh networks
low-end verifier devices
low-end prover devices
low-end embedded devices
existing attestation protocols
connected embedded devices
collective attestation
autonomous system
autonomous networks
autonomous embedded systems
arbitrary device outages
Internet of Things
security guarantees
Scalability
Embedded System
computer networks
Robustness
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Protocols
performance evaluation
security
Remote Attestation
attestation
biblio
False Data Injection Attacks Targeting DC Model-Based State Estimation
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
power system state estimation
Transmission line measurements
Topology
state variable target
state estimation
specific targets
smart power grids
Smart Grid
security of data
secure operation
Scalability
Resiliency
resilience
Q measurement
pubcrawl
pre-specified meter target
adversary
power system security
power engineering computing
network topology
Metrics
Meters
Manganese
Human behavior
grid operator
false data injection attack
economic operation
DC model
cyber-attacks
attacking vector
Adversary Models