Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication technology
biblio
Communication Engineering Application System Based on Artificial Intelligence Technology
Submitted by grigby1 on Mon, 01/10/2022 - 3:55pm
composability
Smart Grids
Resiliency
resilience
pubcrawl
Metrics
information security
Human behavior
High and new technology
5G mobile communication
communication technology
Communications technology
Communication networks
Communication engineering
automation
artificial intelligence security
Artificial Intelligence
biblio
Causal Chain of Time Delay Attack on Synchronous Generator Control
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
SCADA systems
physical power grid
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
robust control
modern power grids
Scalability
security
security of data
synchronous generator control
synchronous generators
Time delay
time delay attack
Time measurement
cyber-space leading
attack vector
Chained Attacks
communication technology
Cyber Attacks
cyber intrusion
cyber security
cyber-physical causal chain
cyber-physical systems
attack tree
Delay effects
delays
denial-of-service attack
frequency control
grid cyber security
grid frequency
grid response
load frequency control
biblio
Realizing Dynamic Network Slice Resource Management based on SDN networks
Submitted by aekwall on Mon, 10/05/2020 - 11:00am
network service features
control plane
SDN technology
control layer
customized services
dynamic network slice resource management
dynamic network slice resource scheduling
end-to-end network
multiple virtual networks
network management authority
telecommunication scheduling
network slicing framework
SDN monitoring
SDN networks
service quality
software defined networking (SDN)
streaming services
virtual network
Dynamic Networks and Security
Metrics
Internet of Things
Internet of Things (IoT)
computer architecture
computer network management
network layer
software defined networking
Resiliency
pubcrawl
composability
Cloud Computing
5G mobile communication
network slicing
Switches
Software Defined Network
5G
communication technology
Dynamic scheduling
data plane
biblio
The Plug-and-Play Electricity Era: Interoperability to Integrate Anything, Anywhere, Anytime
Submitted by aekwall on Mon, 09/14/2020 - 11:27am
Communication equipment
composability
successful electric power system component connection
power system equipment
power apparatus
plug-and-play electricity era
organizational structures
Interoperation
integrated operational challenges
inforrmation age
Electricity supply industry
electric system components
electric power engineering
electric power devices
coordinated operations
computer-based automation systems
security
attaching wires
associated sensing
architectural impacts
architectural concepts
communication technology
environmental factors
open systems
energy management
interoperability
power system reliability
power engineering computing
Ecosystems
power grids
organisational aspects
pubcrawl
biblio
SIMON Lightweight Encryption Benchmarking on Wireless Aquascape Preservation
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
remote Android smartphone
Arduino controller
autonomous aquascape preservation system
DS18B20 sensor
engineering technique
Human-computer interaction
instance aquascaping
leisure activities
pervasive computing
aquascape temperature
SIMON lightweight cryptography
SIMON lightweight encryption
SIMON lightweight encryption benchmarking
unauthorized party
wireless aquascape preservation system
wireless communication channel
android encryption
security of data
aquascape
Android graphical user interface application
Metrics
graphical user interfaces
communication technology
user experience
user interfaces
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
telecommunication security
Cryptography
Scalability
biblio
Design and Verification of Integrated Ship Monitoring Network with High Reliability and Zero-Time Self-Healing
Submitted by grigby1 on Mon, 02/17/2020 - 4:13pm
optical switches
zero-time self-healing network communication technology
Zero-time self-healing
telecommunication network planning
ships
Ship monitoring network
ship monitoring equipment
self-healing networks
self-healing network switch
Resiliency
resilience
Redundancy
real-time systems
pubcrawl
communication technology
network performance test environment
network cables
Monitoring
Marine vehicles
maintenance engineering
Local area networks
integrated ship monitoring network
High reliability
Ethernet
computerised monitoring
computer network reliability
composability
biblio
Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning
Submitted by aekwall on Mon, 02/10/2020 - 11:05am
modern advances
bad data detection mechanisms
basic measurements
data measurements
deep learning algorithm
deep learning based framework
false data injection attack
FDI attacks
IEEE 39-bus system
injected data measurement
long short term memory network
communication technology
modern cyber threats
network level features
redundant measurements
smart grid applications
specific assumptions
system states
system variables
time-series anomaly detector
traditional state estimation bad data detection
Smart Grid Sensors
power system security
Detectors
learning (artificial intelligence)
Resiliency
pubcrawl
convolutional neural nets
convolutional neural network
smart power grids
power engineering computing
Smart Grids
power system
security of data
Power system dynamics
Recurrent neural networks
deep learning
Human Factors
electricity grid
power system measurement
power system state estimation
Compositionality
dynamic detection
power meters
biblio
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
smart cards
session key disclosure attacks
secure multifactor remote user authentication scheme
secure multifactor authentication protocol
resource limited devices
Kalra's scheme
communication technology
cloud-IoT environment
cloud-IoT applications
biometrics (access control)
multifactor authentication
Human Factors
security problems
Cloud Computing
password
authentication
Metrics
pubcrawl
Resiliency
embedded devices
Protocols
Cryptographic Protocols
telecommunication security
Internet of Things
Big Data
authorisation
biblio
Optimizing Detection of Malware Attacks through Graph-Based Approach
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
hook attacks
Host-based
invasive software
Kernel
malicious code execution
malicious system call
malware
malware attacks
Graph-model
Monitoring
optimisation
optimization
pubcrawl
resilience
Resiliency
signature-based model
tools
computer viruses
API hook
application program interfaces
application programming interface
attack graphs
code obfuscation technique
communication technology
composability
Computational modeling
API graph-based model
Computers
digital signatures
graph comparison
graph partition
graph theory
graph-based approach
graph-generation