Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:54am
modified credit strategy
tokens renewal
Token
telecommunication security
security
Routing protocols
Routing
Q-factor
Protocols
network layer security protocol
network layer attacks
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
Energy Efficiency
E2-SCAN protocol
CSCAN
credit-based strategy
conditional SCAN
AODV
biblio
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
Submitted by BrandonB on Wed, 05/06/2015 - 7:53am
Observers
uncertainty handling
uncertain reasoning
trust management scheme
Trust management
telecommunication security
telecommunication network topology
telecommunication computing
security vulnerabilities
security enhancements
security
Routing
planning (artificial intelligence)
PDR improvement
packet delivery ratio
open wireless medium
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
MANET
indirect observation
end-to-end delay
dynamic topology
DST method
direct observation
Dempster-Shafer Theory
cognition
Bayesian inference
Bayes methods
artificial intelligence community
biblio
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:53am
Mean field game
telecommunication security
system resources
strategic security defence decisions
security game model
security enhancements
security
mobile computing
mobile ad hoc networks
mobile ad hoc network (MANET)
mean field game theoretic approach
Ad hoc networks
mathematical tool
Mathematical model
MANETs
Games
game theory
fully distributed scheme
Equations
centralized administration
Approximation methods
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Overview on vehicular ad hoc network and its security issues
Submitted by BrandonB on Wed, 05/06/2015 - 7:52am
telecommunication switching
safekeeping
Safety
security
security issues
self-configurable network connectivity
signal-weakening barrier
telecommunication network routing
telecommunication security
Roads
travel comfort
unauthorized message injection
VANET
vehicles
vehicular ad hoc networks
Vehicular ad-hoc networks (VANET)
vehicular communications
wireless links
eavesdropping
attacks
authentication
Availability
Computer crime
confidentiality
Cryptography
data privacy
data trust
active safety enhancement
information exchange
information transmission
message alteration
message routing
non-repudiation
Position based routing
preventive safety enhancement
privacy
biblio
Automatic generation of geographical networks for maritime traffic surveillance
Submitted by BrandonB on Tue, 05/05/2015 - 11:42am
Maritime Traffic Networks
Trajectory Mining and Synthetic Trajectories
Trajectory
Traffic
track reconstruction
surveillance
standards
security
route segments
Ports (Computers)
network nodes
maritime traffic surveillance
Anomaly Detection
Maritime Surveillance
maritime shipping lanes
Maritime Knowledge Discovery
marine systems
knowledge discovery process
Knowledge Discovery
historical vessel positioning data
hierarchical graph based representations
geographical maritime network
geographic information systems
automatic generation
biblio
CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures
Submitted by BrandonB on Tue, 05/05/2015 - 11:40am
risk management
power grids
Power measurement
power network configuration
power operators
power system control
power system security
power-grid control networks
power-grid Infrastructures
power engineering computing
security
security assessment techniques
security-oriented stochastic risk management technique
situational awareness
Smart Grids
stochastic Bayesian network models
Stochastic processes
Bayes methods
operating system assets
numerical indices
Intrusion Detection Systems
interprocess communications
Indexes
graph-theoretic power system indexing algorithm
graph theory
Generators
cyber-side instrumentation probes
cyber-physical vulnerability assessment
cyber-physical systems
Cyber-physical security metrics
cyber-physical security indices
cyber-physical critical infrastructures
CPIndex
biblio
Unified multi-critical infrastructure communication architecture
Submitted by BrandonB on Tue, 05/05/2015 - 11:38am
Interdependency
unified multicritical infrastructure communication architecture
Subscriptions
situational awareness
security
quality of service
Publish/Subscribe
private sector
Monitoring
interdependent infrastructure nodes
communication model
information sharing
information network
information management
government sector
Data models
critical infrastructures
critical infrastructure
computer network reliability
biblio
Phase angles as predictors of network dynamic security limits and further implications
Submitted by BrandonB on Tue, 05/05/2015 - 11:37am
PMU
Wide-Area Situational Awareness (WASA)
system reliability
synchrophasor
Stability analysis
security
random processes
random forest models
random forest mapping
random forest (RF)
Radio frequency
R-squares accuracy
Predictive models
power transfer
power system stability
Data mining
Phasor measurement units
phasor measurement unit (PMU)
phasor measurement
network dynamic security limits
Monitoring
load forecasting
load forecast
historical phase angles values
GLM
generalized linear model
energy management systems
dynamic security monitoring
dynamic security margins
dynamic security assessment (DSA)
biblio
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
Submitted by BrandonB on Tue, 05/05/2015 - 11:31am
network topology
state estimation
SOCCA
situational awareness
security-oriented cyber-physical contingency analysis
security
power system topology
power system security
power system planning
power system contingency
power infrastructures
power grids
physical components
accidental contingency
Mathematical model
malicious compromises
Indexes
grid operation
cyber-physical systems
cyber-physical security evaluation
cyber perspective
cyber network configuration
cyber components
control network
contingency analysis
Algorithm design and analysis
« first
‹ previous
…
419
420
421
422
423
424
425
426
427
…
next ›
last »