Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Control Theory
biblio
Metrics to Enhance the Resilience of Cyber-Physical Systems
Submitted by grigby1 on Tue, 05/25/2021 - 2:49pm
Cyber-Resilience
Software
Security Metrics
Resiliency
resilience
Redundancy
Recoverability
pubcrawl
Monitoring
Hardware
diversity reception
CPS resilience
cyber-physical systems
cyber physical systems
covert attacks
Control Theory
Computing Theory and Resilience
Computing Theory
Compositionality
composability
Attack Remediation
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 12:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
RSU
optimized traffic management
pollution control
Predictive Metrics
pubcrawl
Resiliency
resource allocation
road safety
road side units
maxmin game
Scalability
security game
security game model
security of data
security resource allocation
security resources
smart cities
Control Theory
ITS
Intelligent Transportation Systems
Human Factors
game-theoretic approach
game theory
game theoretic security
distributed attacks
distributed attack mitigation
decision-making abilities
data corruption attacks
connected vehicles
collision avoidance
attack mitigation
attack detection schemes
resilience
biblio
Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems
Submitted by aekwall on Mon, 02/08/2021 - 12:40pm
Human Factors
Task Analysis
Scalability
Resiliency
pubcrawl
Predictive Metrics
optimization
operability
Open Source Software
mission impact propagation graph
mission impact
Metrics
logical attack graph
Computing Theory
cyberattack
cyber-physical systems
Cyber Dependencies
CPS Modeling and Simulation
Control Theory
Computing Theory and Resilience
Computer crime
Computational modeling
Compositionality
composability
Artificial Neural Networks
resilience
biblio
Security of Networked Control Systems with Incomplete Information Based on Game Theory
Submitted by grigby1 on Wed, 02/03/2021 - 11:56am
IDS
telecommunication control
security
Scalability
resilience
pubcrawl
Packet loss
one-shot game
networked control systems
networked control system security
NCS
Monitoring
intrusion detection system
Industrial Control Systems
incomplete information based on game theory
Incomplete information
Networked Control Systems Security
Games
game theory
energy consumption
DoS attacks
Denial of Service attacks
cyber-physical systems
Control Theory
computer network security
belief networks
Bayes rule
Bayes methods
Predictive Metrics
composability
Resiliency
biblio
Decision-Making in Complex Dynamical Systems of Systems With One Opposing Subsystem
Submitted by grigby1 on Fri, 07/24/2020 - 12:02pm
independent decision-making entities
Control Theory
unified team making team-based decisions
opposing subsystem
opposing attacked subsystem
noninferior Nash strategies
noncooperative game theory
Large-scale systems
interacting subsystems
security
decision-making process
cooperative game theory
complex systems
complex dynamical systems of systems
adversarial decision-making environment
game theory
Decision Making
pubcrawl
biblio
Image Encryption Algorithm Based on Hyper-chaotic Lorenz Map and Compressed Sensing Theory
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
digital image encryption algorithm
Control Theory
random matrix design
multidimensional chaotic system
motion state
motion process
measurement matrix
image encryption
image compression
hyper-chaotic Lorenz map
Hadamard matrix
Hadamard matrices
encryption sequence
Cryptography
compressed sensing theory
chaotic sequence
Sparse matrices
image motion analysis
digital images
Image coding
chaos
compressed sensing
pubcrawl
security
encryption
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Mathematical model
weighted oriented graphs
system protection analysis
Software
Servers
security of data
security
reference security models
reference security model
pubcrawl
production engineering computing
open systems
modeling of protected systems
automated systems
integrated circuits
Information services
information resources
Industrial Control Systems
industrial control
graph theory
Data protection
Cyber Attacks
critical infrastructures
critical infrastructure facilities
Control Theory
control engineering computing
biblio
Application of STPA in Temporary Speed Restriction Sending Scenario of Train Control System Based on Vehicle-Vehicle Communication
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
security design requirement
Control Theory
vehicle-vehicle communication
UPPAAL
unsafe control actions
UCA
train control system
temporary speed restriction sending scenario
system theoretic process analysis method
STPA method
STPA
security design requirements
security
SDR
railway safety
railway engineering
Hazards
control defects
control defect
CD
automata theory
formal verification
control engineering computing
pubcrawl
biblio
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Mathematical model
traditional network active security threat model
security
Safety
pubcrawl
process control
offensive differential game
network security threat
network security target
network attack and defense
network active security threat process
attack defense differential equation
Information systems
Games
Differential Games
Differential game
differential equations
defensive differential game
defense differential game theory
Control Theory
computer network security
Communication networks
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »