Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Control Theory
biblio
Graph-Based Event Classification in Grid Security Gateways
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
renewable distributed energy resource aggregators
Grid Security
grid security gateways
Grid Trust
network anomaly detection
network security
packet header behavioral analysis
power distribution control
power distribution control devices
encrypted communications
renewable energy sources
SG system
Substations
TCP-IP packet
TCPIP
time-series data
Trusted Communications
Control Theory
transport protocols
security
Protocols
power engineering computing
power system security
telecommunication security
probability
pubcrawl
encryption
Cryptography
Anomaly Detection
graph theory
power grids
Cyber-physical attacks
DERA
distributed power generation
electrical grid distribution network
biblio
Synergetic Synthesis of the Hierarchical Control System of the “Flying Platform”
Submitted by grigby1 on Fri, 07/24/2020 - 12:00pm
flying platform
Control Theory
vertically take-off aircraft
vehicle spatial position balancing
turbogenerators
turbine generator
synergetic synthesis
synergetic control theory
squirrel cage motors
rescue operations
position control
nonlinear control systems
machine control
hierarchical systems
hierarchical control system
functional decomposition
security
fan in the ring
energy saving control
emergency management
electric motor control
disasters
disaster zones
coordinating energy-saving control
control system synthesis
control laws
Computer simulation
aircraft control system
aircraft control
”flying platform”
pubcrawl
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
biblio
Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
industrial control system
Safety
Resiliency
pubcrawl
Protocols
production engineering computing
Predictive Metrics
power systems
power industry control system intrusion
Networked Control Systems Security
network invasion
network intrusion
Control Theory
industrial control network space security
industrial control
control systems
control engineering computing
computer network security
composability
Business
behavior characteristics analysis
attack model
attack behavior analysis
security
biblio
L2 Control for Networked Control Systems Subject to Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
DoS jamming attacks
Networked Control Systems Security
Un-known Periodic Dos Jamming Attacks
trigger parameters
time-varying systems
switching system model
state feedback controller
state feedback
piecewise Lyapunov function
linear matrix inequalities
L2 control
Jamming
exponential stability analysis
event-triggering mechanism
telecommunication security
Denial of Service jamming attacks
Control Theory
Asymptotic stability
control system synthesis
Symmetric matrices
Lyapunov methods
stability
networked control systems
Predictive Metrics
control engineering computing
composability
pubcrawl
Resiliency
biblio
Enforcing Optimal Moving Target Defense Policies
Submitted by grigby1 on Tue, 02/18/2020 - 11:06am
MDP model
value iteration
security
Scalability
Resiliency
resilience
pubcrawl
optimal security policies
optimal policy selection
optimal moving target defense policies
moving target defense
Metrics
Analytical models
Mathematical model
Markov processes
Markov Decision Process
Markov Decision
Iterative methods
Games
Decision Making
Control Theory
computer science
Bellman optimality equation
biblio
LevelTree: A New Scalable Data Center Networks Topology
Submitted by grigby1 on Mon, 12/16/2019 - 2:59pm
shortest path
LevelTree
network topology
new scalable data center network topology
pubcrawl
resilience
Resiliency
Scalability
Servers
Jellyfish
telecommunication network routing
telecommunication network topology
topological properties
Topology
tree topology
Vegetation
VolvoxDC
Data Center Network(DCN)
Bisection Bandwidth
cloud based applications
computer centres
computer networks
Control Theory
critical topologies
Cyber Physical System
cyber physical systems
Bandwidth
data centers
DCN topology
Diameter of graph
Fattree
graph theory
high bisection bandwidth
Human behavior
biblio
Traffic State Estimation with Big Data
Submitted by grigby1 on Mon, 12/16/2019 - 2:59pm
Control Theory
Cyber Physical System
cyber physical systems
HMM
Human behavior
pubcrawl
resilience
Resiliency
Scalability
SEA
System State Network
Traffic State Estimation
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »