Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
estimation
biblio
Actuator deception attack detection and estimation for a class of nonlinear systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
pubcrawl
H∞optimisation
H∞performance optimization
Human behavior
Metrics
Monitoring
nonlinear control systems
nonlinear discrete-time systems
nonlinear systems
estimation theory
Resiliency
Safety
Safety Monitoring System
security of data
state/output estimator
system running status monitoring
unknown deception attacks
unknown inputs
attack/attacker action estimator
active safety monitoring system
Actuator Deception Attack
actuator deception attack detection
actuator security
actuators
Attack detection
attack detector
Attack Estimation
active attack estimator
composability
control system analysis
control system synthesis
control systems safety
Detectors
discrete time systems
estimation
biblio
Kalman Filter with Diffusion Strategies for Detecting Power Grid False Data Injection Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 12:33pm
security of data
power grid states estimation
power grid states measurement
power system measurement
power system security
power system state estimation
pubcrawl
resilience
Resiliency
power grid false data injection attacks
sensor networks
sensor readings
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
state estimation models
electronic power grid
Computer crime
control system signals
Detectors
diffusion Kalman filter
diffusion strategies
distributed estimation models
distributed Kalman filtering
distributed network
Compositionality
estimation
estimation theory
Human behavior
Human Factors
Kalman filters
Meters
power engineering computing
biblio
An augmented cubature Kalman filter for nonlinear dynamical systems with random parameters
Submitted by grigby1 on Fri, 09/28/2018 - 3:18pm
Mobile communication
time-of-arrival estimation
time difference of arrival
TDOA measurements
state vector
Resiliency
resilience
random sensor positions
random parameters
pubcrawl
Probability density function
Nonlinear dynamical systems
nominal values
Noise measurement
mobile source localization
augmented cubature Kalman filter
Metrics
Kalman filters
estimation accuracy
estimation
Dynamical Systems
discrete nonlinear dynamical systems
cubature point
Cubature Kalman filter
computational complexity
composability
CKF
Bayesian filtering problem
Bayes methods
augmented system
biblio
A centralized inter-cell rank coordination mechanism for 5G systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
MMSE receiver
conventional non interference-aware schemes
future fifth generation wireless system
game-theoretic interference pricing measure
intercell interference management mechanism
interference aware intercell rank coordination framework
interference pricing
interference resilience property
interference resilience trade-off
least mean squares methods
linear minimum mean squared error receivers
mean signal-to-interference-plus-noise ratio
centralized intercell rank coordination mechanism
MMSE receivers
multiple receive antennas
multiple transmit antennas
random matrix theory
rank adaptation
receiving antennas
space division multiplexing
spatial multiplexing
transmitter-receiver pair
transmitting antennas
antenna arrays
pubcrawl
matrix algebra
Interference
Receivers
radio receivers
radiofrequency interference
Signal to noise ratio
estimation
resilience
Throughput
Transmitters
game theory
5G mobile communication
MIMO
search problems
5G
Pricing
Monte Carlo methods
Monte Carlo simulations
Computing Theory
5G systems
brute-force exhaustive search algorithm
biblio
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
Submitted by el_wehby on Wed, 05/16/2018 - 6:37pm
Algorithm design and analysis
coding
Data models
detection
Detectors
encoding
estimation
feasible coding matrix
Kalman filters
Linear systems
state estimator
stealthy data injection attacks
time-varying coding
1505701
biblio
Detection and Masking of Trojan Circuits in Sequential Logic
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
Trojan horses
trojan horse detection
Trojan circuit masking
Trojan circuit detection
TC switch description
TC switch
sub-circuit overhead masking
STG description
state variables
state transition graph description
state estimation
sequential circuits
sequential circuit nodes
ROBDDs
binary decision diagrams
resilience
reduced ordered binary decision diagrams
pubcrawl
precise random estimations
Observability
Logic gates
internal node observability
internal node controllability
graph theory
estimation
cyber physical systems
Controllability
composability
Boolean functions
biblio
P-Leader Multifractal Analysis for Text Type Identification
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
p-leader multifractal formalism
wavelet transforms
wavelet analysis
tools
Time series analysis
text type identification
text analysis
stylometry
pubcrawl
p-leaders
corpus analysis
P-leader multifractal analysis
novels
Multifractal analysis
Metrics
literature
Human behavior
Fractals
estimation
biblio
Research Challenges in Dynamic Policy-Based Autonomous Security
Submitted by grigby1 on Tue, 02/27/2018 - 2:40pm
policy-based autonomous security management
Training
smart devices
security management
security enforcement
security
Resiliency
resilience
research issues
research challenges
research and development
pubcrawl
privacy
Access Control
Measurement
machine learning
learning (artificial intelligence)
Government
generative policies
estimation
dynamic policy
consistent conflict free
composability
autonomous systems
automatic security policy generation
authorisation
biblio
Reliable Multipath Communication Approach for Internet-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
reliability gain maximization
multipath channels
Multipath communication
multipath transport protocols
Protocols
pubcrawl
RC4CPS dynamic MP selection
Redundancy
Reliability
Monitoring
reliability requirements
reliable multipath communication approach
resilience
Resiliency
Scalability
smart grid applications
transport protocols
Availability
Metrics
Internet-based cyber-physical systems
Internet-based CPS
internet
Human Factors
Human behavior
future communication network
estimation
e2e approach
diversity
cyber-physical systems
Cyber Dependencies
Correlation
computer network reliability
Compositionality
biblio
Aggregation architecture for data reduction and privacy in advanced metering infrastructure
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Human Factors
utility grid analysis
temporary data buffering
smart power grids
smart meters
Smart Grid Privacy
smart grid consumer privacy
Scalability
Resiliency
resilience
pubcrawl
privacy
power grids
Measurement
international interest
advanced metering infrastructure
Human behavior
Floods
estimation
electricity conservation
data reduction
data privacy
consumer privacy
Big Data
architecture
anonymized summary data
aggregators
aggregation architecture
Aggregation
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »