Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication Network
biblio
Research on Communication Network Security Detection System based on Computer Big Data
Submitted by grigby1 on Fri, 03/31/2023 - 10:17am
Communication Network
security detection
model analysis
computer big data
Resiliency
Web and internet services
data centers
big data security in the cloud
security framework
Cloud Computing
Virtual machining
Big Data
Computational modeling
Scalability
Analytical models
resilience
Metrics
pubcrawl
biblio
Wide-Area Damping Control Using Multiple DFIG-Based Wind Farms Under Stochastic Data Packet Dropouts
Submitted by grigby1 on Fri, 11/20/2020 - 12:54pm
observer-driven reduced copy approach
Communication channels
cyber system
damping performance
distributed phasor measurement units
Gilbert-Elliott model
Monte Carlo simulation
multiple DFIG-based wind farms
networked phasor measurement units
nonlinear time-domain simulations
phasor measurement
Observers
ORC
remote feedback signals
smart power grid
stochastic data packet dropouts
wide-area oscillation damping control
wind energy resources
wind power plants
Stochastic Computing Security
Stochastic processes
pubcrawl
resilience
Resiliency
computer network security
Scalability
power engineering computing
power system security
smart power grids
telecommunication channels
cyber-physical systems
asynchronous generators
power generation control
damping
power system stability
Monte Carlo methods
Communication Network
time-domain analysis
feedback
biblio
A New Approach of Digital Signature Verification based on BioGamal Algorithm
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
Communication Network
SHA algorithm
secured digital signature algorithm
secure hash code
secure digital signature
existing PlayGamal algorithm
digital signature verification
BioGamal algorithm
encryption algorithm
sensitive information
security of data
digital signature
verification
digital signatures
Cryptography
pubcrawl
Resiliency
security
Data Security
Scalability
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
soft failures
optimization
Power Grid
power grids
power system faults
pubcrawl
recovery schedule
rescue missions
resilience
Resiliency
network recovery
software defined networking
Software Defined Networks
software-defined networking
System recovery
telecommunication network reliability
telecommunication network routing
telecommunication scheduling
telecommunication security
uncertainty
large-scale failures
communication infrastructure
Communication Network
Communication networks
congested links
disruptive routing framework
failure locations
failure recovery
interdependent networks
Knowledge engineering
Cascading Failures
maintenance engineering
Massive Disruption
massive failures
Monitoring
multiple interconnected networks
multistage recovery approach
natural disasters
Network Monitoring
network monitoring techniques
biblio
IPv6-Based Smart Grid Communication over 6LoWPAN
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
local electric transformer
CAS
customer agents
Electric Grid
electric utilities
energy data
energy usage
future demand growth
IEEE 2030.5
IEEE 802.15 Standard
IPv6-based smart grid communication system
Carleton University
Low-Power and Lossy Networks
MESH network
OpenLab IEEE 802.15.4 chips
Routing Protocol
self-healing mesh network
Smart City concept
transformer agent
Two-Way Communication
two-way communication system
utility
6LoWPAN
IoT
RPL
IP networks
Resiliency
pubcrawl
composability
Routing protocols
Routing
Reliability
smart power grids
security
Smart Grids
Smart Grid
Mesh networks
wireless LAN
Zigbee
communication technologies
Communication Network
personal area networks
IPv6
biblio
Secure Kalman Filter State Estimation by Partially Homomorphic Encryption
Submitted by aekwall on Mon, 12/30/2019 - 11:35am
secure estimation
Kalman filters
key system information
modified decryption algorithm
multiplicative homomorphic encryption scheme
normal Kalman filtering
partially homomorphic encryption
power system
quantization
IEEE 9-bus power system
secure Kalman filter state estimation
secure multiparty computation methods
SEKF
state estimates
system parameters
system state
trustworthy situation awareness
Scalability
Communication Network
associated communication channels
Homomorphic encryption
state estimation
Human Factors
sensors
Smart Grids
Metrics
pubcrawl
Resiliency
cyber-physical systems
security
data privacy
encryption
Cryptography
biblio
Vulnerability Assessment Method for Cyber Physical Power System Considering Node Heterogeneity
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
hierarchical system
Communication Network
complex network theory
cyber physical power system
different weighting factor
Dispatching
equilibrium
heterogeneity evaluation index system
hierarchical CPPS model
complex networks
island survivability
islanding survivability
network structure
node heterogeneity
short-term operation
vulnerability assessment method
power grid vulnerability analysis
Entropy
pubcrawl
Metrics
Resiliency
composability
Indexes
Communication networks
vulnerability assessment
power engineering computing
resilience
power system faults
Power system protection
network theory (graphs)
Power Grid
power grids
power flow
distributed system
biblio
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
smart grid advanced metering infrastructure
power data
pubcrawl
public key cryptography
public key infrastructure
public-keys
resilience
Resiliency
Servers
Smart Grid
peer-to-peer networks
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
telecommunication network management
telecommunication security
trees (mathematics)
wireless mesh networks
wireless multihop networks
Human behavior
Advanced Metering Infrastructure AMI
AMI networks
certificate revocation list
certification
Communication Network
Compositionality
distributed CRL management model
distributed hash table
distributed hash trees
advanced metering infrastructure
Human Factors
IEEE 802.11s mesh standard
key management
Logic gates
Measurement
metering
Meters
P2P networks
Peer-to-peer computing
1
2
next ›
last »