Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Equations
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 12:33pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
Distributed continuous-time optimization based on Lagrangian functions
Submitted by BrandonB on Thu, 04/30/2015 - 11:55am
Equations
Vectors
stability
optimization
optimisation
local convergence
Linear programming
Lagrangian functions
Lagrangian Function
information exchange
Heuristic algorithms
global stability
constrained optimization
equality constraints
Eigenvalues and eigenfunctions
distributed optimization
distributed continuous-time optimization problem
Cost function
convergence
Continuous-Time
continuous time systems
continuous dynamic system
constrained optimization problems
biblio
Combating False Data Injection Attacks in Smart Grid using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 10:55am
Kalman filters
χ2-square detector
state process
smart power grids
smart power grid security
Smart Grids
sensors
security
predictor variable series
power system state estimation
power system security
power system faults
power system
power engineering computing
Mathematical model
actuators
Kalman filter
fault diagnosis
fault detection
false data injection attack detection
Euclidean distance metrics
Euclidean detector
Equations
electric sensing devices
DoS attacks
Detectors
control systems
computer network security
communication infrastructure
« first
‹ previous
1
2
3