Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Attacks on Digital Watermarks for Deep Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 1:54pm
deep learning models
watermark
statistical distribution
model prediction
Mobile app
intellectual property theft
fast response times.
Digital Watermarks
deep neural networks training
Deep Neural Network
At-tack
ip protection
copy protection
Watermarking
learning (artificial intelligence)
detection algorithms
neural nets
composability
standards
Computational modeling
industrial property
Mathematical model
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
Training
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
Mathematical model
weighted oriented graphs
system protection analysis
Software
Servers
security of data
security
reference security models
reference security model
pubcrawl
production engineering computing
open systems
modeling of protected systems
automated systems
integrated circuits
Information services
information resources
Industrial Control Systems
industrial control
graph theory
Data protection
Cyber Attacks
critical infrastructures
critical infrastructure facilities
Control Theory
control engineering computing
biblio
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
Mathematical model
traditional network active security threat model
security
Safety
pubcrawl
process control
offensive differential game
network security threat
network security target
network attack and defense
network active security threat process
attack defense differential equation
Information systems
Games
Differential Games
Differential game
differential equations
defensive differential game
defense differential game theory
Control Theory
computer network security
Communication networks
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
Real-time Security Evaluation for Unmanned Aircraft Systems under Data-driven Attacks*
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
information communication
Unmanned Aircraft Systems
state estimation
simulations
security of data
security condition
security
Resiliency
resilience
real-time systems
real-time security scoring algorithm
real-time security evaluation
pubcrawl
network security
Metrics
Mathematical model
Aircraft
Decision Making
data-driven attacks model
data attacks
cyber-physical systems
CPS modeling
CPS
control systems
Control System
composability
autonomous unmanned aerial vehicles
autonomous systems
autonomous decision making
autonomous aerial vehicles
Atmospheric modeling
biblio
A Security-Constrained Islanding Feasibility Optimization Model in the Presence of Renewable Energy Sources
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
pubcrawl
off-line evaluation
optimal control
optimal control actions
optimization
possible islanding event
power distribution control
power distribution faults
power grids
power system security
power systems
Numerical models
renewable energy sources
representative HV subtransmission grid
RES available
resilience
Resiliency
security-constrained islanding feasibility optimization model
simulations
Smart Grids
supplied load
Wind farms
islanded operation feasibility
composability
CPS modeling
distributed power generation
dynamic simulations
frequency control
Generators
genetic algorithms
HV subtransmission level
integer programming
Islanded Operation
actual islanding
islanding conditions
load/generation shedding
loads
long-term security
Mathematical model
Metrics
mixed integer nonlinear problem
network operation
nonlinear programming
biblio
Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
Resiliency
Mathematical model
Metrics
power grids
power system security
precise monitoring
production site
pubcrawl
renewable energy sources
renewable sources
resilience
HVDC power transmission
sensor node
simulation
simulations
specific environment
Substations
Temperature sensors
thermoelectric conversion
thermoelectrical generator
wireless sensor networks
wireless sensor nodes
electrical vehicles
batteries
composability
computational fluid dynamics
computational fluid dynamics model converter
Conductivity
converter
converter station
course means
CPS modeling
Electric Vehicles
autarkic energy supply
electricity
energy harvesting
environmental factors
Europe
fossil fuels
Generators
green electrical power
Grid Security
high voltage direct current technology
HVDC power convertors
biblio
A Formal Modeling and Verification Framework for Service Oriented Intelligent Production Line Design
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
service-oriented architecture
performance constraints
production engineering computing
pubcrawl
quality of service
resilience
Resiliency
service oriented
service oriented intelligent production line design
model-centric way
simulations
Software Architecture
Task Analysis
tools
Unified modeling language
verification method
web services
formal verification
application requirements
complex application
composability
CPS modeling
existing modeling methods
formal modeling
formal simulation verification framework
Formal Specification
Adaptation models
independent equipment network integration
Intelligent production line
large scale high-performance system
Mathematical model
Metrics
model and verification
model-based service-oriented integration approach
biblio
A Framework to embed the Unit Commitment Problem into Time Domain Simulations
Submitted by grigby1 on Thu, 07/16/2020 - 11:43am
power system security
unit commitment
time-domain analysis
time periods scheduling
time domain simulations
time domain simulation
Stability analysis
software framework
simulations
security
SCUC
rolling horizon
Resiliency
resilience
pubcrawl
power system stability
39-bus system
Power system dynamics
power system dynamic simulator
power generation scheduling
power generation dispatch
net-load variability
mixed-integer linear programming security constrained unit commitment problem
Metrics
Mathematical model
Load modeling
integer programming
Generators
frequency stability
CPS modeling
composability
biblio
Reasoning about Sequential Cyberattacks
Submitted by aekwall on Mon, 07/06/2020 - 10:15am
Human Factors
Cyber Dependencies
vulnerability dependencies
simulated vulnerability data
sequential cyberattacks
sequential chained attacks
NP-complete problem
fixed-point operator
cyber-attack modeling
cyber-adversary
cyber adversaries
Cost function
adversarial reasoning
computer systems
Compositionality
Scalability
cognition
Complexity theory
computational complexity
Lattices
Mathematical model
optimisation
Cybersecurity
Metrics
Computational modeling
Social network services
pubcrawl
Resiliency
invasive software
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »