Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Towards a Security Cost Model for Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
cyber attack
actuator security
security incident
security costs
security cost model
resulting costs
providing security
physical world
onion layer model
flexible systems
engineering secure systems
Cost of security
CPS
actuators
security of data
sensors
Measurement
Mathematical model
Industry 4.0
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Task Analysis
security
Cloud Computing
biblio
Formulation and Numerical Analysis of Acoustics Problems in Coupled Thermohydroelastic Systems
Submitted by aekwall on Mon, 01/13/2020 - 11:07am
Fluids
acoustic coupling
weak viscous fluid
variational techniques
variational problems
time domain problems
Thermohydroelasticity
numerical schemes
numerical analysis
method of moments
mathematical models
heat propagation
Galerkin method
Galerkin approximations
frequency domain problems
Scalability
Electromagnetics
elasticity
elastic body
dissipative acoustics
coupled thermohydroelastic processes
appropriate medical equipment
acoustics problems
acoustic waves
acoustic wave propagation
acoustic wave
Mathematical model
pubcrawl
Human behavior
Resiliency
biblio
Attacks Due to False Data Injection in Smart Grids: Detection Protection
Submitted by grigby1 on Mon, 12/30/2019 - 1:22pm
Meters
uncertainty
uncertainties
system reliability
system protection
smart power grids
Smart Grids
Smart Grid
Resiliency
resilience
pubcrawl
power system security
Power Grid
power generation reliability
power generation protection
Phasor measurement units
False Data Detection
Mathematical model
Human behavior
H2control
H2 control method
H2 control
feedback controller
feedback
FDI detection methods
false data injection attacks
False Data Injection
estimation
energy saving
cyber physical systems
composability
Attack detection
biblio
Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+
Submitted by grigby1 on Mon, 12/30/2019 - 1:19pm
Mathematical model
TLA+
TLA
Silicon
Scalability
Resiliency
pubcrawl
ProVerif
protocol correctness
pre-meditated correctness
passive attacker
mutual key
communicating parties
liveness property
key agreement protocol verification
ING
GDH
formal verification
exponentiation
divide and conquer key distribution protocol
DC DHKE
Cryptography
Cryptographic Protocols
contributory group key agreement
biblio
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
Submitted by aekwall on Mon, 12/16/2019 - 12:46pm
Indexes
threshold cryptography
system reliability
Servers
secret sharing
resilience
pubcrawl
privacy protection
privacy
Mathematical model
life cycle
internet
Instant messaging
data deletion
Human behavior
hash collision
frequent colliding hash table
FlashGhost
data self destructing
Data Sanitization
data privacy
Cryptography
computer network security
computer network reliability
Compositionality
automatic data sanitization system
biblio
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
pubcrawl
wireless channels
Transmitters
telecommunication security
Signal to noise ratio
RSS-based localization method
RSS-based localization
Resiliency
resilience
Receivers
radiofrequency interference
radio spectrum management
PUE attacker detection
cognitive radio
primary user signals
primary user emulation attacker
primary user emulation attack
mobile users
mobile radio
maximum likelihood estimation
Mathematical model
licensed users
emulation
cognitive radio technology
Cognitive Radio Security
cognitive radio networks
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
Simulating Worm Propagation in Interconnected Peer-to-Peer Networks
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
Peer-to-peer computing
worm propagation
unprotected network
Synapses
simulation
Servers
security
Scalability
Safety
Resiliency
resilience
pubcrawl
protected network
peer-to-peer network
attacking networks
peer to peer security
Peer to Peer
Metrics
Mathematical model
interconnected networks
Human Factors
human factor
Human behavior
Grippers
fault tolerance
competitive networks
Communication Systems
biblio
Coexistence of Intensity Pattern Types in Broadband Fourier Domain Mode Locked (FDML) Lasers
Submitted by grigby1 on Tue, 11/26/2019 - 2:35pm
biomedical optical imaging
dispersion
Human behavior
human factor
Human Factors
Laser mode locking
Laser noise
Mathematical model
Optical polarization
pattern locks
pubcrawl
resilience
Resiliency
Ring lasers
Scalability
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »