Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
A constrained topological decomposition method for the next-generation smart grid
Submitted by grigby1 on Thu, 12/28/2017 - 12:16pm
Algebraic Mathematical Programming Language (AMPL)
Compositionality
constrained optimization
decomposition
Economic dispatch
Economics
Generators
Linear programming
Load flow
Load modeling
Mathematical model
Metrics
Microgrids
pubcrawl
Reserve Constraints
biblio
A random number generation method based on discrete time chaotic maps
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
FPAA-FPGA
Steganography
statistical testing
statistical test
Resiliency
random number generator
random number generation method
random number generation
pubcrawl
piecewise linear techniques
piecewise linear one dimensional discrete time chaotic maps
NIST 800-22 randomness test
Metrics
Mathematical model
bifurcation
FIPS 140-2
field programmable gate arrays
field programmable digital arrays
field programmable analogue arrays
field programmable analog arrays
Entropy
Cryptography
Correlation
composability
chaotic signal
chaotic cryptography
chaos
biblio
A five-dimensional chaotic system with a large parameter range and the circuit implementation of a time-switched system
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
Lu system
time-switched system
Switching circuits
Switches
switched systems
Resiliency
pubcrawl
Poincare mapping
multiple chaotic attractors
microcontrollers
microcontroller unit
Metrics
Mathematical model
Lyapunov methods
Lyapunov exponent spectrum
Lyapunov exponent
antitranslation capability
Lu
information safety
five-dimensional chaotic system
field programmable gate arrays
digital circuit
Cryptography
composability
circuit implementation
chaotic system
chaotic encryption
chaotic cryptography
chaotic communication
chaos
bifurcation diagram
bifurcation
biblio
Multivariate symmetric cryptography with 2-dimesion chaotic disturbation
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
Metrics
two-dimension chaotic system
system
Synchronization
signature system
security
Resiliency
public key cryptography
pubcrawl
multivariate symmetric encryption system
multivariate symmetric cryptography
multivariate public key cryptosystem
multivariate
minus mode
2-dimesion chaotic disturbation
Mathematical model
general attack methods
finite field
encryption
composability
chaotic shell protection
chaotic cryptography
chaotic communication
chaotic
chaos
central map
affine map
biblio
Wells turbine modeling and PI control scheme for OWC plant using Xilinx system generator
Submitted by grigby1 on Wed, 12/20/2017 - 7:51pm
oscillating behaviors
Xilinx System Generator
Well turbine
Turbines
Torque
Resiliency
pubcrawl
PI control
Oscillating Water Column
Atmospheric modeling
Metrics
Mathematical model
Logic gates
Irregular wave
Generators
DC motors
composability
biblio
Estimation of safe sensor measurements of autonomous system under attack
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
car-follower model
sensor security
security concerns
safety-critical software
safety concerns
safe sensor measurements
recursive least square algorithm
radar antennas
Radar
message authentication
estimation
delay injection
challenge response authentication technique
Metrics
autonomous system
attack vector
delays
Mathematical model
Computer crime
sensors
composability
Human Factors
Human behavior
Resiliency
pubcrawl
cyber-physical systems
biblio
A contribution to cyber-security of networked control systems: An event-based control approach
Submitted by grigby1 on Wed, 12/20/2017 - 12:00pm
control system synthesis
signal processing security
three-tank system
residual generator
process control
Observers
nonlinear control systems
networked control systems
NCS
linear matrix inequalities
FTD
fault tolerant detection
fault tolerant control
event-based control approach
Cyber-security
security
control design
BMI
bilinear systems
bilinear matrix inequality
attack/fault detection
Mathematical model
sensors
composability
privacy
Resiliency
pubcrawl
Metrics
Controller Synthesis
biblio
Implementation of GPS signal simulation for drone security using Matlab/Simulink
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
signal data
Jamming
Mathematical model
noise models
P code
radio receivers
radiofrequency interference
Satellite broadcasting
Satellites
IF GPS signal
signal processing
signal processing algorithm
Signal to noise ratio
Signal-to-noise ratio (SNR)
simulated signals
simulation model
spoofing-jamming interference
signal processing security
Drone security
pubcrawl
Resiliency
privacy
composability
Radiation detectors
Generators
carrier-to-noise ratio estimation
digital intermediate frequency GPS signal
Metrics
drone security applications
Global Positioning System
GPS receivers
GPS signal generator
GPS signal simulation
GPS spoofing signal generation
IF (intermediate frequency) signals
biblio
Combined sensing, performance and security trade-offs in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:28am
Cognitive Radio Networks(CRN)
Cognitive Radio Security
encryption
Mathematical model
Measurement
Performance Metrics
Primary User(PU)
pubcrawl
Resiliency
Secondary User (SU)
Security Control
sensors
Throughput
biblio
Security versus reliability study for power-limited mobile IoT devices
Submitted by grigby1 on Tue, 12/12/2017 - 12:29pm
Ad Hoc Network Security
composability
Human behavior
Human Factors
Internet of Vehicles
IoT security
IP networks
Mathematical model
Metrics
pubcrawl
Relays
Reliability
Resiliency
security
vehicular ad hoc networks
Wireless communication
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
…
next ›
last »