Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
A Trust-based Message Passing Algorithm against Persistent SSDF
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
cognitive radio
cooperative spectrum sensing
false trust
Libraries
malicious users
Mathematical model
message passing
policy-based governance
pubcrawl
radio transmitters
Reliability
Resiliency
Resists
Scalability
sensors
biblio
Blockchain Based Decentralized Trust Management framework
Submitted by aekwall on Mon, 06/28/2021 - 12:30pm
IoT
Scalability
Data models
Resiliency
pubcrawl
policy-based governance
wireless sensor networks
blockchain
Mathematical model
Markov processes
computer science
Trust management
malicious behavior
Proof of trust
false trust
biblio
Automated Process Control Anomaly Detection Using Machine Learning Methods
Submitted by aekwall on Thu, 06/24/2021 - 11:55am
machine learning
Resiliency
pubcrawl
composability
Big Data
Vulnerability
Automated Response Actions
Anomaly
Mathematical model
computer attack
biblio
Adversarial Attacks on AI based Intrusion Detection System for Heterogeneous Wireless Communications Networks
Submitted by aekwall on Thu, 06/24/2021 - 11:50am
IP networks
Scalability
security
Resiliency
Human behavior
pubcrawl
Neural networks
Training
Mathematical model
Intrusion Detection
SDN
Artificial Intelligence
Deep Neural Network
AI security
heterogeneous wireless access technologies
AI Poisoning
biblio
Conceptual Design and Modeling of Fast Discharge Unit for Quench Protection of Superconducting Toroidal Field Magnets of DTT
Submitted by grigby1 on Tue, 06/01/2021 - 2:50pm
hybrid circuit breaker
confinement
Toroidal magnetic fields
superconducting magnets
superconducting coils
Resistors
quench protection
QPC
Magnetomechanical effects
privacy
FDU
dump resisto
Discharges (electric)
composability
Mathematical model
Resiliency
resilience
pubcrawl
biblio
Cyber-Resilience Evaluation of Cyber-Physical Systems
Submitted by grigby1 on Tue, 05/25/2021 - 3:50pm
Measurement
sensors
Sensor Systems
Resiliency
resilience
pubcrawl
process control
networked control systems
Metrics
actuator saturation
Mathematical model
Cyber-Resilience
cyber-physical security
cyber physical systems
critical infrastructures
CPS resilience
adversary model
actuators
biblio
A Synchronous Iterative Method of Power Flow in Inter-Connected Power Grids Considering Privacy Preservation: A CPS Perspective
Submitted by aekwall on Tue, 05/25/2021 - 3:32pm
pubcrawl
privacy
internet
Mathematical model
Smart Grids
Human Factors
system integration
CPS Privacy
privacy preservation
Information Masking
Iterative methods
Load flow
power flow
Synchronous Iteration
biblio
Novel Strategies for Security-hardened BMS for Extremely Fast Charging of BEVs
Submitted by aekwall on Tue, 05/25/2021 - 3:21pm
moving target defense (MTD)
Switches
state of charge
SOC control
security
secure charging
Resiliency
pubcrawl
process control
Predictive Metrics
optimal control
CPS modeling
Mathematical model
CPS Modeling and Simulation
CPS
controller and feedback redundancy
composability
BEVs
battery management systems (BMS)
batteries
simulation
biblio
Dynamic vs Static Encryption Tables in DES Key Schedules
Submitted by grigby1 on Thu, 05/20/2021 - 11:54am
encryption
Schedules
Adaptation models
pubcrawl
Metrics
resilience
Resiliency
Mathematical model
Cryptography
composability
Memory management
Dynamic scheduling
Context modeling
DES
Key schedule
white box cryptography
biblio
Detection of False Data Injection Attack in Automatic Generation Control System with Wind Energy based on Fuzzy Support Vector Machine
Submitted by grigby1 on Thu, 05/13/2021 - 12:22pm
Power system dynamics
wind turbines
Wind Storage System
Wind speed
Support vector machines
support vector machine
Scalability
Resiliency
resilience
pubcrawl
False Data Detection
Mathematical model
Human behavior
fuzzy theory
false data injection attack
Data models
Automatic Generation Control System
automatic generation control
Attack vectors
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »