Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Steady-state
biblio
Evaluation of the Detectability of Damper Cage Damages in Synchronous Motors through the Advanced Analysis of the Stray Flux
Submitted by aekwall on Tue, 08/31/2021 - 10:53am
pubcrawl
Transient analysis
synchronous motors
Steady-state
Shock absorbers
sensors
Rotors
remanent magnetism
remanence
Magnetic Remanence
Induction motors
fault diagnosis
damper cage
Bars
cyber-physical systems
Internet of Things
Compositionality
Resiliency
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
Stealthiness of Attacks and Vulnerability of Stochastic Linear Systems
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
stochastic systems
Stochastic Computing Security
Stochastic Linear Systems
stochastic linear system
stealthy attacks
stealthiness
estimation error
Kalman filters
Steady-state
Stability analysis
Detectors
Stochastic processes
security of data
Cyber-security
Linear systems
Vulnerability
control engineering computing
Scalability
Resiliency
resilience
pubcrawl
cyber-physical systems
security
biblio
Misinformation Control in the Internet of Battlefield Things: A Multiclass Mean-Field Game
Submitted by grigby1 on Tue, 11/17/2020 - 2:00pm
pubcrawl
military computing
misinformation attack
misinformation control
misinformation propagation
multiclass agents
optimal probability
optimisation
probability
Mean-field game
QoI
quality of information
resilience
Resiliency
Scalability
Steady-state
telecommunication control
Human Factors
considered model
convergence
Curing
false information
finite IoBT case
forward backward sweep method
game theory
Games
Computational modeling
infection cost
Internet of Battlefield Things system
Internet of Things
iobt
IoBT node
massive heterogeneous IoBT system
mean-field equilibrium
biblio
A Multiclass Mean-Field Game for Thwarting Misinformation Spread in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:59pm
military communication
Steady-state
security
Scalability
Resiliency
resilience
pubcrawl
multiclass mean-field game
multiclass agents
misinformation spread
misinformation propagation
misinformation attack
military computing
convergence
Mean-field game
mean-field equilibrium
IoBT operations
IoBT node
iobt
Internet of Things
Internet of Battlefield Things system
Human Factors
heterogeneous IoBT system
game theory
finite-IoBT case
epidemic models
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 10:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
biblio
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*
Submitted by aekwall on Mon, 09/09/2019 - 9:49am
invasive software
tractable adversarial coupon-collector model
Steady-state
Servers
Scalability
Resiliency
reconnaissance activity
Reconnaissance
pubcrawl
Predictive Metrics
moving target defense
malware
Network reconnaissance
DDoS Attack
current session request intensity
computer network security
Computer crime
cloud proxied multiserver tenant
Cloud Computing
client request load
botnet reconnaissance
botnet
asynchronous moving-target defense
active reconnaissance
biblio
Distributed Trust-Based Multiple Attack Prevention for Secure MANETs
Submitted by aekwall on Mon, 06/10/2019 - 9:19am
Ad hoc networks
composability
cyber physical systems
Data models
distributed trust
Intrusion Detection
MANET
manet attack prevention
Metrics
mobile computing
Multiple Attacks
network security
Probes
Receivers
Resiliency
Steady-state
biblio
Analysis on Convergence of Stochastic Processes in Cloud Computing Models
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
cloud computing models
Stochastic computing
Stochastic Process
stochastic matrix
stochastic matrices
resource allocations
Rate of Convergence
matrix-defined systems
matrix algebra
Markov processes
complicated model
common stochastic processes
cloud computing systems
Cloud Computing
arbitrary stochastic processes
Eigenvalues and eigenfunctions
Biological system modeling
Steady-state
convergence
Stochastic processes
resource allocation
Scalability
Resiliency
pubcrawl
Computational modeling
security
biblio
Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective
Submitted by grigby1 on Fri, 02/22/2019 - 3:02pm
Metrics
Writing
stylometry
Steady-State Genetic Algorithm
Steady-state
sentiment analysis
Semantics
pubcrawl
psychology
Adversarial Authorship
LIWC
Human behavior
GEFeS
Feature Selection
feature extraction
computer science
authorship attribution
« first
‹ previous
1
2
3
next ›
last »