Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fault diagnosis
biblio
Comparison of Data Mining Tools for Significance Analysis of Process Parameters in Applications to Process Fault Diagnosis
Submitted by BrandonB on Wed, 05/06/2015 - 2:30pm
Data mining
fault diagnosis
Input variable significance
Manufacturing industries
biblio
Countermeasures to Enhance Cyber-physical System Security and Safety
Submitted by BrandonB on Tue, 05/05/2015 - 10:21am
deception attack detection
smart sensors
security of data
security
safety instrumented systems
Safety
Robot sensing systems
process control
ISA-84
intelligent checkers
intelligent checker
integrated circuits
IC
fault diagnosis
anomaly detection technique
data integrity
cyber-physical systems
cyber-physical system security
cyber-physical system safety
cyber-attacks
cross-correlator
CPS security countermeasures
CPS safety protection layers
CPS safety integrity level
CPS failure mitigation
CPS failure detection
catastrophic failures
biblio
Automated fault diagnosis in Multiple Inductive Loop Detectors
Submitted by BrandonB on Tue, 05/05/2015 - 9:17am
vehicles
Transfer Function
traffic flow detectors
series-connected multiple inductive loop detectors
Resonant frequency
Multiple Inductive Loop Detectors
inductive sensors
Frequency response
fault location
fault diagnosis
embedded systems
Embedded System
Detectors
Circuit faults
automated fault diagnosis
biblio
Security risk analysis for smart grid automation
Submitted by BrandonB on Fri, 05/01/2015 - 7:48am
power engineering computing
Vulnerability Analysis
supply restoration smart grid automation
Substations
Software
smart power grids
Smart Grids
security risk analysis methodology
security
SCADA systems
risk analysis
reliability theory
random component failures
power system security
power system reliability
power system faults
attack identification
industrial automation engineering
impact analysis
IEC standards
IEC 61850
IEC 61499
fault location
fault isolation
fault diagnosis
electric grids
electric grid automation system
control engineering computing
complex system design
communications network topology
automation architecture
automation
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 3:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:56am
Kalman filters
χ2-detector
state processes
smart-grid systems security
smart power grids
Smart Grids
security
robust security framework
random attack
predictor variables
power system security
power engineering computing
Mathematical model
communication infrastructure
Kalman filter smart grid
Kalman filter
fault diagnosis
false data-injection attack
false data injection attack
Euclidean detector
DoS attack
Detectors
dependent variables
denial-of-service attack
Cyber Physical System
computer network security
biblio
Combating False Data Injection Attacks in Smart Grid using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:55am
Kalman filters
χ2-square detector
state process
smart power grids
smart power grid security
Smart Grids
sensors
security
predictor variable series
power system state estimation
power system security
power system faults
power system
power engineering computing
Mathematical model
actuators
Kalman filter
fault diagnosis
fault detection
false data injection attack detection
Euclidean distance metrics
Euclidean detector
Equations
electric sensing devices
DoS attacks
Detectors
control systems
computer network security
communication infrastructure
« first
‹ previous
…
3
4
5
6
7
8
9
10
11