Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Stochastic processes
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
anonymous system timing analysis
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
information-theoretic security
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
Communication system security
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
security of data
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
biblio
GDGCA: A Gene Driven Cache Scheduling Algorithm in Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
information distribution scheduling algorithm
data popularity
Distributed cache scheduling
future network architecture
GDGCA
gene driven cache scheduling algorithm
gene driven greedy caching algorithm
ICN edge router
ICN environment
ICN scenario
information centered concept
content cache replacement
information epilepsy
Information Gene
information gene value
information-centric network
optimal simulation model
Poisson data volumes
QoE index
satisfaction degree
self-caching network
user-centered concept
information entropy
Data models
Resiliency
pubcrawl
simulation
internet
resource allocation
telecommunication network routing
Throughput
ICN
Information Centric Networks
Scalability
scheduling
greedy algorithms
Stochastic processes
cache storage
Scheduling algorithms
telecommunication scheduling
information-centric networking
Accurate Poisson stream
cache capacity
Content analysis
biblio
A Stochastic Assessment of Attacks based on Continuous-Time Markov Chains
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
probability
trees (mathematics)
Transient analysis
Time measurement
stochastic propagation times
Stochastic processes
stochastic methodology
stochastic assessment
Statistical performance evaluation
sequential attack
security of data
Scalability
Resiliency
resilience
pubcrawl
attack propagation
Petri nets
performance evaluation
Markov processes
individual attack occurrence probabilities
cyber-physical systems
Cyber-physical attack
critical infrastructures
critical infrastructure
continuous-time Markov chains
Conferences
concurrent attack
Chained Attacks
basic attack tree
attack trees
biblio
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks*
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
stochastic games
time-sensitive
Power capacitors
metric interval temporal logic objectives
finite state controller
durational stochastic game
control synthesis
control input
road traffic control
Clocks
actuator security
actuator attacks
CPS
actuators
timing information
timing
Temporal Logic
Games
probability
Stochastic processes
Metrics
Iterative methods
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:42pm
convergence analysis
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
Stochastic processes
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
composability
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
security of data
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
biblio
An Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 1:40pm
gradient methods
ε-differential privacy
stochastic gradient descent algorithm
recommendation systems
recommendation accuracy loss
potential characteristic matrix
noise matrix factorization model
Netflix
MovieLens
differential privacy matrix factorization model
differential privacy constraint
collaborative filtering recommendation model
centralized recommendation
matrix factorization
Matrix decomposition
differential privacy protection
Scalability
Perturbation methods
recommender systems
privacy protection
differential privacy
Predictive models
software engineering
Stochastic processes
Prediction algorithms
privacy
collaborative filtering
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
A General Approach to Assessing the Trustworthiness of System Condition Prognostication
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
discrete times
total error probability
system condition prognostication
system condition prognosis
probabilities
Preventive maintenance
predictive checking
posteriori probability
possible decisions
mutually exclusive events
incorrect decisions
general expressions
failure-free operation
effectiveness indicators
pubcrawl
correct decisions
average operating costs
Mathematical model
maintenance engineering
Stochastic processes
failure analysis
error statistics
trustworthiness
probability
condition monitoring
predictive maintenance
composability
biblio
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs
Submitted by grigby1 on Fri, 11/20/2020 - 1:54pm
Jitter
Stochastic Computing Security
worst-case entropy estimation
unpredictable random numbers
thermal noise
Stochastic processes
specific conditional Shannon entropy
RO-based entropy sources
ring oscillator-based entropy sources
Ring Oscillator
randomness
Oscillators
oscillator-based entropy sources
Cryptography
History
estimation
entropy source
entropy evaluation
Entropy
cryptographic system
average conditional Shannon entropy
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Wide-Area Damping Control Using Multiple DFIG-Based Wind Farms Under Stochastic Data Packet Dropouts
Submitted by grigby1 on Fri, 11/20/2020 - 1:54pm
observer-driven reduced copy approach
Communication channels
cyber system
damping performance
distributed phasor measurement units
Gilbert-Elliott model
Monte Carlo simulation
multiple DFIG-based wind farms
networked phasor measurement units
nonlinear time-domain simulations
phasor measurement
Observers
ORC
remote feedback signals
smart power grid
stochastic data packet dropouts
wide-area oscillation damping control
wind energy resources
wind power plants
Stochastic Computing Security
Stochastic processes
pubcrawl
resilience
Resiliency
computer network security
Scalability
power engineering computing
power system security
smart power grids
telecommunication channels
cyber-physical systems
asynchronous generators
power generation control
damping
power system stability
Monte Carlo methods
Communication Network
time-domain analysis
feedback
biblio
Stealthiness of Attacks and Vulnerability of Stochastic Linear Systems
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
stochastic systems
Stochastic Computing Security
Stochastic Linear Systems
stochastic linear system
stealthy attacks
stealthiness
estimation error
Kalman filters
Steady-state
Stability analysis
Detectors
Stochastic processes
security of data
Cyber-security
Linear systems
Vulnerability
control engineering computing
Scalability
Resiliency
resilience
pubcrawl
cyber-physical systems
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »