Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
control systems
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
security of data
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
Communication system security
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
information-theoretic security
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
anonymous system timing analysis
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
biblio
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
security of data
Detectors
Monitoring
Scalability
game theory
cyber-physical systems
Resiliency
pubcrawl
control systems
Games
Human Factors
estimation
Predictive Metrics
state estimation
game theoretic security
game-theoretic approach
Covariance matrices
defense strategies
CPSS
Chi-square detector
clandestine attack strategies
Data-Integrity Attack
digital twin
estimation theory
intelligent attackers
online digital model
physical system
Signaling Game with Evidence
stealthy estimation attack
biblio
Biometric Authentication for Safety Lockers Using Cardiac Vectors
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
authentication
Bio-metrics
biometrics (access control)
BIOS
control systems
Digital Lockers
ECG
Electrocardiography
feature extraction
Human behavior
Identification
Manuals
Metrics
pubcrawl
resilience
Resiliency
Safety
Scalability
security
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 4:42pm
Monitoring
telecommunication traffic
real-time systems
Resiliency
pubcrawl
composability
Metrics
internet
Fuzzy logic
fuzzy set theory
control systems
delays
wireless mesh networks
Linguistics
queueing theory
explicit rate messages
future queue state
fuzzy framework
network traffic load
performance efficiency
queue length
safe traffic adaptation
safe traffic adaptation model
self-configured technology
self-organized technology
Wireless Mesh Network Security
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
Access Control
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
control systems
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
resilience
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
security
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
biblio
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
Cloud Computing
Computer crime
control systems
denial-of-service attack
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Servers
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
adversarial reconnaissance
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
data privacy
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
Network reconnaissance
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
security of data
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
biblio
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
Submitted by grigby1 on Tue, 02/16/2021 - 1:40pm
Internet of Things
security of data
risk management
security
Monitoring
pubcrawl
resilience
Resiliency
control engineering computing
control systems
Buildings
risk analysis
documentation
building management systems
cyber-physical systems
Stakeholders
comprehensive risk assessment process
cost effective risk management
inter-networked control systems
smart building risk assessment case study
smart building risk assessment methodology
smart building stakeholders
smart buildings
Damage Assessment
biblio
Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers
Submitted by grigby1 on Tue, 02/16/2021 - 12:45pm
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Software
telecommunication security
Cloud Computing
software fault tolerance
composability
control systems
software defined networking
Object oriented modeling
fault tolerance
malicious attacks
software-defined network
Reliability
telecommunication network topology
telecommunication network reliability
5G networks
network topologies
Software Defined Networks
Byzantine Fault Tolerance
byzantine fault tolerance algorithms
cloud-native software
distributed consensus
distributed consensus algorithms
distributed control plane
distributed controller replicas
dynamic reconfiguration
key data
modeling frameworks
modeling reliability
network resilience
network softwarization
Raft
replicated SDN controllers
SDN control plane
security considerations
dynamic networks
biblio
A Moving Target Approach for Securing Secondary Frequency Control in Microgrids
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
computer network security
Scalability
Conferences
Resiliency
pubcrawl
Metrics
Decision Making
power engineering computing
power system security
control systems
Load modeling
sensor data
distributed power generation
Microgrids
power generation scheduling
Human Factors
Markov processes
communication links
Compositionality
denial of service
cyber attack
DoS attacks
power generation control
denial of service attack
Cyber Dependencies
frequency control
Inverters
invertors
cyber attack threats
inverter-based DG
Markov process
microgrid control systems
microgrid secondary frequency control
Moving Target
moving target approach
reactive defense approaches
secondary control
small-signal model
1
2
3
4
5
6
7
8
9
…
next ›
last »