Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Numerical models
biblio
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
Adversary Emulation
Adversary Models
cyber-physical security
cyber-physical systems
emulation
Human behavior
hybrid attack graph
Metrics
Numerical models
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
security
uncertainty
biblio
Numerical Study of Acoustic Propagation Characteristics in the Multi-scale Seafloor Random Media
Submitted by aekwall on Mon, 12/21/2020 - 12:30pm
Scalability
Resiliency
Human behavior
pubcrawl
Media
Numerical models
Acoustics
acoustic wave propagation
acoustic waves
acoustic coupling
acoustic anisotropy
acoustic data
acoustic propagation characteristics
acoustic wave scattering
acoustic wave velocity
acoustic wave velocity dispersion
complicated wave propagation
coupled PSM-BEM program
distributed multiscale random media
fluid flow
high frequency seafloor acoustics
low frequency seafloor acoustics
multi-scale
multiscale distribution
multiscale seafloor random media
numerical study
oceanographic techniques
pore space
random media
Sea floor
seafloor phenomena
sediments
two-dimensional PSM-BEM program
underwater acoustic propagation
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
security of data
Internet of Things
IoT applications
Trusted Computing
Data models
learning (artificial intelligence)
pubcrawl
composability
trust
trustworthiness
sensor fusion
Internet of Things applications
inference mechanisms
Numerical models
uncertainty handling
Temperature sensors
Temperature distribution
authentic forged image data
complementary multimodal data
Dempster-Shafer Theory
DST framework
image sensor data
image sensors
IoT image sensor data
IoT sensor data
multimodal
numerical data
temperature sensor data
trustworthy measure
biblio
Poisoning Attack on Load Forecasting
Submitted by grigby1 on Wed, 11/04/2020 - 1:14pm
AI Poisoning
closed-form solution
Data models
data poisoning strategy
forecasting
Global Energy Forecasting Competition data
Human behavior
load forecasting
Load modeling
MLR attacking solution
MLR model
multiple linear regression
neural network
Numerical models
outlier detection
poisoning attack
poisoning attack solution
power engineering computing
power grids
power system security
Predictive models
pubcrawl
regression analysis
resilience
Resiliency
Scalability
security of data
short-term load forecasting systems
simulated annealing
statistical methods
Training data
biblio
Empirical Validation of System Dynamics Cyber Security Models
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
False Data Detection
Computational modeling
computer security
continuous simulation
cyber security
cyber security modeling
cyber-attacks/defenses
empirical behavior test
empirical structural test
empirical validation
Expert Systems and Security
Human behavior
Mathematical model
model builder
model structure
Numerical models
pubcrawl
Resiliency
Scalability
security of data
Servers
simulation and modeling
standards
System Dynamics
system dynamics cyber security models
system dynamics model validation
biblio
Inferring Trust Using Personality Aspects Extracted from Texts
Submitted by aekwall on Mon, 10/12/2020 - 10:33am
security of data
Scalability
data privacy
Trusted Computing
Data models
Human behavior
pubcrawl
Computational modeling
tools
Decision Making
text analysis
Correlation
Data mining
Human Factors
Software systems
inference mechanisms
Numerical models
trust model
psychology
affective aspects
evaluation system
logical protection
malicious people
nonpersonality-wise approaches
online human-fed evaluation systems
personality models
trust computation
trust inference
trust mechanisms
Expert Systems and Privacy
biblio
Privacy-Preserving Data Collection in Context-Aware Applications
Submitted by aekwall on Mon, 09/28/2020 - 10:54am
security of data
Scalability
data privacy
privacy concerns
game theory
Resiliency
Human behavior
pubcrawl
privacy
Data collection
Games
Numerical models
ubiquitous computing
game model
smart devices
context-aware applications
Context-aware services
context-awareness
data collection game
privacy leakage risk
privacy-preserving data collection scheme
serious privacy issues
three-antithetic-party game
user data privacy preservation
Computing Theory and Privacy
biblio
A Creditability-based Intrusion Tolerant Method for Protection Equipment in Transformer Substations
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
security of data
Internet of Things
telecommunication security
real-time systems
Resiliency
pubcrawl
composability
smart phones
data analysis
Substations
power engineering computing
sensors
Numerical models
Integrated circuit modeling
open network environment
Abnormal data diagnose
CIT algorithm
creditability-based intrusion-tolerant algorithm
Cyber network attack
interconnected network environment
interconnection of all things(IoT)
Intrusion-tolerant
malfunction protection
mobile terminal devices
protection equipment
Protective relaying
Protective Relays
relay protection
relays protection
security distribution network
sensing data analysis
transformer substations
intrusion tolerance
biblio
A Security-Constrained Islanding Feasibility Optimization Model in the Presence of Renewable Energy Sources
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
actual islanding
composability
CPS modeling
distributed power generation
dynamic simulations
frequency control
Generators
genetic algorithms
HV subtransmission level
integer programming
Islanded Operation
islanded operation feasibility
islanding conditions
load/generation shedding
loads
long-term security
Mathematical model
Metrics
mixed integer nonlinear problem
network operation
nonlinear programming
Numerical models
off-line evaluation
optimal control
optimal control actions
optimization
possible islanding event
power distribution control
power distribution faults
power grids
power system security
power systems
pubcrawl
renewable energy sources
representative HV subtransmission grid
RES available
resilience
Resiliency
security-constrained islanding feasibility optimization model
simulations
Smart Grids
supplied load
Wind farms
biblio
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
Submitted by aekwall on Mon, 06/08/2020 - 10:25am
Attack Strategies
basic topological structures
bus structure
constituent systems
Cost accounting
cyber-physical infrastructures
defense effort
external attacks
game theoretic security
game theory
game-theoretic defense strategy
Games
Human Factors
infrastructure design
infrastructure resilience
Infrastructure security
Integrated optics
Interdependencies
interdependency levels
Nash Equilibrium
Numerical models
optical switches
Predictive Metrics
pubcrawl
resource allocation
Scalability
security
security of data
Servers
simultaneous game
star topology
1
2
3
4
next ›
last »