Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
sensor data
biblio
A Moving Target Approach for Securing Secondary Frequency Control in Microgrids
Submitted by aekwall on Mon, 02/08/2021 - 12:40pm
computer network security
Scalability
Conferences
Resiliency
pubcrawl
Metrics
Decision Making
power engineering computing
power system security
control systems
Load modeling
sensor data
distributed power generation
Microgrids
power generation scheduling
Human Factors
Markov processes
communication links
Compositionality
denial of service
cyber attack
DoS attacks
power generation control
denial of service attack
Cyber Dependencies
frequency control
Inverters
invertors
cyber attack threats
inverter-based DG
Markov process
microgrid control systems
microgrid secondary frequency control
Moving Target
moving target approach
reactive defense approaches
secondary control
small-signal model
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
road safety
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
improved security
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
different ECUs
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
biblio
A Crawling Approach to Facilitate Open IoT Data Archiving and Reuse
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
Cloud Computing
Internet of Things
Data models
Resiliency
pubcrawl
Computational modeling
Databases
web services
Crawlers
sensor data
visualization
smart cities
Compositionality
automated Web crawling service
data management services
data retrieval
information retrieval systems
IoT trace archiving service
IoT-cloud systems
open IoT data archiving
simulation environments
simulation experiments
SUMMON
Information Reuse and Security
biblio
Nearest Neighbor Subsequence Search in Time Series Data
Submitted by grigby1 on Fri, 05/22/2020 - 1:28pm
Data mining
time series
pubcrawl
Indexes
Metrics
Measurement
nearest neighbour methods
search problems
Meteorology
graph theory
Time series analysis
query processing
nearest neighbor search
Agriculture
augmented relationship graph model
Bridges
horizontal pruning
query processing strategy
range interval diversity properties
sensor data
similarity search support
similarity vectors
Subsequence Mining
subsequence similarity match problem
Temperature sensors
temporal sequence data
Time Series Data
time series datasets
time series nearest neighbor subsequence search
TINN graph
TINN model
TINN nodes
biblio
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series
Submitted by aekwall on Mon, 01/13/2020 - 11:18am
Kernel
Resiliency
Human behavior
pubcrawl
composability
Metrics
Training
convolutional neural networks
network attacks
process control
sensor data
control engineering computing
information security
time series
actuator data
control system security
data prediction
distributed control
distributed control systems
information security breaches detection
multidimensional time series
multidimensional time series values prediction
Time series analysis
actuator security
biblio
IoT Enabled Robots with QR Code Based Localization
Submitted by aekwall on Mon, 09/23/2019 - 9:47am
Artificial Intelligence
control engineering computing
Cryptography
cyber physical systems
Dijkstras algorithm
encrypted communication channel
Floor Mapping
Floors
heading measurements
indoor localization
indoor navigation
Internet of Things
IoT devices
IoT enabled robots
mobile robots
Path optimization
Path Planning
Protocols
pubcrawl
QR code
QR code detection
QR code landmark recognition
QR codes
Resiliency
Robot sensing systems
sensor data
Servers
Service robots
shortest path computation
smart devices
SSHv2 protocol
wireless LAN
wireless local area network
biblio
Blockchain IoT (BIoT): A New Direction for Solving Internet of Things Security and Trust Issues
Submitted by aekwall on Mon, 04/01/2019 - 9:04am
authentication
blockchain
blockchain infrastructure
Blockchain IoT
blockchain operation
blockchain platforms
blockchain security
blockchain transactions
computer network security
controller entities
cryptographic signatures
Cryptography
data authentication
Internet of Things
Internet of Things security
pubcrawl
Random access memory
secure microcontrollers
security
sensor data
sensors data
Software
transaction forgery
Trusted Computing
trusted computing resources
biblio
Leveraging Secure Multiparty Computation in the Internet of Things
Submitted by aekwall on Mon, 03/25/2019 - 8:56am
Internet of Things
Resiliency
Human behavior
pubcrawl
composability
Metrics
secure multiparty computation
sensor data
Smart Environments
sensor security
biblio
Using model-based simulation for augmenting Incident Command System for disaster response
Submitted by el_wehby on Tue, 05/15/2018 - 10:56pm
Adaptation models
communications management
Computational modeling
Crisis Management
decision makers
Decision support systems
disaster response management
emergency management
emergency services
Hazardous materials
incident command system
information integration agent
Integrated circuit modeling
model-based simulation
national incident management system
organizational model
Planning
recovery operations
resource management
sensor data
1528550
biblio
Semantic Information Fusion to Enhance Situational Awareness in Surveillance Scenarios
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
video surveillance
Unmanned Aircraft Systems
UAS
surveillance scenarios
surveillance
situational picture
situational awareness
sensor fusion
sensor data
semantic information fusion
security forces
Resiliency
reasoning component
pubcrawl
probabilistic reasoning
Probabilistic logic
probabilistic information processing
OOWM
Ontology
ontologies (artificial intelligence)
object-oriented world model
object-oriented methods
Object oriented modeling
Network reconnaissance
National security
military computing
military applications
Markov processes
Markov logic network
logical reasoning
knowledge model
ISR-AA
intelligence-surveillance-and-reconnaissance analytics architecture
information integration
inference mechanisms
high-level data fusion component
enhanced situational awareness
Databases
Data mining
Data integration
critical events detection
cognition
civil protection
autonomous aerial vehicles
aerospace computing
1
2
next ›
last »