The document was issued by academy or academy organization.
File
main.py
A temp file for testing.
Submitted by Binshuai Wang on May 3rd, 2022
Submitted by Ting-Chun Kuo on May 3rd, 2022
A smart grid is a widely distributed engineering system with overhead transmission lines. Physical damage to these power lines, from natural calamities or technical failures, will disrupt the functional integrity of the grid. To ensure the continuation of the grid’s operational flow when those phenomena happen, the grid operator must immediately take steps to nullify the impacts and repair the problems, even if those occur in hardly-reachable remote areas.
Mohammad Rahman Submitted by Mohammad Rahman on May 1st, 2021
Cyber-physical systems (CPSs) and the Internet of Things (IoT) are converging towards a hybrid platform that is becoming ubiquitous in all modern infrastructures. The massive deployment of  CPS requires comprehensive, secure, and reliable communication. The integration of complex and heterogeneous systems makes enormous space for the adversaries to get into the network and inject malicious data. To obfuscate and mislead the attackers, we propose DDAF, a deception defense-based data acquisition framework for a hierarchical communication network of CPSs.
Mohammad Rahman Submitted by Mohammad Rahman on May 1st, 2021

Call for Student Posters on Unmanned Aircraft Systems (UAS) Communications and Networking Research

 

Kamesh Namuduri Submitted by Kamesh Namuduri on January 24th, 2017
Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer.
xavier bellekens Submitted by xavier bellekens on November 17th, 2016
Submitted by Pavankumar Tallapragada on August 12th, 2014
P. Tallapragada, J. Cortés Proceedings of the IEEE Conference on Decision and Control, Los Angeles, California, USA, 2014, to appear paper and matlab programs
Submitted by Pavankumar Tallapragada on August 12th, 2014
C. Nowzari, J. Cortés Proceedings of the American Control Conference, Portland, Oregon, USA, 2014, pp. pp. 2148-2153
Submitted by Pavankumar Tallapragada on August 12th, 2014
This paper describes a systematic approach for analyzing code reuse attacks and defenses. It was presented at RAID'13 Symposium and published in Lecture Notes in Computer Science (LNCS) Volume 8145.
Hamed Okhravi Submitted by Hamed Okhravi on October 30th, 2013
Subscribe to Academia