Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Control Theory
biblio
Decision-Making in Complex Dynamical Systems of Systems With One Opposing Subsystem
Submitted by grigby1 on Fri, 07/24/2020 - 12:02pm
security
pubcrawl
Decision Making
game theory
adversarial decision-making environment
complex dynamical systems of systems
complex systems
cooperative game theory
decision-making process
independent decision-making entities
interacting subsystems
Large-scale systems
noncooperative game theory
noninferior Nash strategies
opposing attacked subsystem
opposing subsystem
unified team making team-based decisions
Control Theory
biblio
Image Encryption Algorithm Based on Hyper-chaotic Lorenz Map and Compressed Sensing Theory
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Cryptography
encryption
security
pubcrawl
compressed sensing
chaos
Image coding
digital images
image motion analysis
Sparse matrices
chaotic sequence
compressed sensing theory
digital image encryption algorithm
encryption sequence
Hadamard matrices
Hadamard matrix
hyper-chaotic Lorenz map
image compression
image encryption
measurement matrix
motion process
motion state
multidimensional chaotic system
random matrix design
Control Theory
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
automated systems
control engineering computing
Control Theory
critical infrastructure facilities
critical infrastructures
Cyber Attacks
Data protection
graph theory
industrial control
Industrial Control Systems
information resources
Information services
integrated circuits
Mathematical model
modeling of protected systems
open systems
production engineering computing
pubcrawl
reference security model
reference security models
security
security of data
Servers
Software
system protection analysis
weighted oriented graphs
biblio
Application of STPA in Temporary Speed Restriction Sending Scenario of Train Control System Based on Vehicle-Vehicle Communication
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
security
pubcrawl
control engineering computing
formal verification
automata theory
CD
control defect
control defects
Hazards
railway engineering
railway safety
SDR
security design requirement
security design requirements
STPA
STPA method
system theoretic process analysis method
temporary speed restriction sending scenario
train control system
UCA
unsafe control actions
UPPAAL
vehicle-vehicle communication
Control Theory
biblio
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
attack defense differential equation
Communication networks
computer network security
Control Theory
defense differential game theory
defensive differential game
differential equations
Differential game
Differential Games
Games
Information systems
Mathematical model
network active security threat process
network attack and defense
network security target
network security threat
offensive differential game
process control
pubcrawl
Safety
security
traditional network active security threat model
biblio
Graph-Based Event Classification in Grid Security Gateways
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Cryptography
security
Protocols
power engineering computing
power system security
telecommunication security
probability
pubcrawl
encryption
transport protocols
Anomaly Detection
graph theory
power grids
Cyber-physical attacks
DERA
distributed power generation
electrical grid distribution network
encrypted communications
Grid Security
grid security gateways
Grid Trust
network anomaly detection
network security
packet header behavioral analysis
power distribution control
power distribution control devices
renewable distributed energy resource aggregators
renewable energy sources
SG system
Substations
TCP-IP packet
TCPIP
time-series data
Trusted Communications
Control Theory
biblio
Synergetic Synthesis of the Hierarchical Control System of the “Flying Platform”
Submitted by grigby1 on Fri, 07/24/2020 - 12:00pm
security
pubcrawl
”flying platform”
aircraft control
aircraft control system
Computer simulation
control laws
control system synthesis
coordinating energy-saving control
disaster zones
disasters
electric motor control
emergency management
energy saving control
fan in the ring
flying platform
functional decomposition
hierarchical control system
hierarchical systems
machine control
nonlinear control systems
position control
rescue operations
squirrel cage motors
synergetic control theory
synergetic synthesis
turbine generator
turbogenerators
vehicle spatial position balancing
vertically take-off aircraft
Control Theory
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
Access Control
production engineering computing
security
security of data
IP networks
Mathematical model
pubcrawl
Games
information security
process control
control engineering computing
game theory
threat model
abstract mathematical model
attack
automated process control systems
continuous Deming-Shewhart cycle
Deming-Shewhart cycle
information security threats
intruder
security threats model formation
Shtakelberg game
Control Theory
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
security
computer network security
risk analysis
control systems
security threats
Security Evaluation
pubcrawl
fuzzy set theory
cyber-physical systems
Safety
industrial control
risk management
Analytical models
fuzzy analytical hierarchy process
fuzzy evaluation
fuzzy hierarchy analysis
industrial control system risk management decision
industrial control system safety risk evaluation
industrial cyber-physical control systems
information of Industrial cyber-physical control systems
information security research
security evaluation model
security risk assessment
Control Theory
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
Control Theory
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
control system synthesis
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
iterative linearization algorithm
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
Predictive Metrics
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
1
2
3
4
5
6
7
8
9
…
next ›
last »