Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Relays
biblio
Ultimate Secrecy in Cooperative and Multi-hop Wireless Communications
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
Receivers
telecommunication security
security
Resiliency
pubcrawl
channel capacity
Bandwidth
Relays
cooperative communication
Compositionality
wireless channels
communication security
radio transmitters
communication channel
attenuation
communication secrecy
frequency reuse
Information Reuse and Security
millimetre wave communication
chip-to-chip communications
cooperative wireless communications
frequency 550.0 GHz to 565.0 GHz
in-device communication systems
indoor communication systems
multihop channel measurements
point-to-point channel
short-range wireless communication systems
ultimate secrecy ranges
biblio
Automatic Protection Implementation Considering Protection Assessment Method of DER Penetration for Smart Distribution Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:27pm
adaptive systems
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
distributed power generation
power engineering computing
power system security
Smart Grid
smart power grids
Reliability
Load flow
visualization
power supply quality
system reliability
Relays
power generation protection
expert systems
expert system
power generation reliability
hydroelectric power stations
smart grid systems
solar power stations
GUI
graphical user interfaces
Adaptive protection
adaptive rule-based method
automatic protection implementation
bidirectional power flow
DER application
DER penetration
distribution energy resources
Gorontalo sub-system network
graphical user interface
Indonesia
microhydro plant
photovoltaic power systems
plant location
power distribution protection
power distribution reliability
power quality
power system reliability
protection security assessment method
PSA
relay settings
smart distribution network
smart electrical system
solar photovoltaics
biblio
Hands-on Undergraduate Labs on Anonymity Cryptographic Algorithms
Submitted by grigby1 on Thu, 01/28/2021 - 2:02pm
anonymity
composability
Cryptography
education
Human behavior
Libraries
Metrics
onion routing
problem-based learning
project-based learning
Protocols
pubcrawl
Relays
resilience
Resiliency
security
Software algorithms
Tor
undergraduate security course
Wireshark dissector
biblio
Physical Layer Security in Vehicular Networks with Reconfigurable Intelligent Surfaces
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
ad hoc network
adjustable phase shift
Analytical models
average secrecy capacity
Buildings
Compositionality
dedicated energy source
Double-Rayleigh fading channels
fading channels
important paradigm
incident signal
Metrics
Monte Carlo methods
passive elements
physical layer security
pubcrawl
reconfigurable intelligent surface
reconfigurable intelligent surfaces
Relays
resilience
Resiliency
RIS cells
RIS technologies
RIS-based access point
RIS-based relay
RIS-based transmission
RIS-relay
secrecy capacity
security
Signal to noise ratio
smart radio environments
source power
telecommunication network reliability
telecommunication security
vehicle-to-vehicle communication
vehicular ad hoc networks
vehicular adhoc network
vehicular communications
vehicular network system models
wireless channels
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
IoT
computer network security
Servers
encryption
Internet of Things
Cryptographic Protocols
Protocols
Trusted Computing
pubcrawl
composability
blockchain
data analysis
secure protocol
trustworthiness
Relays
Data Transmission
smart cities
Artificial Intelligence
digital signatures
IoT device
TEE
artificial intelligence technology
Trusted Execution Environment
data trustworthiness
AI technology
authenticated encryption method
blockchain ledger
data analysis methods
physically unclonable function
trusted hardware
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
computer network security
network security
Resiliency
pubcrawl
composability
detection
Sybil attack
graph theory
resource management
Metrics
sybil attacks
Web sites
Relays
integer programming
Communication Systems
Approximation algorithms
Bridges
detection method
Linear programming
Bipartite graph
anonymous communication system
computer program
Distribution strategy
enumeration attacks
Integer Linear Program
minimum malicious user
resource distribution
resource distribution process
suspicious malicious users
tor anonymous communication system
tor resource distribution
biblio
Partially Predictable Vehicular Ad-hoc Network: Trustworthiness and Security
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
road safety
Big Data
telecommunication security
security
Cryptographic Protocols
pubcrawl
composability
Routing protocols
Routing
vehicular ad hoc networks
packet delivery ratio
trustworthiness
VANET
Relays
cloud
road traffic
average end to end delay
hybrid protocol
intelligent communications
Key-encrypted onion
normalized routing overhead
NS2 software
Partially Predictable Network (PPN)
partially predictable vehicular ad-hoc network
road traffic efficiency
road traffic safety
secure trustworthiness evaluation based routing protocol
Trustworthiness Evaluation
biblio
Congestion aware traffic grooming in elastic optical and WiMAX network
Submitted by grigby1 on Wed, 12/02/2020 - 1:52pm
Bandwidth
Base stations
BVT (Bandwith Variable Transponder)
congestion aware traffic
coupled congestion control
Coupled Congestion Control 2019
Elastic Optical Network
internet
internet accessibility
Light trail WiMAX (World Interoperability for Microwave Access Network)
network congestion
network resource consumption
network resource utilization
network topologies
OLT (Optical Line Terminal)
ONU (Optical Network Unit)
Passive Optical Network
Passive optical networks
pubcrawl
Relays
resilience
Resiliency
resource allocation
Routing
Scalability
telecommunication congestion control
telecommunication network routing
telecommunication network topology
telecommunication traffic
Traffic grooming
WDM-PON (Wavelength Division Multiplexed Passive Optical Network)
WiMax
WiMAX network
wireless networks
Wireless-Optical/Optical-Wireless Network
Worldwide Interoperability Microwave Access Network
biblio
Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in CPS Security Testbed
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
security of data
security
CPS
cyber-physical systems
Metrics
resilience
Resiliency
IEEE standards
Computational modeling
power engineering computing
composability
real-time systems
power grids
IEC standards
SCADA
Scalability
Relays
WAMS
Software systems
Concurrent computing
Phasor measurement units
cyber physical systems
100% realtime performance
Concurrency
coordinated cyber attacks
cyber-event-triggered power grid blackout
cyber-event-triggered power system blackout
cyber-physical system testbeds
grid data streams
hardware-in-the-loop
hardware-in-the-loop CPS security testbeds
HIL CPS security testbed
HIL multigrid system
HIL realtime digital simulator environment
IEEE-118 bus grid model
IEEE-39 bus grid models
industry-grade hardware
interdependent events
large-scale grid models
modular integration designs
Multi-Grid
multigrid isolated models
multitude designs
phasor measurement
physics-constrained recovery
Power and Cyber System Testbed
real-time execution environment
restoration process
synthetic grid model
Ukrainian grid
biblio
Development of a Cyber-Resilient Line Current Differential Relay
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
security of data
Cyber-security
pubcrawl
resilience
Resiliency
Circuit faults
power engineering computing
power system security
composability
computer security
cyber-physical systems
Metrics
power transmission lines
power transmission protection
Voltage measurement
false data injection attacks
Global Positioning System
Relays
Current measurement
relay protection
coordinated attacks
cyber-resilient line current differential relay
cyber-security concerns
digital communication channels
false line tripping
FDIA
LCDR
LCDR's trip command
line current differential relays (LCDRs)
line terminals
measured superimposed voltages
positive-sequence
power system relaying
power transmission faults
protected line
protection systems
remote current measurement
superimposed voltage
Transmission line measurements
transmission line protection
two-terminal lines
command injection attacks
1
2
3
4
5
6
7
next ›
last »