Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cyber Physical System
biblio
The Study and Application of Security Control Plan Incorporating Frequency Stability (SCPIFS) in CPS-Featured Interconnected Asynchronous Grids
Submitted by grigby1 on Fri, 12/11/2020 - 1:42pm
ADMM
bulk power imbalance shock
CPS
Cyber Physical System
cyber-physical systems
frequency control
frequency stability
frequency stability constrains
frequency stability domain
Generators
HVDC power transmission
HVDC tie-line
HVDC tie-line transferred power
HVDC transmission
interconnected asynchronous grids
interconneted grids
load shedding
McCormick envelope method
Metrics
optimisation
power engineering computing
power grids
power system interconnection
power system security
power system stability
power transmission planning
pubcrawl
real-time systems
resilience
Resiliency
Scalability
SCPIFS
security
Security Control
security control plan
security control strategy
Stability analysis
Time Frequency Analysis
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
IoT
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
Security analysis
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
control algorithm parameters
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
firmware binaries
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
biblio
Mission Resilience for Future Army Tactical Networks
Submitted by grigby1 on Tue, 10/06/2020 - 1:10pm
autonomous vehicles
battlefield operations
command and control systems
CPS resilience
cyber assets
Cyber Physical System
cyber physical systems
cyber resilience metrics
cyber-physical systems
future army tactical networks
Measurement
military communication
military operations
mission
Mission Assurance
Mission critical systems
mission essential functions
mission resilience metrics
network architecture
psychometric
pubcrawl
resilience
Resiliency
sensors
Streaming media
tactical forces
tactical network
tactical network architectures
Task Analysis
traditional engineering methods
Weapons
biblio
Security Aspects of Cyber Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
security of data
security
information security
cyber-physical systems
Human behavior
pubcrawl
privacy
cyber physical systems
Smart Grids
control systems
security threats
Intelligent sensors
Human Factors
CPS
security aspects
Sensor Systems
Cyber Physical System
communication models
control security
control system models
CPS Security Aspects
design models
Home appliances
Manufacturing industries
CPS Privacy
biblio
Stabilization of Cyber Physical System exposed to a random replay attack modeled by Markov chains
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
computer network security
Scalability
cyber-physical systems
Resiliency
pubcrawl
delays
Stability analysis
Markov processes
Linear systems
stability
Trajectory
CPS
closed-loop system
closed loop systems
linear matrix inequalities
Cyber Physical System
Numerical stability
communication delays
jumping parameters
linear matrix inequality formulation
Markov chains
Markovian jump linear system
packet losses
random replay attack
stabilization problem
stochastic stabilization
stochastic systems
Chained Attacks
biblio
Wireless Self-Organizing Wi-Fi and Bluetooth based Network For Internet Of Things
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
Internet of Things
Switches
Power demand
pubcrawl
composability
Resiliency
resilience
Human behavior
wireless channels
wireless networks
Routing
Wireless fidelity
cyber physical systems
power consumption
Bluetooth
Cyber Physical System
energy conservation
energy-saving modes
modems
open standards
self-organizing networks
telecommunication power management
transmission channels
Wi-Fi
Wi-Fi network
wireless LAN
wireless self-organizing Wi-Fi
bluetooth security
biblio
Iot Based Bluetooth Smart Radar Door System Via Mobile Apps
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
Internet of Things
Protocols
mobile devices
pubcrawl
composability
Resiliency
resilience
Human behavior
home automation
cyber physical systems
microcontrollers
object detection
security system
smart phones
Bluetooth
Cyber Physical System
Android (operating system)
Android devices
Android mobile phone
authentication method
Bluetooth protocol
bluetooth smart radar door system
industrial revolution 4.0
intelligent device
intertnet of things
microcontroller
Mobile Apps
mobile Bluetooth module
processing software
Radar
remote voice control
Smart Door Lock
smart door lock system
wireless connection protocol
bluetooth security
biblio
A Trusted Bluetooth Performance Evaluation Model for Brain Computer Interfaces
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
security
data privacy
privacy
mobile computing
pubcrawl
composability
Resiliency
resilience
Human behavior
cyber physical systems
feedback
Bluetooth
ambulatory care
BCI hardware performance
BCI Safety
Bluetooth operating parameters
brain computer interface
brain computer interfaces
brain function classification accuracy
brain state
brain-computer interfaces
Cyber Physical System
electroencephalography
fitness tracking
medical signal processing
mobile BCI technology
Mobile Cyber Security
mobile EEG-based BCI applications
mobile neurofeedback applications
neurophysiology
Performance Rating
system-on-chip
telemedicine
TMBCI
Trusted Mobile BCI Performance
Wearable
bluetooth security
biblio
Machine Learning Bluetooth Profile Operation Verification via Monitoring the Transmission Pattern
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
security
telecommunication security
pubcrawl
composability
Resiliency
resilience
Human behavior
machine learning
feature extraction
classifier
learning (artificial intelligence)
cyber physical systems
formal verification
Decision Tree
system-on-chip
telecommunication computing
Bluetooth
Blue-tooth
Bluetooth profile operation verification
Bluetooth SoC
Bluetooth System-on-Chip
communication complexity
custom low-frequency integrated circuit
electronic engineering computing
Hardware Security
hardware-software security
integrated circuit manufacture
k-nearest neighbor
license communication IC
low computational complexity
low-cost legacy technology
mobile radio
profile classification algorithm
radio frequency output power
RF envelope detector
RF output power
RF Power
signal classification
smart descriptive time-domain feature extraction
Supervisory Circuit
support vector machine
transmission pattern
Cyber Physical System
bluetooth security
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
Internet of Things
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
resilience
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
BLE devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
IoT devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
1
2
3
4
5
6
7
8
next ›
last »