Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Manganese
biblio
On Security Capability of Cooperative Communications in Energy Scavenging Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
security
pubcrawl
resilience
Resiliency
telecommunication security
Analytical models
telecommunication power management
telecommunication network reliability
cooperative communication
Relays
Interference
energy harvesting
cognitive radio
secrecy outage probability
relay networks (telecommunication)
secrecy outage
SOP
cooperative communications
energy scavenging
energy scavenging cognitive radio networks
energy scavenging time
ESCRNs
Manganese
message recovering time
noncognitive networks
power division
precise closed-form formula
Cognitive Radio Security
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 12:47pm
security of data
security
pubcrawl
resilience
Resiliency
Cryptography
storage management
maintenance engineering
Redundancy
Metrics
Bandwidth
Compositionality
Upper bound
information theory
coding theory
linear codes
Manganese
codes
Distributed storage system
information-theoretic secrecy
per-node storage
repair bandwidth
secure determinant codes
secure exact-repair regenerating codes
biblio
An Empirical Study of Web Software Trustworthiness Measurement
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
automation
composability
confidence identification
empirical analysis
Entropy
evidence synthesis
evidence theory
factor analysis
fuzzy judgment matrix
fuzzy set theory
IEC standards
internet
ISO standards
ISO/IEC 9126
Manganese
matrix algebra
online accounting software
pubcrawl
security of data
Trusted Computing
trustworthiness
web software
Web software trustworthiness measurement
biblio
On service security analysis for event log of IoT system based on data Petri net
Submitted by grigby1 on Thu, 06/07/2018 - 2:03pm
Artificial Neural Networks
collaboration
cyber physical systems
cyber-physical systems
Data models
data tracking
Internet of Things
IoT service security analysis
IoT system event log
malicious operation detection
Manganese
Metrics
neural networks security
Petri net data
Petri nets
Policy
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
security
security of data
biblio
False Data Injection Attacks Targeting DC Model-Based State Estimation
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
adversary
Adversary Models
attacking vector
cyber-attacks
DC model
economic operation
false data injection attack
grid operator
Human behavior
Manganese
Meters
Metrics
network topology
power engineering computing
power system security
power system state estimation
pre-specified meter target
pubcrawl
Q measurement
resilience
Resiliency
Scalability
secure operation
security of data
Smart Grid
smart power grids
specific targets
state estimation
state variable target
Topology
Transmission line measurements
biblio
Smart grid data privacy protection algorithm
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
Communication Systems
Human behavior
Human Factors
Indexes
L-diversity algorithm
Manganese
privacy preserving
pubcrawl
resilience
Resiliency
Scalability
service computing
signal processing
smart gird
Smart Grid Privacy
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
attack complexity
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
end-to-end IP-Hopping technique
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
port mutation
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
smart grid communications
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
biblio
Resource allocation based on clustering algorithm for hybrid device-to-device networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Algorithm design and analysis
clustering algorithm
Clustering algorithms
D2D communication
Device-to-device communication
Information Reuse
Interference
Manganese
pubcrawl
Resiliency
resource allocation
resource management
security
Signal to noise ratio
biblio
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
Algorithm design and analysis
composability
Electronic mail
Elliptic curve cryptography
Elliptic curve cryptography (ECC)
fault detection
fault injection attack
Manganese
Metrics
PA-FA countermeasure
power analysis
pragmatic hazard
pubcrawl
public key cryptography
residue number system
residue number systems
Resiliency
Resistance
RNS
scalar multiplication
Security analysis
side channel attack
biblio
Towards efficient group management and communication for large-scale mobile applications
Submitted by BrandonB on Wed, 05/06/2015 - 1:14pm
collaboration
context-defined group management
context-defined groups
context-specific group communication
DDS
distributed middleware
Emergency Response
fleet tracking and management system
geopositioning
Group communication
group management
large-scale mobile applications
Logic gates
Logistics
Manganese
middleware
mobile computing
mobile networks
mobile nodes
mobile systems
mobile workforce management
node mutual awareness
public security
Real-time monitoring
real-time tracking
reliable communication
Subscriptions
surveillance
vehicles
1
2
next ›
last »