Engineering
Oak Ridge
100%
Control System
86%
Microgrid
62%
Magnetic Bearing
62%
Rotors
53%
Small Modular Reactor
53%
Distributed Energy Resource
48%
Photovoltaic Power
46%
Reference Model
41%
Electric Lines
41%
Control System Design
41%
Material Compatibility
41%
Nuclear Reactor
36%
Predictive Control Model
31%
Nuclear Power Plant
31%
Waveguide
27%
Operational Cost
27%
Nuclear Power Generation
27%
Frequency Response
26%
Power Output
25%
High Resolution
25%
Systems Dynamics
25%
Electron Cyclotron Heating System
24%
Radiation Power
24%
Reactor Design
24%
Electric Power Distribution
24%
Power Grid
23%
Control Design
21%
Battery Energy Storage
20%
Solar Power Generation
20%
Measurement Campaign
20%
Optic System
20%
Experimental Result
20%
Nuclear Fuel Reprocessing
20%
Fuel Rod
20%
Spent Fuels
20%
Emission Source
20%
Reactor Technology
20%
Nuclear Material
20%
Sensor Signal
20%
Fault Management
20%
Air Conditioning
20%
Passive Safety Feature
20%
Adaptive Control
20%
Fluorescence Emission
20%
Multilayer Coating
20%
Illustrates
20%
Cyber Attack
20%
Thermal Comfort
20%
Air Conditioning System
20%
Computer Science
Cyber Attack
62%
Attackers
55%
Cyber Physical Systems
51%
Information Security
41%
Security Technique
34%
Energy Generation
31%
Anomaly Detection
20%
Grid Computing
20%
Adaptive Control Systems
20%
Stuxnet
20%
System Identification
20%
Theoretic Approach
20%
Physical Attack
20%
Operational Cost
20%
Embedded System
20%
Actuator
20%
Digital Twin
20%
Physical System
19%
Industrial Control System
17%
Enterprise Level
17%
Numerical Example
17%
Feedback Control
17%
Heterogeneous Data
10%
Research Direction
10%
Sample Application
10%
False Information
10%
Identification Process
10%
Internal State
10%
Denial-of-Service Attack
10%
Hardware Failure
10%
Controlled System
10%
Software Failure
10%
Sensors and Actuator
10%
Generation Network
10%
Digital Twin Technology
8%
Data Integrity
6%
Considerable Amount
6%
Unauthorized Access
6%
Mitigation Strategy
6%
Critical Infrastructure
6%
Potential Attack
6%
Security Protection
6%
Performance Optimization
6%
Financial Gain
6%
Remote Monitoring
6%
Malicious Actor
6%
Data Source
5%
Component Failure
5%
Network Control
5%
Individual Component
5%