Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SCADA
biblio
Cyber – Transparencies, Assurance and Deterrence
Submitted by aekwall on Wed, 12/18/2019 - 2:36pm
safe-to-fail ecology
cyber-deterrence
cyber-ecology
cyber-scape
cyber-sûréte
deterrence-escalator
Ecology
fail-safe supervisory control and data acquisition system
influence
CSI
social trusts
socio-info-techno
state-based threat analysis
technological controls
threat equation
transparencies
trusts
warning time
Deterrence
Scalability
Trusted Computing
SCADA
Human behavior
pubcrawl
ontologies (artificial intelligence)
Ontology
resilience
security of data
collaboration by social influence
collaborative influence
conceptual-design paper
control
coordination by rule and control
CRC
cross disciplinary research strands
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Supporting Cyber-Physical Security of Electric Power System by the State Estimation Technique
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
SCADA Systems Security
power system security
power system state estimation
pubcrawl
Reliability
Resiliency
SCADA
SCADA measurement
SCADA systems
power system reliability
security of data
state estimation
state estimation technique
state estimation tool
two-level SE
WAMS
WAMS measurement
composability
power system measurement
power engineering computing
Phasor measurement units
malicious attacks detection
Human behavior
Global Positioning System
EPS
energy system
Electric Power System
data corruption
cyberattacks identification
cyber-physical systems
cyber-physical security
cyber security
computer security
biblio
Developing a Secure Cyber Ecosystem for SCADA Architecture
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
Monitoring
Terrorism
states security system
security of data
secure Cyber ecosystem
SCADA Systems Security
SCADA systems
SCADA network systems
SCADA architecture
SCADA
RTU
robust cyber security
pubcrawl
PLC
network attack
Resilient Security Architectures
Industries
Human behavior
Global village
cyber terrorism
cyber resilience
Cyber invasions
Cyber Attacks
critical infrastructure
critical information
Conferences
computer security
composability
CII
Resiliency
biblio
Denial of Engineering Operations Attacks in Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
Resiliency
Human behavior
pubcrawl
composability
disassembler
Forensics
industrial control system
ladder logic
PLC
protocol reverse engineering
SCADA
SCADA Systems Security
biblio
Privacy and Integrity Protection of Data in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
SCADA
Resiliency
Human behavior
pubcrawl
composability
cyber security
traffic obfuscation
Virtual private networks
SCADA Systems Security
biblio
SCADA Networks Anomaly-based Intrusion Detection System
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
SCADA
Resiliency
Human behavior
pubcrawl
composability
anomaly-based intrusion detection system
SCADA Systems Security
biblio
Deployment of IoT-based Honeynet Model
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
security
IoT
SCADA
Resiliency
Human behavior
pubcrawl
composability
Honypots
ICs
SCADA Systems Security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »