Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attacks
biblio
Anomaly-based IDS to Detect Attack Using Various Artificial Intelligence Machine Learning Algorithms: A Review
Submitted by grigby1 on Fri, 04/09/2021 - 10:34am
IDS
Signature-based Intrusion Detection Systems & Anomaly-based Intrusion Detection Systems
NSL-KDD
multiple machine learning algorithms
machine learning algorithms
identifying attacks
ID
detect attack
current IDS
computer safety hazards
complex & increasing tasks
artificial intelligence & machine learning algorithms
anomaly-based IDS
accurate intrusion detection
learning (artificial intelligence)
cyber-attacks
resilience
computer networks
Attack detection
network security
composability
intrusion detection system
Artificial Intelligence
computer network security
Resiliency
pubcrawl
cyber security
security of data
biblio
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
collaborative security
sensitive information
information exchange
security-related information
privacy loss
game-theoretic analysis
information theoretic security
collaboration gain
collaborative entities
Loss measurement
collaborative security schemes
information sharing process
multiple security entities
Quantitative information flow
quantitative information flow game perspective
quantitative information flow games
security-privacy tradeoff
security of data
security decisions
Games
collaboration
Intrusion Detection
cyber-attacks
Metrics
privacy
policy-based governance
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 3:36pm
ransomware behavior
malware
microsoft windows
neural nets
Neural networks
newly found research paradigm
pubcrawl
Ransomware
ransomware attacks
low-level file system
ransomware detection
ransomware families
ransomware researchers
ransomware samples
ransomware samples every day
Resiliency
retail to critical infrastructure
global surge
artificial neural network
Compositionality
Cryptography
cyber-attacks
Data collection
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
i-o systems security
I/O Monitoring
industry-based security researchers
Information Reuse and Security
invasive software
IRP logs
Kernel
learning (artificial intelligence)
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 10:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
Submitted by grigby1 on Thu, 03/04/2021 - 1:56pm
proactive defense operations
defense
defense perspectives
increases security awareness
invasive software
knowledge-sharing platform
legacy security defense mechanisms
malware campaigns
open-source permissioned blockchain platform
Peer-to-peer computing
potential attacks
proactive defense
cyber-attacks
pubcrawl
resilience
SDN
SDN networks
secure distributed model
software defined networking
sophisticated threats
tamper-proof record-keeping
Zero day attacks
zero-day
Collaborative DDoS Mitigation
Resiliency
Metrics
Human behavior
blacklisting
blockchain
blockchain application
blockchain technology
collaboration
collaborative cyber attack defense
collaborative DDoS attack mitigation
threat mitigation
Collaborative Defense
composability
Computer crime
computer network management
computer network security
contracts
Cryptography
cyber threat intelligence
cyber threat intelligence plays
cyber threat intelligence sharing
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:46pm
composability
scalable neural-network-based hybrid IDS framework
network-level intrusion detection
IDS field
host-level intrusion detection
host-level IDS
cyber-attackers
ADFA dataset
NSL-KDD dataset
software quality
Scalability
network intrusion detection
neural network
software reliability
cyber-attacks
learning (artificial intelligence)
Computer crime
intrusion detection system
cyber security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
convolutional neural nets
Data mining
security
machine learning
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 12:39pm
learning (artificial intelligence)
Virus Spreading
supervisory control and data acquisition systems
SCADA systems
Resiliency
resilience
pubcrawl
Nash Equilibrium
multiagent reinforcement learning
multi-agent systems
Multi-Agent Reinforcement Learning
malware author
Social Agents
invasive software
ICs
hybrid game theory
game theory
Damage Assessment
cyber-physical systems security
cyber-physical systems
cyber-attacks
CPS Security
CPS network
CPS
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »