Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attacks
biblio
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
intrusion detection system
system monitoring
System Identification
security of data
Scalability
Resiliency
resilience
pubcrawl
process-related attacks
process-based attacks
process-based anomaly detection
PN identification-based anomaly detection methods
Petri nets
Petri Net model identification
anomalous behaviour
industrial process
Industrial Control Systems
industrial control system
industrial control
improved industrial control system device logs processing method
ICS device
ICs
formalised method
expected behaviour
event-driven system analysis
event logs
cyber-attacks
Anomaly Detection
biblio
Data-driven Physics-based Solution for False Data Injection Diagnosis in Smart Grids
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
intelligent FDI attack
False Data Detection
power system state estimation
bad data detection strategy
chi-squared test
data-driven machine intelligence
data-driven physics-based solution
false data injection diagnosis
gross error analysis
cyber physical systems
machine intelligence
physics based state estimation process
physics-based method
Reed-Xaoli
SG technology
statistical tests
undetected bad data
smart power grids
Anomaly Detection
Artificial Intelligence
pubcrawl
Human behavior
resilience
Resiliency
power engineering computing
power system security
security of data
composability
power system faults
Power Grid
cyber-attacks
Smart Grids
statistical testing
False Data Injection
biblio
An Accurate False Data Detection in Smart Grid Based on Residual Recurrent Neural Network and Adaptive threshold
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
false data injection attack
cyber physical systems
Transmission line measurements
False Data Detection
power system state estimation
accurate false data detection
Adaptive detection threshold
adaptive judgment threshold
adaptive threshold
Recurrent neural networks
FDIA detection method
linear prediction model
malicious attack
R2N2 model
Residual recurrent neural network
residual recurrent neural network prediction model
Weibull distribution
state estimation
security of data
Predictive models
pubcrawl
Human behavior
resilience
Resiliency
Mathematical model
Data models
Adaptation models
recurrent neural nets
power engineering computing
power system security
Smart Grid
smart power grids
composability
cyber-attacks
biblio
Design and Evaluation of Jamming Resilient Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:12pm
telecommunication network reliability
Protocols
pubcrawl
random jamming
random strategy
resilience
Resiliency
resource-aware event-triggered control schemes
retrofit ageing
security
sensors
system design challenge
protocol aware strategy
telecommunication security
test-bed results
time-triggered control schemes
water network test-bed
water networks
wireless actuators
Wireless communication
wireless sensor networks
Wireless Sensor/Actuator Networks
wireless sensors
entire CPS failure
aware jamming
classic time-triggered control scheme
constant jamming
constant strategy
control systems
CPS resilience
cyber physical systems
cyber-attacks
cyber-physical systems
design approach
access protocols
event-triggered control
event-triggered control scheme
Jamming
jamming attacks
jamming resilient cyber-physical systems
jamming strategies
large scale infrastructures
next generation cyber-physical systems
physical process
physical processes
biblio
Cybersecure Distributed Voltage Control of AC Microgrids
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
secondary voltage control
power system security
Protocols
pubcrawl
Reactive power
reactive power control
resilience
resilience threshold
Resiliency
resilient control approach
resilient flocking
multi-robot systems
security of data
Synchronization
synchronization behavior
utilized control protocols
virtual time-varying communication graph
Voltage control
voltage restoration
weighted mean subsequence reduced algorithm
WMSR algorithm
distributed energy resources
communication links
Computing Theory
control engineering computing
cyber-attacks
cybersecure distributed voltage control
Cybersecurity
cyberthreats
Decentralized Control
DERs
distributed control
AC microgrids
distributed power generation
distributed secondary voltage control
frequency control
graph theory
malicious adversaries
microgrid test system
Microgrids
mobile robot team
mobile robots
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 11:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
innovative cognitive cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
Human Behavior and Cybersecurity
human cognitive behaviour
Human Factors
human life
infrastructures
emerging cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
computer security
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
vulnerability assessment
command injection attacks
supervisory control and data acquisition (SCADA)
structuredquery language injection attacks
intrusion detection solutions
Industrial Internet of Things (IIoT)
Industrial Internet of Things
IIoT systems
cyber-vulnerability assessment
cyber attack
electromagnetic interference
Big Data Analytics
IDS
SQL
machine learning (ML)
cyber-attacks
Internet of Things
Metrics
Structured Query Language
Protocols
network security
composability
production engineering computing
Intrusion Detection
intrusion detection system
Resiliency
resilience
pubcrawl
data analysis
machine learning
security of data
learning (artificial intelligence)
biblio
Cyber Security Strategy for Nuclear Power Plant through Vital Digital Assets
Submitted by aekwall on Mon, 09/14/2020 - 12:33pm
cyber attack
Vital digital asset
total digital assets
Security Control
nuclear power stations
nuclear power plants
nuclear power plant Instrumentation
nuclear power plant
nuclear engineering computing
Inductors
emergency preparedness functions
digital systems
cyber security strategy
critical digital assets
Safety
computational intelligence
power generation reliability
Compositionality
power generation
computer security
cyber-attacks
standards
Accidents
composability
pubcrawl
Cryptography
security of data
biblio
Multi-Attacking Strategy on Smart Grid with Incomplete Network Information
Submitted by grigby1 on Fri, 08/28/2020 - 12:03pm
Power measurement
Voltage measurement
telecommunication networks
state estimation
smart power grids
Smart Grid
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system operator
power system
attack vector
power engineering computing
Phasor measurement units
network information technology
multiattacking strategy
Multi-Attack
Load flow
injected false data attack
IEEE 14 bus system
Human behavior
cyber-attacks
Communication networks
Attack vectors
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »