Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attacks
biblio
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
PCI DSS
commercial security scanning
confidential customer payment information
expense management
labor reporting
mitigation techniques
on-premise POS
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS)
cloud-bases POS
penetration attacks
Point of Sale (POS)
point-on-sale vulnerability
POS system
price adjustment
Sale systems
Autonomic Security
testing
Servers
security
Resiliency
pubcrawl
composability
standards
Cybersecurity
Business
security of data
cyber-attacks
Industries
security measures
wireless networks
financial data processing
Human Errors
cash flow
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat
Submitted by grigby1 on Fri, 08/07/2020 - 3:57pm
advanced attacking skills
APT attack
threat intelligence sharing community
threat intelligence
Sharing Community
persistent attacking skills
low-quality shared intelligence
intelligence information
information processing
data sharing
cyber attack
analyzing malicious behavior
business data processing
cyber-attacks
APT
advanced persistent threat
Metrics
Computer crime
Scalability
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems
Submitted by grigby1 on Fri, 08/07/2020 - 3:39pm
power plants
Logic gates
long time-sequence data
LSTM-based deep learning approach
Metrics
power engineering computing
power generation
power generation control
power plant control system
learning-based time delay attack characterization
pubcrawl
recurrent neural nets
resilience
Resiliency
security of data
Smart Grids
system control commands
Air gaps
learning (artificial intelligence)
Human Factors
Human behavior
delays
delay systems
Delay effects
deep learning model
Data models
cyber-physical systems
cyber-attacks
control systems
control engineering computing
composability
built-in attack characterization scheme
bidirectional long short-term memory units
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
biblio
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
game-theoretic approach
Stackelberg game model
simulations
Resiliency
resilience
pubcrawl
Metrics
measurement signals
Markov processes
Markov game model
Jamming
invasive software
HVAC system
HVAC
host machine infection
Games
Atmospheric modeling
game theory
game theoretical techniques
cyberattack
cyber-physical systems
cyber-attacks
Cyber Attacks
Current measurement
CPS modeling
CPS
control-loop constraints
control systems
control loop
composability
check blocks
BLOC
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
network threats
user privacy in the cloud
privacy-preserving Sharing
privacy-preserving means
privacy preserving
privacy exposure
cyber threat management
Cyber Threat Information
CTI data
Confidential Information Sharing and Analysis for Cyber Protection
Collaborative sharing
collaborative analysis
C3ISP Framework
attack prediction
API Gateway
data sharing
security of data
information management
data sources
Portals
internetworking
application program interfaces
Scalability
Logic gates
collaboration
cyber-attacks
Metrics
pubcrawl
Resiliency
security
data privacy
Cloud Computing
biblio
N-1 RTU Cyber-Physical Security Assessment Using State Estimation
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
state estimation
Damage Assessment
synthetic 200-bus system
power system devices
observability analysis
N-1 RTU cyber-physical security assessment
IEEE 14-bus system
EMS applications
electrical substations
Cyber-physical security assessment
cyber-physical impact
Remote Terminal Units
control center
state estimator
Denial-of-Service
security of data
substation automation
supervisory control and data acquisition system
private networks
SCADA system
power system control
power system state estimation
energy management systems
power system security
cyber-attacks
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
cyber-attack
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »