Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attacks
biblio
Novel Anomaly Detection and Classification Schemes for Machine-to-Machine Uplink
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
Monte Carlo methods
low-false alarm rate
low-volume sophisticated attacks
M2M
M2M emergency
machine-to-machine communications
machine-to-machine networks
machine-to-machine uplink
Measurement
Metrics
modified Canberra distance metric
low-complexity
Monte-Carlo simulations
pubcrawl
resilience
Resiliency
Scalability
sensors
standard information technology systems
terminal device failures
volumetric anomaly detection
emergency scenarios
anomaly detection schemes
big data security
classification schemes
Computer crime
computer network security
cyber-attacks
cyber-vulnerabilities
DDoS Attack
Device failures
distributed denial-of-service attacks
Anomaly Detection
Engines
feature extraction
feature-based detection schemes
general M2M uplink
high false-alarm rate
internet
intrusion detection schemes
IT networks
legitimate M2M connections
biblio
A comparison of cyber-security oriented testbeds for IoT-based smart grids
Submitted by aekwall on Mon, 03/18/2019 - 8:55am
pubcrawl
testing
testbeds
smart power grids
Smart Grids
smart grid testbeds
smart grid systems
smart grid security
smart grid practices
smart grid application
Smart Grid
security of data
Scalability
Resiliency
Communications technology
privacy
power engineering computing
Metrics
IoT
Internet of Things
information communication technologies
Hardware
cyber-security oriented testbeds
cyber-attacks
cyber security
conventional power grid system
computer security
biblio
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Submitted by aekwall on Mon, 03/11/2019 - 9:37am
Safety
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TPMs
tpm
system manipulation
Software
security of data
security mechanisms
security
secure elements
Availability
Resiliency
Reliability
Redundancy
pubcrawl
Industry 4.0
Hardware
embedded systems
dependability features
cyber-physical systems
cyber-attacks
cyber physical systems
composability
biblio
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
security of data
Pervasive Computing Security
pubcrawl
resilience
Resiliency
security
security analytics
security events
security information and event management system
persists event data
security operator
security-related event logs
security-related events
SIEM
storage management
Storms
Throughput
tuning options
distribution frameworks
Big Data
Big Data challenge
composability
custom-built distribution solution
cyber-attacks
Distributed databases
distributed processing
distributed SIEM platform
Autonomic Security
event processing
in memory database
in-memory database
in-memory platform
malicious activities
normalization
persistence speed
biblio
Cyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies
Submitted by aekwall on Mon, 02/25/2019 - 10:43am
cyber-attacks
cyber-physical security
Cybersecurity
Internet of Things
IT security
IT security vulnerabilities
Metrics
pubcrawl
Resiliency
Supply Chain Risk Assesment
file
CyberCardia- Compositional, Approximate, and Quantitative Reasoning for Medical CPSs
Submitted by Scott Smolka on Tue, 01/22/2019 - 4:36pm. Contributor:
Scott Smolka
Cardiac Device
MRI
cyber-attacks
reachability analysis
Posters (Sessions 8 & 11)
1446832
CPS-PI Meeting 2018
2018
Poster
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by grigby1 on Mon, 01/21/2019 - 11:30am
Internet of Things
Transportation
security of data
security economics
security
resilient IIoT systems
Resiliency
resilience
Redundancy
pubcrawl
production engineering computing
Metrics
Investment
actuator security
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
Human behavior
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
composability
actuators
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
biblio
Analysis of computer security incidents using fuzzy logic
Submitted by grigby1 on Fri, 10/26/2018 - 4:00pm
information security
the development of cyber-attack signatures
security
Russian ViPNet technology
Russian Federation
Resiliency
recommender systems
pubcrawl
Protocols
processing algorithm
Metrics
Information services
Algorithm design and analysis
Fuzzy logic
digital signatures
detection and prevention of cyber-attacks
design pattern SOPKA
cyberattacks
cyber-attacks
Computers
computer security incidents
computer security incident analysis
computer security
author signatures
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »