Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
actuators
biblio
Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest
Submitted by grigby1 on Tue, 03/30/2021 - 11:53am
Industrial Control System (ICS)
SWaT testbed
sensors
secure water treatment
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
process control
neural nets
learning (artificial intelligence)
isolation forest-based detection model
Isolation Forest (IF)
industrial plants
1D-CNN model
industrial control system
industrial control
ICS Anomaly Detection
ICs
Forestry
feature extraction model
feature extraction
Data models
Convolutional Neural Network models
convolutional neural network (CNN)
control engineering computing
Auto-Encoder (AE)
Anomaly Detection
actuators
biblio
Exploiting Symmetry in Dependency Graphs for Model Reduction in Supervisor Synthesis
Submitted by aekwall on Mon, 02/08/2021 - 1:39pm
cyber-physical system
tunnels
system components
synthesis problem
supervisory controller
supervisor synthesis
required computational time
reduced order systems
model reduction steps
lengthy synthesis procedures
even unsolvable synthesis procedures
dependency graphs
Cyber Dependencies
Discrete-Event Systems
Scalability
discrete event systems
actuators
Compositionality
Human Factors
data visualisation
automata
sensors
cyber-physical systems
Analytical models
Metrics
graph theory
pubcrawl
Resiliency
biblio
Tackling Actuator Saturation in Fixed Point Iteration-based Adaptive Control
Submitted by aekwall on Mon, 01/25/2021 - 12:54pm
nonlinear control systems
van der Pol oscillator
saturated control system
relaxation oscillators
nominal trajectory
Lyapunov function-based approach
FPIAC control
fixed point iteration-based adaptive control
Fixed Point Iteration
control design methods
Banach Space
Anti-windup
adaptive control
actuator saturation
Resiliency
actuator security
controller design
control system synthesis
iterative process
Lyapunov methods
actuators
dynamic system
Metrics
Iterative methods
composability
pubcrawl
Human behavior
biblio
Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
Submitted by aekwall on Mon, 01/25/2021 - 12:54pm
actuators
stealthy attack
data-driven stealthy actuator attack
Data-Driven
cyber-physical system security
convex optimization problem
attack signal
arbitrary detectors
Technological innovation
Covariance matrices
convex programming
actuator security
computer network security
Metrics
detection rate
composability
pubcrawl
Human behavior
Resiliency
Electronic mail
cyber-physical systems
security
Detectors
biblio
Aging Attacks against Electro-Mechanical Actuators from Control Signal Manipulation
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
electro-mechanical actuators
aging
aging attacks
carrier frequency
control signal manipulation
corrupted controller
digital control
Digital controller
digital controller technologies
Cavity resonators
electromechanical actuators
EMA's aging
Harmonic analysis
ICS's physical system
nonlegitimate pulse width modulation control signal
Pulse width modulation
remotely-accessibility capacity
cybersecurity threats
partial discharges
Degradation
actuator security
actuators
control engineering computing
industrial control
Cybersecurity
Metrics
composability
pubcrawl
Human behavior
Resiliency
Industrial Control Systems
security
security of data
biblio
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks*
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
stochastic games
time-sensitive
Power capacitors
metric interval temporal logic objectives
finite state controller
durational stochastic game
control synthesis
control input
road traffic control
Clocks
actuator security
actuator attacks
CPS
actuators
timing information
timing
Temporal Logic
Games
probability
Stochastic processes
Metrics
Iterative methods
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
different ECUs
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
improved security
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
Metrics
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
road safety
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
Towards Industrial Security Through Real-time Analytics
Submitted by aekwall on Mon, 01/25/2021 - 12:51pm
industrial security
security of data
security hardening
security breaches
security
Resiliency
real-time analytics
real-time
pubcrawl
production engineering computing
Metrics
low data utilization
loop ICS architecture
industrial setting
actuator security
industrial control system
industrial control
industrial
ICS community
Human behavior
financial safety harms
DRIP syndrome
data rich information poor syndrome
control stations
Industrial Control Systems
composability
Cloud Computing
actuators
biblio
Image Processing Technique for Smart Home Security Based On the Principal Component Analysis (PCA) Methods
Submitted by aekwall on Mon, 01/25/2021 - 12:51pm
face recognition
webcam camera
test data
solenoid door lock actuator
Raspberry pi 3 microcontroller
Raspberry Pi
Python software
Principal Component Analysis method
OpenCV
image processing technique
buzzer
smart home security
Face detection
actuator security
Webcams
security
actuators
home automation
Smart homes
security system
microcontrollers
PCA
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
principal component analysis
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »