Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
Countering anti-forensics of median filtering
Submitted by BrandonB on Mon, 05/04/2015 - 11:30am
image pixel difference distribution restoration
statistical fingerprints
statistical analysis
Radiation detectors
pixel difference
Noise
median filters
median filtering traces
median filtering
image restoration
anti-forensic
Image forensics
Image coding
Forensics
Filtering
Discrete Fourier transforms
digital images
Detectors
antiforensics countering
antiforensic method
biblio
Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:37am
power system networks
supervisory control and data acquisition systems
supervisory control and data acquisition (SCADA)
smart power grids
Smart Grids
Smart Grid
security of data
SCADA systems
SCADA cybersystems
Protocols
power system security
behavior-based concept
multilayer cyber-security framework
multiattribute SCADA-specific intrusion detection system
Intrusion Detection
IDS
heterogeneous white list
Detectors
Cybersecurity
cyber-attack threats
Current measurement
computer security
biblio
Data-centric phishing detection based on transparent virtualization technologies
Submitted by BrandonB on Thu, 04/30/2015 - 1:47pm
human perceptual similarity
antiphishing solution
Browsers
cloud
Cloud Computing
color-based fingerprint extraction
color-based fingerprint filtering
color-based fingerprint scaling
component isolation
computer architecture
Computer crime
Data mining
data-centric phishing detection
Detectors
Web sites
Image color analysis
malware
man-in-the-browser attack
MitB attack
online front-ends
phishing attacks
spoofed Web pages
transparent virtualization technologies
virtual machines
virtualisation
VM introspection
VMI
Web pages
biblio
DAIDS: An Architecture for Modular Mobile IDS
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
intrusion detection system
third party mobile applications
telecom operator
security of data
profile applications
North America
Monitoring
modular mobile IDS
mobile radio
mobile devices
mobile computing
malware
malicious behavior
Android (operating system)
Intrusion Detection
Humanoid robots
dynamic analysis
Detectors
detection algorithms
Databases
DAIDS
behavior profiling
behavior analysis
Anomaly Detection
Androids
Android platform
biblio
A low-cost dual energy CT system with sparse data
Submitted by BrandonB on Thu, 04/30/2015 - 12:43pm
ART-TV
Computed tomography
Detectors
dual energy CT system
Energy states
Image reconstruction
material discrimination
reconstruction
Reconstruction algorithms
sparse samples
TV
X-ray imaging
X-rays
biblio
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:56am
Kalman filters
χ2-detector
state processes
smart-grid systems security
smart power grids
Smart Grids
security
robust security framework
random attack
predictor variables
power system security
power engineering computing
Mathematical model
communication infrastructure
Kalman filter smart grid
Kalman filter
fault diagnosis
false data-injection attack
false data injection attack
Euclidean detector
DoS attack
Detectors
dependent variables
denial-of-service attack
Cyber Physical System
computer network security
biblio
Combating False Data Injection Attacks in Smart Grid using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:55am
Kalman filters
χ2-square detector
state process
smart power grids
smart power grid security
Smart Grids
sensors
security
predictor variable series
power system state estimation
power system security
power system faults
power system
power engineering computing
Mathematical model
actuators
Kalman filter
fault diagnosis
fault detection
false data injection attack detection
Euclidean distance metrics
Euclidean detector
Equations
electric sensing devices
DoS attacks
Detectors
control systems
computer network security
communication infrastructure
« first
‹ previous
…
6
7
8
9
10
11
12
13
14