Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious attacks
biblio
Network Security Situation Awareness for Industrial Control System Under Integrity Attacks
Submitted by grigby1 on Thu, 05/09/2019 - 10:45am
novel security situation awareness framework
telecommunication security
system state estimation
state estimation
situation prediction algorithm
Situation Awareness
Sensor Systems
scalable
Scalability
Resiliency
resilience
pubcrawl
process control
Prediction algorithms
particle filtering (numerical methods)
particle filtering
Networked Control Systems Security
nonlinear systems
network security situation awareness
malicious attacks
local estimator
integrity attacks
integrated circuits
Industrial Control Systems
industrial control system network
industrial control system
industrial control
hazard situation detection
control systems
computer network security
Communication networks
biblio
EDMAND: Edge-Based Multi-Level Anomaly Detection for SCADA Networks
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
network traffic data
telecommunication traffic
supervisory control and data acquisition systems
security of data
security
Scalability
SCADA systems
SCADA network traffic
Resiliency
resilience
pubcrawl
Protocols
network-based intrusion detection
Anomaly Detection
Monitoring
Metrics
malicious attacks
large-scale distributed industrial systems
Image edge detection
event detection
EDMAND
edge-based multilevel anomaly detection
edge detection
Detectors
composability
appropriate anomaly detection methods
biblio
Reducing Vulnerability to Cyber-Physical Attacks in Water Distribution Networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
sensor measurements
power system security
programmable controllers
pubcrawl
Redundancy
redundant cyber components
Resiliency
security
security of data
power engineering computing
sensors
simple control laws
Vulnerability
water distribution
water distribution networks
water resources
water supply
digital devices
actuators
composability
control requirements
cyber attack
cyber physical systems
Cyber-physical attacks
cyber-physical security level
cyber-physical systems
actuator security
Human behavior
industrial control
Industrial Control Systems
malicious attacks
Metrics
Monitoring
physical processes
biblio
A Visible Light Channel Based Access Control Scheme for Wireless Insulin Pump Systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:21pm
Insulin pumps
Visible Light Communications Security
wireless insulin pump systems
wireless infusion insulin pumps
visible light channel based access control scheme
Universal Serial Bus
Sugar
smart personal insulin pumps
RF channels
photodiodes
patient treatment
patient monitoring
malicious attacks
security
infrared detectors
free-space optical communication
light emitting diodes
Communication system security
telecommunication security
Wireless communication
Scalability
Resiliency
Metrics
pubcrawl
wireless sensor networks
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by grigby1 on Thu, 08/23/2018 - 11:36am
security risks
automotive
automotive electronics
automotive applications
Bluetooth
Bluetooth connectivity
bluetooth security
Bluetooth-enabled systems
composability
Cybersecurity
Resiliency
Safety
Roads
security
wireless interfaces
telecommunication security
Human behavior
human factor
infotainment
Inspection
malicious attacks
on-board communications
Pins
pubcrawl
resilience
threat intelligence
war-nibbling
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
biblio
Sensor Security Index for Control Systems
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
multiple sensors
system vulnerability
system destruction
Stuxnet
Steady-state
sensors
sensor security index
sensor bias injection attacks
sensor attacks
Sensor attack
security of data
security
Resiliency
resilience
pubcrawl
north eastern electrical grid black out
actuator security
Metrics
malicious attacks
Linear systems
linear dynamic systems
linear control systems
Indexes
Human behavior
Gold
Detectors
Cyber-physical attack
Control systems attack
composability
anomaly detector
actuators
biblio
A user-centric machine learning framework for cyber security operations center
Submitted by K_Hooper on Wed, 02/14/2018 - 12:00pm
Scalability
Mathematical model
Metrics
model performance evaluations
Predictive models
preventive technologies
pubcrawl
Resiliency
risk score generation
risky user detection
malicious attacks
security event normalization
security information and event management system
security of data
SIEM
SOC analyst productivity
Symantec SOC production environment
user-centric
user-centric machine learning framework
flag alerts
computer security
cyber security operation center
cyber security operations center
cyber security practitioners
Data collection
Data models
data scientists
false positive rate reduction
feature engineering
artificial intelligence security
Human behavior
label creation
learning (artificial intelligence)
Learning systems
machine learning algorithm selection
machine learning algorithms
machine learning researchers
machine learning system
« first
‹ previous
1
2
3
4
next ›
last »