Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Petri nets
biblio
Botnet Defense System and Its Basic Strategy Against Malicious Botnet
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
malicious botnet detection
white-hat worms
white-hat botnets
software agents
Servers
sensors
Resiliency
resilience
pubcrawl
Petri nets
Monitoring
Metrics
agent oriented Petri nets
IoT systems
invasive software
Internet of Things
Grippers
cybersecurity system
composability
botnets
botnet defense system
botnet
Analytical models
biblio
Modeling and measurement internal threat process based on advanced stochastic model*
Submitted by grigby1 on Fri, 11/20/2020 - 12:52pm
security model
Stochastic Computing Security
threat behaviors
stochastic petri nets
risk measurement
real-time risk measurement
Petri net computing characteristics
network protection
internal threats
Internal Threat
illegal data
firewall-password model
advanced stochastic model
Petri nets
security of data
complex networks
risk analysis
Stochastic processes
Computational modeling
Data models
Scalability
Mathematical model
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
intrusion detection system
system monitoring
System Identification
security of data
Scalability
Resiliency
resilience
pubcrawl
process-related attacks
process-based attacks
process-based anomaly detection
PN identification-based anomaly detection methods
Petri nets
Petri Net model identification
anomalous behaviour
industrial process
Industrial Control Systems
industrial control system
industrial control
improved industrial control system device logs processing method
ICS device
ICs
formalised method
expected behaviour
event-driven system analysis
event logs
cyber-attacks
Anomaly Detection
biblio
Handling concurrent requests in a secret sharing based storage system using Petri Nets
Submitted by grigby1 on Tue, 10/06/2020 - 1:02pm
perfect security
storage system
storage servers
storage management
server failure
security
secret sharing schemes
secret sharing
Resiliency
resilience
pubcrawl
Petri nets
composability
Metrics
distributed computer network
data theft
data storage security
cyber physical systems
Cryptography
CPS
concurrent update requests
concurrent request handling
concurrency (computers)
Concurrency
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 2:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
stochastic petri nets
Damage Assessment
transmission line protection systems
substation
power transmission protection
power system structure
power system components
Petrinet
nonintelligent attacks
intelligent attack
IEEE39 bus system
electrical network
cyber security risk assessment method
cyber physical performance
attacks
power supply
security of data
Cyber Physical System
smart power grid
power transmission lines
Stochastic processes
substation automation
cyber security
Petri nets
power system security
power engineering computing
probability
Cyber Attacks
smart power grids
Risk
pubcrawl
Resiliency
biblio
Modeling and Analysis of CPS Availability Based on the Object-oriented Timed Petri Nets
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
object-oriented
simulations
security-critical applications
Resiliency
resilience
Reliability
pubcrawl
Petri nets
Petri Net
object-oriented timed Petri net
object-oriented system
object-oriented methods
Availability analysis
object oriented security
Metrics
mathematical analysis method
mathematical analysis
cyber-physical systems
CPS modeling
CPS availability analysis
CPS architecture model
CPS
composability
biblio
Trajectory-observers of timed stochastic discrete event systems: Applications to privacy analysis
Submitted by aekwall on Mon, 04/20/2020 - 9:32am
Discrete event system
privacy models and measurement
timed stochastic Petri net models
timed stochastic discrete event systems
stochastic petri nets
privacy analysis
Observers
Markov model
language-based opacity
k-step trajectory-observer
security
Stochastic processes
discrete event systems
Petri nets
privacy
Metrics
pubcrawl
data privacy
security of data
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
IEC 60870-5-104 protocol
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
Petri nets
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
pubcrawl
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
cyberattack
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
biblio
Estimation of Information System Security Using Hybrid Simulation in AnyLogic
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
Petri nets
Security Risk Estimation
perimeter protection
Object oriented modeling
information system security
hybrid simulation
discrete event simulation
deterministic and probabilistic model
context-role
Permission
security system analysis
business data processing
Human Factors
security of data
Information systems
Probabilistic logic
Mathematical model
optimisation
Data protection
optimization
Metrics
pubcrawl
Resiliency
information security
Scalability
« first
‹ previous
1
2
3
4
next ›
last »