Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SCADA systems
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
biblio
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
repetitive operational profile
physical damage
Physical damage control
Physical Threats in IoT
PLC
policy-based governance
programmable controllers
programmable logic controller
pubcrawl
operating devices
Resiliency
response system
SCADA server
SCADA systems
SCADA Systems Security
security
security of data
system monitoring
destructive attacks detection
actuator security
actuators
composability
Compositionality
Computer worms
CPS
cyber-physical system security
cyber-physical systems
actuator
Hardware
Human behavior
IoT security
malicious operation
Metrics
middleware
middleware security
Monitoring
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
Ransomware Injection
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
cyber attack
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
cyber physical systems
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
invasive software
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
information scanning
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
message transmission
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
Metrics
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
security of data
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
industrial control
supervisory control
Software
security weaknesses
security of data
security
SCADA systems
SCADA configuration
resilience
pubcrawl
policy-based governance
PLC
Metrics
internet
integrated circuits
Industrial Control Systems
architectural root cause
industrial automation
improper input validation
ICS systems
human-machine interfaces
Human Factors
Human behavior
disclosed software vulnerabilities
Data mining
data acquisition
control systems
computer architecture
component-based architectures
common security architectural weaknesses
common architectural security weaknesses
authorisation
biblio
Malware propagation effects on SCADA system and smart power grid
Submitted by aekwall on Mon, 07/01/2019 - 9:11am
power engineering computing
smart power grids
Smart Grids
simulated smart power grid environment
sensors
SCADA Systems Security
SCADA systems
SCADA system
Resiliency
pubcrawl
power system security
power grids
power generation
composability
Phasor measurement units
openDSS
OMNeT++ simulator
malware propagation effects
malware
invasive software
Human behavior
grid computing
cyberattack
Cyber Attacks
critical infrastructures
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Cyberattack to Cyber-Physical Model of Wind Farm SCADA
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
power systems
wind turbines
wind power plants
wind power penetration
Wind power generation
Wind farms
wind farm SCADA system
wind farm
supervisory control and data acquisition systems
Servers
security of data
SCADA Systems Security
SCADA systems
SCADA (Supervisory control and data acquisition)
Resiliency
pubcrawl
Anomaly Detection
power system security
Power system protection
power system control
power system
information and communication technology model
IEEE 9-bus modified system
Human behavior
Cybersecurity
cyberlayer
cyberattack to cyber-physical model
cyberattack
cyber-physical systems
cyber-physical system model
CPS (cyber-physical system)
composability
biblio
Supporting Cyber-Physical Security of Electric Power System by the State Estimation Technique
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
SCADA Systems Security
power system security
power system state estimation
pubcrawl
Reliability
Resiliency
SCADA
SCADA measurement
SCADA systems
power system reliability
security of data
state estimation
state estimation technique
state estimation tool
two-level SE
WAMS
WAMS measurement
composability
power system measurement
power engineering computing
Phasor measurement units
malicious attacks detection
Human behavior
Global Positioning System
EPS
energy system
Electric Power System
data corruption
cyberattacks identification
cyber-physical systems
cyber-physical security
cyber security
computer security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »