Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SCADA systems
biblio
A Case Study in Power Substation Network Dynamics
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
characterization
Compositionality
Human behavior
ICS networks
Measurement
Power Grid
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security
biblio
Securing SCADA Applications Using OpenPLC With End-To-End Encryption
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
AES
Compositionality
encryption
Human behavior
Modbus
OpenPLC
PLC
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security
biblio
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
CPS resilience
Compositionality
cyber security
Human behavior
Networked Control Systems Security
pubcrawl
resilience
Resiliency
SCADA system
SCADA systems
security
security controls
Threat Modeling
vulnerability assessment
biblio
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
Compositionality
Human behavior
ICs
MITM
oT
pubcrawl
Reconnaissance
resilience
Resiliency
SCADA
SCADA systems
security
biblio
A hybrid model for anomaly-based intrusion detection in SCADA networks
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
learning (artificial intelligence)
Zero-day attacks
vulnerability detection
vulnerabilities
supervisory control and data acquisition systems
security of data
SCADA systems
SCADA networks
robust hybrid model
Resiliency
pubcrawl
Protocols
Metrics
machine learning approach
machine learning
anomaly-based Intrusion Detection Systems
Intrusion Detection
industrial control system dataset
industrial control system
industrial control
Human behavior
feature selection model
Feature Selection
feature extraction
fabrication
Distributed Analytics and Security Institute Mississippi State University Starkville
Cybersecurity
Computational modeling
Compositionality
biblio
An active security defense strategy for wind farm based on automated decision
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
resilience
Wind farms
Whitelist
smart grid security
Servers
Scalability
SCADA systems
SCADA system
Resiliency
SCADA Systems Security
pubcrawl
Protocols
Metrics
Knowledge Automation
IP networks
cyber-physical systems
security
biblio
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
SCADA network cyber-attacks
machine learning
Metrics
production engineering computing
pubcrawl
Resiliency
risk assessment
risk management
SCADA network
Logic gates
SCADA security risk assessment
SCADA systems
SCADA Systems Security
Scalability
security
security risk level
supervisory control and data acquisition
Damage Assessment
learning (artificial intelligence)
industrial systems
industrial facilities
incremental learning
Human behavior
cyber-security risk assessment model
Cyber-security
critical infrastructures
computer network security
Communications technology
belief networks
Bayesian network
Bayes methods
artificial intelligence security
Adaptation models
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
smart grid communications
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
port mutation
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
end-to-end IP-Hopping technique
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
attack complexity
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
biblio
A symmetric address translation approach for a network layer moving target defense to secure power grid networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
power system security
wide area networks
symmetric packet scheduling rules
symmetric address translation
supervisory control and data acquisition network
supervisory control and data acquisition
Substations
security
scheduling
SCADA systems
SCADA network
SCADA
Resiliency
pubcrawl
computer network security
power grids
power grid network security
Network Address Translation
MTD
moving target defense
Metrics
Logic gates
Local area networks
IP-Hopping
IP networks
Cyber Physical System
critical infrastructure
biblio
Apply a wireless line sensor system to enhance distribution protection schemes
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
supervisory control and data acquisition system
power distribution faults
power distribution protection
power distribution reliability
pubcrawl
Relays
Resiliency
SCADA systems
sensor security
Metrics
upstream protection devices
Wireless communication
Wireless communications
wireless line sensor system
wireless line sensors
wireless protection sensor system
wireless sensor networks
fault location
Communication system security
composability
data acquisition
distribution protection schemes
distribution system protection
Fault currents
fault diagnosis
fault information
Circuit faults
fault status
faulted circuit indicators
faulted line sections
Fuses
Human behavior
Human Factors
local visual indication
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »