Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber attack
biblio
An Optimal PMU Placement Scheme for Detection of Malicious Attacks in Smart Grid
Submitted by grigby1 on Wed, 03/23/2022 - 11:36am
process control
Synchronization
state estimation
Smart Grids
Smart Grid Sensors
Resiliency
resilience
Reliability
pubcrawl
composability
power system reliability
PMU
Phasor measurement units
Human Factors
Human behavior
FDIA
cyber attack
biblio
The Cyber Attack on the Corporate Network Models Theoretical Aspects
Submitted by aekwall on Mon, 01/10/2022 - 11:49am
attack implementation
attack graphs
weighted graph
network vulnerability
mathematical model parameters
Graphics
graph model of information attack
Filtering
cyber attack
corporate network
Cartesian product
Mathematical model
attack consequences assessment
Web servers
Predictive Metrics
cyberattack
Semantics
composability
Resiliency
pubcrawl
Protocols
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Tue, 12/21/2021 - 11:36am
Protocols
Zero day attacks
tools
℡NET
SSH
Safety
risk management
Resiliency
resilience
pubcrawl
composability
Particle measurements
Metrics
IP networks
information security
honeypot
defense
cyber attack
Cowrie
biblio
AI Next Campaign
Submitted by willirn1 on Tue, 10/26/2021 - 5:25pm
AI
C3E
AI technology
cyber attack
supply chains
Microbiologic Systems
R&D
adaptability
Algorithms
Artificial Intelligence
cyber
data
Interface
Tech-Foundations
biblio
Hybrid System to Minimize Damage by Zero-Day Attack based on NIDPS and HoneyPot
Submitted by grigby1 on Thu, 03/04/2021 - 1:55pm
composability
convergence
cyber attack
defense
honeypot
information and communication technology
Metrics
network security
NIDPS
pubcrawl
real-time systems
resilience
Resiliency
Zero day attacks
zero-day
biblio
A Moving Target Approach for Securing Secondary Frequency Control in Microgrids
Submitted by aekwall on Mon, 02/08/2021 - 12:40pm
inverter-based DG
cyber attack
DoS attacks
power generation control
denial of service attack
Cyber Dependencies
frequency control
Inverters
invertors
cyber attack threats
denial of service
Markov process
microgrid control systems
microgrid secondary frequency control
Moving Target
moving target approach
reactive defense approaches
secondary control
small-signal model
Load modeling
Scalability
Conferences
Resiliency
pubcrawl
Metrics
Decision Making
power engineering computing
power system security
control systems
computer network security
sensor data
distributed power generation
Microgrids
power generation scheduling
Human Factors
Markov processes
communication links
Compositionality
biblio
Measurement and Analysis of Cyber Resilience for Control Systems: An Illustrative Example
Submitted by grigby1 on Tue, 10/06/2020 - 1:10pm
cyber security
Resiliency
resilience
pubcrawl
load frequency control
Frequency measurement
frequency control
digital systems
Digital Information
cyberattack
cyber-physical systems
cyber threats
control system environment
cyber resilience
cyber physical systems
Cyber Attacks
cyber attack
critical infrastructures
critical infrastructure
CPS resilience
control systems
control system security
control system operation
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 1:08pm
vulnerability assessment
command injection attacks
supervisory control and data acquisition (SCADA)
structuredquery language injection attacks
intrusion detection solutions
Industrial Internet of Things (IIoT)
Industrial Internet of Things
IIoT systems
cyber-vulnerability assessment
cyber attack
electromagnetic interference
Big Data Analytics
IDS
SQL
machine learning (ML)
cyber-attacks
Internet of Things
Metrics
Structured Query Language
Protocols
network security
composability
production engineering computing
Intrusion Detection
intrusion detection system
Resiliency
resilience
pubcrawl
data analysis
machine learning
security of data
learning (artificial intelligence)
biblio
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
early attack detection
regression analysis
network traffic data
false data injection attacks
Data Exfiltration
Informatics
cyber-attack detection
data diodes
data-driven monitoring
defense-in-depth
cyber attack
host system data
Industrial Control System (ICS)
intrusion detection results
motivated attackers
multiple-layer data-driven cyber-attack detection system
physical system
physically impactful cyber attacks
command injection attacks
integrated circuits
cyber-physical systems
pubcrawl
resilience
Resiliency
computer network security
Analytical models
Data models
industrial control
Monitoring
Industrial Control Systems
network data
composability
DoS attacks
computer security
malware
Metrics
cyber threats
biblio
Cyber Security Strategy for Nuclear Power Plant through Vital Digital Assets
Submitted by aekwall on Mon, 09/14/2020 - 11:33am
cyber attack
Vital digital asset
total digital assets
Security Control
nuclear power stations
nuclear power plants
nuclear power plant Instrumentation
nuclear power plant
nuclear engineering computing
Inductors
emergency preparedness functions
digital systems
cyber security strategy
critical digital assets
Safety
computational intelligence
power generation reliability
Compositionality
power generation
computer security
cyber-attacks
standards
Accidents
composability
pubcrawl
Cryptography
security of data
« first
‹ previous
1
2
3
4
5
next ›
last »