Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber attack
biblio
Detection of Phishing Attacks
Submitted by grigby1 on Tue, 11/26/2019 - 2:48pm
Phishing
information security
Intrusion Detection
Intrusion Detection Systems
login credentials
mail contents
malicious links
money loss
official person
identity theft
phishing attacks
phishing emails
Postal services
pubcrawl
spam mails
spam words
Uniform resource locators
unsolicited e-mail
detection problem
attachments
attacker
Bayes methods
Bayesian algorithm
Classification algorithms
communication mediums
Computer crime
cyber attack
Anti Phishing Simulator
digital simulation
e-mail
e-mails harm victims
Electronic mail
Filtering
Human behavior
human factor
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
biblio
Social Engineering Attack Nets $1.7M in Government Funds
Submitted by willirn1 on Wed, 09/11/2019 - 9:47am
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
cyber attack
cyber theft
Government
Cognitive Security
Articles of Interest
C3E 2019
biblio
A Method of Cyber Risk Control Node Selection Based on Game Theory
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
composability
Control Theory
cyber attack
game theory
offensive and defensive income
pubcrawl
resilience
Resiliency
risk control
security
Vulnerability
biblio
A Stochastic Game Approach to Cyber-Physical Security with Applications to Smart Grid
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
power system measurement
CPS
cyber layer
cyber-physical security
defending strategies
effective defense strategies
physical damage
Physical layer
physical system
Markov processes
Power system protection
stochastic game approach
stochastic games
system operator
value iteration
wide-area monitoring
zero-sum Markov game
Stochastic computing
cyber-physical systems
security of data
Games
pubcrawl
Resiliency
Scalability
Conferences
Nash Equilibrium
cyber attack
security
power engineering computing
power system security
game-theoretic approach
cyber-physical system
Smart Grids
smart power grids
Smart Grid
biblio
Reducing Vulnerability to Cyber-Physical Attacks in Water Distribution Networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:30am
sensor measurements
power system security
programmable controllers
pubcrawl
Redundancy
redundant cyber components
Resiliency
security
security of data
power engineering computing
sensors
simple control laws
Vulnerability
water distribution
water distribution networks
water resources
water supply
digital devices
actuators
composability
control requirements
cyber attack
cyber physical systems
Cyber-physical attacks
cyber-physical security level
cyber-physical systems
actuator security
Human behavior
industrial control
Industrial Control Systems
malicious attacks
Metrics
Monitoring
physical processes
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
biblio
Real-time Detection of Botnet Behavior in Cloud Using Domain Generation Algorithm
Submitted by grigby1 on Tue, 09/19/2017 - 11:06am
botnet
C&C server
cyber attack
DGA
DNS
Human behavior
Metrics
NetFlow
pubcrawl
Scalability
spam detection
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
file
A Framework for Generation Replay and Analysis of Real-World Attack Variants
Submitted by awhitesell on Tue, 11/15/2016 - 4:37pm
Science of Security
cyber attack
Science of Security
threat model
Cyber Attacks
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
« first
‹ previous
1
2
3
4
5
next ›
last »