Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber attack
biblio
A Framework for Generation, Replay and Analysis of Real-World Attack Variants
Submitted by awhitesell on Tue, 11/15/2016 - 4:37pm
Science of Security
cyber attack
Science of Security
threat model
Cyber Attacks
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by BrandonB on Wed, 05/06/2015 - 9:41am
power distribution reliability
utility servers
Topology
smart power grids
smart meters
Smart Grids
smart grid deployment
Smart Grid
simulation
Servers
routers
Reliability
qualitative assessment
power system security
power engineering computing
advanced metering infrastructure
grid topology
electrical distribution networks
DoS-DDoS attacks
DoS
distribution system reliability
distributed denial-of-service attacks
DDoS
cyber attack impact
cyber attack
critical smart grid infrastructures
computer network security
Computer crime
AMI
biblio
Ethics behind Cyber Warfare: A study of Arab citizens awareness
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
ethics
technological research centers
security systems
scientific research centers
personal information
offence
military war
military computing
Law
information technology
government data processing
Government
Arab citizens awareness
ethical aspects
despotic government plans
defense
cyber warfare
cyber war
cyber security
cyber attack
cyber army
Computers
Computer hacking
Computer crime
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 8:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by BrandonB on Fri, 05/01/2015 - 6:39am
power distribution reliability
utility servers
Topology
smart power grids
smart meters
Smart Grids
smart grid deployment
Smart Grid
simulation
Servers
routers
Reliability
qualitative assessment
power system security
power engineering computing
advanced metering infrastructure
grid topology
electrical distribution networks
DoS-DDoS attacks
DoS
distribution system reliability
distributed denial-of-service attacks
DDoS
cyber attack impact
cyber attack
critical smart grid infrastructures
computer network security
Computer crime
AMI
biblio
Survivable SCADA Via Intrusion-Tolerant Replication
Submitted by BrandonB on Thu, 04/30/2015 - 2:07pm
Protocols
Synchronization
survivable SCADA system
Survivability
Servers
security of data
SCADA systems
SCADA architecture
resilience
Reliability
Clocks
production engineering computing
performance degradation
Monitoring
Libraries
intrusion-tolerant replication
intrusion-tolerant protocols
fault tolerance
Cyber Attacks
cyber attack
biblio
The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface
Submitted by BrandonB on Thu, 04/30/2015 - 12:39pm
Force
cyber environment
deception
decision maker
Decision Making
C4ISR interface attacking
combat
command and control
command and control systems
cyber attack
cyber deception
Aircraft
information network attack
kinetic deception
Kinetic theory
operational effect
risk management
security of data
sensors
surveillance
Synchronization
trust
biblio
Mobile agent based intrusion detection system
Submitted by BrandonB on Thu, 04/30/2015 - 12:26pm
mobile agent
suspicious patterns identification
signal processing
security of data
NIDS
network-based system
network activity
mobile agents
mobile agent based intrusion detection system
Anomaly Detection
misuse detection
Intrusion Detection
internet
Informatics
host-based system
cyber attack
Conferences
Computers
« first
‹ previous
1
2
3
4
5