Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber systems
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
SDN Enabled Secure IoT Architecture
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
resource-constrained devices
Software Defined Network (SDN) Security
Precision agriculture
Policy based Secure IoT Architecture
lightweight protocol
IoT network infrastructure security
IoT Authentication and Access Control
Internet of Things (IoT) Security
integrated security approach
authenticated malicious IoT devices
Network Security Architecture
cyber systems
critical national infrastructure
computer network security
Software Defined Networks
Logic gates
control systems
SDN
authentication
pubcrawl
Resiliency
software defined networking
computer architecture
Protocols
Cryptographic Protocols
Internet of Things
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
biblio
Quantifying cyber-resilience against resource-exhaustion attacks
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
Queueing analysis
stress-strain curve
Stress
Strain
simple queuing system
Servers
security of data
resource-exhaustion attacks
resilience
queuing theory
queueing theory
cyber security
networked queuing systems
Mechanical Engineering
material science
linguistic terms
Information systems
information sciences
information science
engineering terms
cyber-resilience quantification
cyber systems
biblio
Model-Based Attack Detection and Mitigation for Automatic Generation Control
Submitted by BrandonB on Thu, 04/30/2015 - 1:27pm
power system operation reliability
Intrusion Detection Systems
kernel density estimation
model-based anomaly detection algorithm
model-based mitigation algorithm
network-based security technologies
physical system
Power measurement
power system control
power system frequency
host-based security technologies
power system reliability
power system stability
ramp attacks
scaling attacks
security of data
smart attack detection
smart attack mitigation
supervisory control and data acquisition
cyber-attack-resilient control techniques
Anomaly Detection
attack mitigation algorithm
attack resilient control
automatic generation control
critical assets protection
cyber layer
cyber security measures
cyber systems
AGC
data integrity
Data Integrity Attacks
electricity market operation
Electricity supply industry
electronic threats
frequency control
Frequency measurement
Generators