Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion tolerance
biblio
Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
power engineering computing
power grid control systems
Power Grid
intrusion-tolerant power grid
intrusion-tolerant cloud technologies
intrusion tolerance
commercial cloud systems
Open Source Software
cyberattacks
resilience
security of data
power grids
open source
composability
pubcrawl
Resiliency
SCADA systems
SCADA
security
Cloud Computing
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
computer centres
System recovery
supervisory control
Spire
sophisticated network-level attacks
simultaneous intrusions
SCADA system management
power grid infrastructure
network-attack-resilient intrusion-tolerant SCADA
nation-state-level attackers
data acquisition systems
control centers
network attack
data centers
intrusion tolerance
Power Grid
security of data
resilience
power system reliability
fault tolerant computing
power grids
Substations
network attacks
composability
pubcrawl
Resiliency
SCADA systems
SCADA
Protocols
distributed processing
Monitoring
computer network security
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
A Creditability-based Intrusion Tolerant Method for Protection Equipment in Transformer Substations
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
Protective relaying
creditability-based intrusion-tolerant algorithm
Cyber network attack
interconnected network environment
interconnection of all things(IoT)
Intrusion-tolerant
malfunction protection
mobile terminal devices
protection equipment
CIT algorithm
Protective Relays
relay protection
relays protection
security distribution network
sensing data analysis
transformer substations
intrusion tolerance
security of data
Abnormal data diagnose
open network environment
Integrated circuit modeling
Numerical models
sensors
power engineering computing
Substations
data analysis
smart phones
composability
pubcrawl
Resiliency
real-time systems
telecommunication security
Internet of Things
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
Intrusion-Tolerant Autonomous Driving
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
Sophisticated Attacks
intrusion tolerance
well equipped adversarial teams
real time systems
predictable hardware
killer application
intrusion-tolerant autonomous driving
intrusion-tolerant architecture
intrusion tolerant design
highly skilled equipped adversarial teams
fault-and-intrusion tolerance toolboxes
fault and intrusion tolerance
complex software
real-time systems
automobiles
Autonomous Driving
distributed systems
fault tolerant computing
composability
pubcrawl
Resiliency
computer architecture
Kernel
Task Analysis
traffic engineering computing
security of data
Safety
autonomous vehicles
biblio
Towards Real-Time-Aware Intrusion Tolerance
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
cyber-physical realtime systems
control engineering computing
intrusion tolerance
cyber physical systems
ISO 26262
safety systems
assisted/autonomous driving
automotive use-cases
cyber-physical real-time systems
authentication
EN IEC 62061
EN ISO 13849
functional safety regulations
real-time-aware intrusion tolerance
real-time-aware intrusion-tolerant architectures
safety requirements
security holes
security
Attack vectors
mobile robots
composability
pubcrawl
Resiliency
cyber-physical systems
real-time systems
Protocols
traffic engineering computing
security of data
Safety
road vehicles
road safety
Automotive engineering
automobiles
biblio
From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures
Submitted by grigby1 on Fri, 04/17/2020 - 11:29am
microsoft windows
Windows Operating System Security
vulnerability statistics
vulnerability databases
Vulnerability
security
Resiliency
resilience
pubcrawl
operating systems (OSs)
intrusion tolerance
Metrics
forever-day vulnerabilities
diversity
Days-of-grey-risk
Databases
Computer hacking
computer architecture
composability
file
Trustworthy Intrusion Tolerance in Cyber-Physical Critical Infrastructures
Submitted by saman.zonouz on Fri, 04/10/2020 - 12:04pm. Contributors:
Sriharsha Etigowni
Nava Hirschorn
Gabriel Salles-Loustau
Saman Zonouz
CPS
intrusion tolerance
detection and response
Lightning Talks
1453046
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
Deploying Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 03/16/2020 - 10:30am
power grid supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
red team
pubcrawl
Protocols
Power system protection
power plant
Power industry
power grids
Compositionality
power grid SCADA systems
power grid protection
Power Grid
power generation
power engineering computing
machine learning
intrusion-tolerant SCADA system
intrusion tolerance
Intrusion Detection
Human behavior
deployment
composability
« first
‹ previous
1
2
3
4
5
6
next ›
last »