Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ICs
biblio
Digital data provenance for the power grid based on a Keyless Infrastructure Security Solution
Submitted by aekwall on Fri, 02/25/2022 - 10:46am
SCADA systems
Keyless security
ICs
historians
data-in-transit
data-at-rest
data provenance
Cybersecurity
Object recognition
Provenance
Fingerprint recognition
Software
power grids
blockchain
composability
Human behavior
Resiliency
Metrics
pubcrawl
Distributed databases
DLT
real-time systems
biblio
A Legacy Infrastructure-based Mechanism for Moving Target Defense
Submitted by grigby1 on Tue, 02/22/2022 - 5:44pm
IP-Hopping
dhcp
Synchronization
moving target defense
integrated circuits
ICs
Protocols
Medical services
Scalability
performance evaluation
Resiliency
resilience
Metrics
pubcrawl
IP networks
Servers
biblio
Vulnerability Assessment for ICS system Based on Zero-day Attack Graph
Submitted by grigby1 on Wed, 07/28/2021 - 8:46am
Metrics
zero-day
vulnerability assessment
unknown vulnerability
Security Metrics
security metric
security
risk management
pubcrawl
attack graph
Measurement
integrated circuits
ICs
critical infrastructure
Computing Theory
Buildings
automation
biblio
Incorporating SCADA Cybersecurity in Undergraduate Engineering Technology Information Technology Education
Submitted by grigby1 on Tue, 05/25/2021 - 2:33pm
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
education
Engineering students
ICs
industrial control
information technology
integrated circuits
Knowledge engineering
PLCs
privacy
pubcrawl
SCADA
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
internet
trees (mathematics)
traditional network security
traditional intrusion detection systems
Resiliency
pubcrawl
Predictive models
LSTM & attack tree
LSTM
Logic gates
Intrusion Detection
attack tree
Information Reuse and Security
Industrial control system intrusion detection model
industrial control
IDS
ICs
Hidden Markov models
constructed attack tree model
computer network security
Computer hacking
Compositionality
biblio
Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest
Submitted by grigby1 on Tue, 03/30/2021 - 11:53am
Industrial Control System (ICS)
SWaT testbed
sensors
secure water treatment
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
process control
neural nets
learning (artificial intelligence)
isolation forest-based detection model
Isolation Forest (IF)
industrial plants
1D-CNN model
industrial control system
industrial control
ICS Anomaly Detection
ICs
Forestry
feature extraction model
feature extraction
Data models
Convolutional Neural Network models
convolutional neural network (CNN)
control engineering computing
Auto-Encoder (AE)
Anomaly Detection
actuators
biblio
Machine Learning Methods for Anomaly Detection in Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 11:53am
industrial control system security
testing
Scalability
Resiliency
resilience
random forests
pubcrawl
Neural networks
machine learning
Integrated circuit modeling
Anomaly Detection
industrial control
ICS Anomaly Detection
ICs
deep learning
cyber-physical system security
CPS
boosting
Artificial Neural Networks
biblio
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 11:52am
information technology network
Scalability
risk quantification
Resiliency
resilience
pubcrawl
production engineering computing
Production
operational technology systems
maintenance engineering
maintenance
Local area networks
Intrusion Detection Systems
Intrusion Detection
integrated circuits
anomaly-based intrusion detection configurations
Industrial Control Systems
industrial control
ICS Anomaly Detection
ICs
Government
full-scale ICS test bed
Ethernet based interconnections
Electronic mail
cost reduction
control engineering computing
computer network security
Assessment
anomaly-based network IDS settings
biblio
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
industrial network
testing
telecommunication traffic
standards
simplified method
security incident detection
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
network traffic
Modbus protocol
machine learning
intrusion detection system
Anomaly Detection
industrial Modbus protocol
IDS system Zeek
IDS
identified signature recognition
identified anomaly recognition
ICS Anomaly Detection
ICs
fast incident detection
efficient incident detection
DoS Attack Detection
DNP3 protocol
distributed network protocol 3
digital signatures
computer network security
biblio
Applying of Generative Adversarial Networks for Anomaly Detection in Industrial Control Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:56am
Industrial Control Systems
Training
security of data
Scalability
Resiliency
pubcrawl
production engineering computing
Predictive Metrics
neural nets
Intrusion Detection
Integrated circuit modeling
information security
industrial processes anomaly detection
industrial process
industrial control systems (ICS)
ICS Anomaly Detection
industrial control
ICs
Generators
generative adversarial networks (GAN)
generative adversarial networks
Generative Adversarial Learning
deep learning
Data models
Cyber Attacks
control engineering computing
computer architecture
BiGAN architecture
Anomaly Detection
« first
‹ previous
1
2
3
4
5
6
next ›
last »