Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ICs
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 1:39pm
learning (artificial intelligence)
Virus Spreading
supervisory control and data acquisition systems
SCADA systems
Resiliency
resilience
pubcrawl
Nash Equilibrium
multiagent reinforcement learning
multi-agent systems
Multi-Agent Reinforcement Learning
malware author
Social Agents
invasive software
ICs
hybrid game theory
game theory
Damage Assessment
cyber-physical systems security
cyber-physical systems
cyber-attacks
CPS Security
CPS network
CPS
biblio
BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
active IC transactions
distributed ledger
ICs
integrated circuit design
Watermarking
electronic engineering computing
blockchain protocol
IP piracy
split manufacturing
blockchain technology
advanced technologies
BLIC protocol
composite consensus protocol
deleterious design modification
huge paradigm shift
IC supply chains
passive IC transactions
blockchain
data privacy
Hardware
Protocols
Resiliency
pubcrawl
composability
policy-based governance
Peer-to-peer computing
Cryptography
Computer crime
supply chain management
supply chains
manufacturing
cryptocurrencies
smart contracts
integrated circuits
biblio
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
intrusion detection system
system monitoring
System Identification
security of data
Scalability
Resiliency
resilience
pubcrawl
process-related attacks
process-based attacks
process-based anomaly detection
PN identification-based anomaly detection methods
Petri nets
Petri Net model identification
anomalous behaviour
industrial process
Industrial Control Systems
industrial control system
industrial control
improved industrial control system device logs processing method
ICS device
ICs
formalised method
expected behaviour
event-driven system analysis
event logs
cyber-attacks
Anomaly Detection
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
proprietary protocols
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
information technology network
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
fog intrusion detection system
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
anomaly based features
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
biblio
Intrusion Detection Method of Industrial Control System Based on RIPCA-OCSVM
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
particle swarm optimisation
Support vector machines
single classification problem
security of data
Scalability
Robust Incremental Principal Component Analysis
RIPCA-OCSVM
RIPCA algorithm
RIPCA
Resiliency
resilience
pubcrawl
Protocols
principal component analysis
pattern classification
Anomaly Detection
outlier
one-class support vector machine
OCSVM
learning (artificial intelligence)
Intrusion Detection
integrated circuits
industrial data sets
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
anomaly intrusion detection algorithm
anomaly detection model
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 11:31am
pubcrawl
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
industrial control system
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
dynamic security control architecture
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
composability
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
biblio
Intrusion Detection of Industrial Control System Based on Stacked Auto-Encoder
Submitted by grigby1 on Fri, 10/16/2020 - 11:31am
multiclassification support vector machine
Training
Support vector machines
stacked auto-encoder
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
pattern classification
neural nets
network data feature extraction
Analytical models
Multi-classification support vector machine
intrusion detection model
Intrusion Detection
Internet technologies
industrial production
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
Data models
Anomaly Detection
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
« first
‹ previous
1
2
3
4
5
6
next ›
last »