Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ICs
biblio
A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
moving target defense
software-defined networking
software defined networking
Software Defined Network
security response measures
security of data
SDN
Resiliency
real-time systems
Real-time intrusion detection
pubcrawl
protection requirement analysis
Predictive Metrics
Networked Control Systems Security
closed-loop security control
IP networks
Intrusion Detection
Industrial Control Systems
industrial control system
industrial control
Anomaly Detection
ICs
dynamic cybersecurity protection method
cybersecurity protection
control systems
control engineering computing
computer security
composability
biblio
Cloud Based Intrusion Detection and Prevention System for Industrial Control Systems Using Software Defined Networking
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
production engineering computing
microgrid energy management system
network function virtualization
network intrusion services
network security tools
OpenDaylight software
packet inspection
power engineering computing
power grids
power system control
privacy
microgrid
pubcrawl
resilience
Resiliency
SDN controller
service function chaining
software defined networking
virtual private cloud
virtualisation
virtualization privacy
web services
Human Factors
CB-IDPS
cloud Based intrusion detection and prevention system
Cloud Computing
composability
computer network security
control engineering computing
cyber security
data privacy
energy management systems
Human behavior
Amazon Web Services
ICs
Anomaly Detection
ICS delay constraints
ICS networks
industrial control
Industrial Control Systems
intrusion detection and prevention
layer encryption
manufacturing systems
Metrics
biblio
Deep-Learning-Based Network Intrusion Detection for SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:28am
SCADA network protocols
industrial control
Industrial Control Systems
learning (artificial intelligence)
network intrusion detection system
network-based cyber attacks
pubcrawl
realistic SCADA traffic data sets
Resiliency
individual network packets
SCADA system operators
SCADA System Security
SCADA systems
SCADA Systems Security
site-specific network attack
specialized attacks
supervisory control and data acquisition networks
unseen network attack instances
convolutional neural network
ICs
attacks on DNP3 protocol
Compositionality
computer network security
computing nodes
conventional network attacks
conventional SCADA specific network-based attacks
convolutional neural nets
Anomaly Detection
Cyber Attack Detection
deep learning
deep-learning-based network intrusion detection system
energy-delivery systems
field devices
Human behavior
ICS network infrastructure
biblio
Experimental Verification of Security Measures in Industrial Environments
Submitted by aekwall on Mon, 03/02/2020 - 11:29am
Human Factors
Ubiquitous Computing Security
vICS verification framework
industrial environments
industrial control security
industrial assets
ICS technology
formal verification
security measures
control engineering computing
ICs
industrial control
security of data
verification
Firewalls (computing)
integrated circuits
Anomaly Detection
production engineering computing
Metrics
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
Challenges of the Existing Security Measures Deployed in the Smart Grid Framework
Submitted by aekwall on Mon, 02/17/2020 - 1:16pm
Smart Grid
smart meter
smart grid framework
intelligent energy utility
energy requirement
AMI
power grid system
Meters
smart cities
security measures
ICs
smart meters
Smart Grids
security of data
smart grid security
smart power grids
Metrics
privacy
pubcrawl
Resiliency
SCADA
smart devices
security
Servers
Scalability
Monitoring
biblio
Industrial Control Systems (Ics) Security in Power Transmission Network
Submitted by grigby1 on Tue, 01/21/2020 - 11:15am
Organizations
supervisory control and data acquisition
Scalability
SCADA
Resiliency
resilience
pubcrawl
power transmission network
power transmission control
power system security
power stations
power grids
power distribution grids
power distribution control
Industrial Control Systems Anomaly Detection
IT security
integrated circuits
industrials plants
Industrial Control Systems
industrial control system security
industrial control
ICS security
ICs
Firewalls (computing)
firewall
Cybersecurity
control systems
biblio
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency
Submitted by grigby1 on Wed, 10/02/2019 - 1:55pm
Nessus
vulnerability assessment tools
unauthorized information disclosure
smart water system
smart home devices
smart cars
search engines
search engine
Resiliency
resilience
pubcrawl
physical components
PHP vulnerabilities
operating systems
OpenVAS
OpenSSH vulnerabilities
computational algorithms
large-scale vulnerability assessment
IoT
Internet of Things
Internet accessible CPS devices
internet
Industrial Control Systems
industrial control
ICs
Denial of Service attacks
cybersecurity posture
Cybersecurity
cyber-physical systems resiliency
cyber-physical systems
cps resiliency
computer network security
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Deployment of IoT-based Honeynet Model
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
security
IoT
SCADA
Resiliency
Human behavior
pubcrawl
composability
Honypots
ICs
SCADA Systems Security
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
« first
‹ previous
1
2
3
4
5
6
next ›
last »