Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threats
biblio
Security Aspects of Cyber Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
Human Factors
CPS Privacy
Manufacturing industries
Home appliances
design models
CPS Security Aspects
control system models
control security
communication models
Cyber Physical System
Sensor Systems
security aspects
CPS
security of data
Intelligent sensors
security threats
control systems
Smart Grids
cyber physical systems
privacy
pubcrawl
Human behavior
cyber-physical systems
information security
security
biblio
Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
Big Data analysis technology
APT
Power Grid
dynamic analysis
network security risks
APT attack
Active Defense
active defense system
APT attack defense
APT attack detection sandbox technology
advanced persistent threat
controllable virtual environment
detection technology
heterogeneous data sources
high-risk Trojan horses
power information system security situation prediction
Situation Prediction
threat assessment
unknown malicious code
power system security
Anomaly Detection
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Correlation
Scalability
power engineering computing
security
Communication networks
security threats
Big Data
telecommunication traffic
malware
invasive software
power grids
Metrics
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
biblio
A Progressive Intrusion Detection System through Event Processing: Challenges and Motivation
Submitted by aekwall on Mon, 07/27/2020 - 11:14am
computer science
system attacks
progressive intrusion detection system
IDS systems
Host and Network IDS
false negative rates
Events Clustering and Aggregation.
event processing
dynamic attacks
Complex Event Processing (CEP)
complex event processing
CEP
intrusion tolerance
security of data
Firewalls (computing)
security threats
Intrusion Detection System (IDS)
Intrusion Detection
Training
internet
composability
pubcrawl
Resiliency
real-time systems
Organizations
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
Submitted by grigby1 on Fri, 07/24/2020 - 11:40am
data structures
Servers
security threats
Scalability
pubcrawl
policy-based governance
NDN environment
NDN
named data networking
information-centric networking
information caching
ICN project
hash table data structure
hash table
fine-grained access control
encryption
Access Control
data segmentation
data privacy
data management
Cryptography
CP-ABE access control scheme
CP-ABE
content publishers
content distribution
computer network security
collaboration
CipherText Policy Attribute Based Encryption
CHTDS
automation
authorisation
biblio
Model-based simulation and threat analysis of in-vehicle networks
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
intelligent navigation
automated controls
automobile industry
automotive systems
connectivity interfaces
Controller area network (CAN)
cyber-security risks
driving experience
in-vehicle features
in-vehicle networks
air pollution
model-based design
network simulation
operational errors
rapid pace
safety systems
SDN technologies
security assessment
software defined networking technologies
threat analysis
vehicular ad hoc networks
security of data
computer network security
Internet of Things
real-time systems
Time measurement
software defined networking
cyber-physical systems
Resiliency
pubcrawl
IoT
security threats
sensors
Threat Landscape
security risks
Atmospheric modeling
controller area network security
power control
network data
adequate testing
biblio
Analysis and Detection of Cyber Attack Processes targeting Smart Grids
Submitted by aekwall on Mon, 07/06/2020 - 9:15am
Human Factors
Cyber Dependencies
energy digital infrastructures
cyber-security posture
cyber security analysts
cyber attack processes
Bayesian networks
belief networks
Compositionality
security of data
security threats
power engineering computing
Smart Grid
smart power grids
Metrics
pubcrawl
Resiliency
Scalability
biblio
Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
security
MLBT evaluation model
particle swarm optimisation
Peer-to-peer computing
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
Scalability
Metrics
security solutions
security threats
Supervisory Control and Data Supervisory Acquisition (SCADA)
telecommunication security
Trusted Computing
VBM2M-C network
vehicular ad hoc networks
vehicular based M2M-C network
XGBoost model
Internet of Things (IoTs)
advsersary node detection
binary particle swarm optimization
Computational modeling
Entropy
entropy based feature engineering
extreme gradient boosting model
false trust
feature extraction
Human behavior
Adversary Models
Internet of Vehi-cles(IoVs)
learning (artificial intelligence)
machine learning
Machine Learning Based Trust (MLBT)
machine learning based trust evaluation model
machine-to-machine (M2M)
machine-to-machine communication
machine-to-machine communications
malicious activity detection
biblio
A Game Theoretic Analysis on Block Withholding Attacks Using the Zero-Determinant Strategy
Submitted by aekwall on Mon, 06/08/2020 - 10:25am
Predictive Metrics
Zero-Determinant strategy
ZD player
ZD adopter
open mining pools
mutual attacks
macroscopic utility
game theoretic analysis
conventional game theory
block withholding attacks
block withholding attack
Bitcoin's incentive system
game theoretic security
security of data
Human Factors
Games
security threats
delays
distributed system
Data mining
blockchain
bitcoin
pubcrawl
game theory
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »