Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Business
biblio
Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
industrial control system
Safety
Resiliency
pubcrawl
Protocols
production engineering computing
Predictive Metrics
power systems
power industry control system intrusion
Networked Control Systems Security
network invasion
network intrusion
Control Theory
industrial control network space security
industrial control
control systems
control engineering computing
computer network security
composability
Business
behavior characteristics analysis
attack model
attack behavior analysis
security
biblio
Securing Industrial Remote Maintenance Sessions using Software-Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 3:16pm
Production
XACML
untrustworthy external networks
software-defined networking
software defined networking
Software
security of data
security
SDN
Router Systems Security
Resiliency
resilience
pubcrawl
production engineering computing
ABAC
network security
Metrics
manufacturing industry
Manufacturing industries
maintenance engineering
internet
industrial remote maintenance session security
industrial remote maintenance
industrial networks
industrial network
considerable economic advantages
Communication networks
Business
biblio
RFID-assisted Continuous User Authentication for IoT-based Smart Farming
Submitted by aekwall on Mon, 03/23/2020 - 12:32pm
machine data
agricultural contractors
agricultural machines
collaborative agricultural processes
farm management information systems
farm-internal interconnection
FMIS
in-field data exchange
interconnected machinery
IoT-based smart Farming
electronic data interchange
Machinery
Management information systems
NFC
Radio Frequency Identification-based continuous user authentication
RFID-assisted continuous user authentication
Smart Farming
sustainable resource management
RFIDs
authentication
authorization
Internet of Things
security
Resiliency
Human behavior
pubcrawl
Business
sustainable development
Servers
public domain software
message authentication
security architecture
radiofrequency identification
RFID
Agriculture
groupware
Decision support systems
biblio
PSA: An Architecture for Proactively Securing Protocol-Oblivious SDN Networks
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
pubcrawl
unified security defense framework
telecommunication control
software-defined network (SDN)
software-defined network
software defined networking
security defense function
security defense application
security
SDN security
SDN infrastructure
Scalability
Resiliency
resilience
Bandwidth
Protocols
protocol-oblivious forwarding (POF)
proactively securing protocol-oblivious SDN networks
proactive security layer
proactive security framework PSA
proactive security
Optical fibers
data-to-control plane saturation attack
control systems
computer network security
computer architecture
business logic
Business
biblio
Research on Self-Healing Technology for Faults of Intelligent Distribution Network Communication System
Submitted by grigby1 on Mon, 02/17/2020 - 4:13pm
power distribution control
smart power service
Smart Grids
SHC
self-healing technology
self-healing networks
self-healing control
Resiliency
resilience
Real-time monitoring
pubcrawl
power system security
power system
power grids
power engineering computing
power distribution faults
Business
optimal control
Monitoring
maintenance engineering
intelligent power communication network
intelligent distribution network communication system faults
intelligent decision
distribution network self-healing control
distribution network data monitoring
Data Transmission
data analysis
computerised monitoring
composability
Communication networks
Circuit faults
biblio
Big Provenance Stream Processing for Data Intensive Computations
Submitted by aekwall on Mon, 09/23/2019 - 9:40am
Data Lake
tagging
stream processing
Sparks
provenance events
Partitioning algorithms
parallel stream
parallel algorithms
parallel algorithm
out-of-order provenance streams
Out of order
on-the-fly provenance processing
Lakes
data-parallel frameworks
data provenance
Big Data
data intensive computations
Business
big provenance stream processing
Big Provenance
Provenance
data analysis
Metrics
Twitter
composability
pubcrawl
Human behavior
Resiliency
data integrity
biblio
Research on Multi-Source Data Security Protection of Smart Grid Based on Quantum Key Combination
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
Quantum mechanics
power engineering computing
Power Grid
Predictive Metrics
pubcrawl
quantum cryptography
quantum communication
quantum computing security
quantum key combination
power data protection
resilience
Resiliency
Scalability
segmentation and combination of key
segmentation technology
Smart Grid
smart power grids metrics
Business
power communication network
multisource data security protection
Microelectronics Security
Microelectronics
Metrics
key updating
key segments
encryption
Data protection
composability
communication terminals
communication security
combination technology
business terminals
business data
biblio
Light-Weighted Security Access Scheme of Broadband Power Line Communications for Multi-Source Information Collection
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
remote information collection
multisource data acquisition services
multisource information collection
power consumption
power consumption information acquisition system
Power Line Communication
Power line communications
power meters
Predictive Metrics
Protocols
pubcrawl
Multi-meter reading
resilience
Resiliency
Resistance heating
security
security access
services security isolation
smart meter-reading technologies
smart meters
terminal access
Water heating
data acquisition
Bandwidth
broadband power line communications
Business
carrier transmission on power lines
channel security isolation
communication modes
communication optimization
communication protocols
communication reliability
composability
acquisition terminals
electrical interfaces
heat meters information collection services
integrated meter service
light-weighted security access scheme
meter terminals
meter-reading service
Meters
Metrics
Microelectronics Security
biblio
Cybersecurity assurance control baselining for smart grid communication systems
Submitted by aekwall on Mon, 08/05/2019 - 9:42am
Smart Grid
Resiliency
security assurance controls
security baseline
security categorization
security impact levels
security level
security levels
security of data
Security Technical Implementation Guides
security zone
recent innovative risk-based approaches
smart grid communication networks
smart grid communication systems
smart grid security architecture
smart grid system architecture
Smart Grids
standards
Systems Security
technical functional controls
US Defense Information Systems Agency
Human behavior
assurance
assurance baseline
Business
composability
computer security
control systems
cybersecurity assurance base lining concepts
cybersecurity assurance control baselining
cybersecurity assurance controls
Networked Control Systems Security
IEC standards
industrial automation
Information Assurance
Information systems
key cybersecurity control baselining
Metrics
national security systems
policy-based governance
pubcrawl
biblio
A Control Flow Anomaly Detection Algorithm for Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 9:46am
Industrial Control Systems
tabbed-assert control flow analysis method
standards
standard path set acquisition
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
pattern matching
path matching
intrusion attack method
Anomaly Detection
industrial control
encoding
control systems
control flow path
control flow anomaly detection algorithm
control flow analysis method
control flow
computer network security
business programs
Business
basic group partition method
anomaly detection ability analysis
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »