Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SCADA architecture
biblio
Developing a Secure Cyber Ecosystem for SCADA Architecture
Submitted by aekwall on Mon, 07/01/2019 - 10:09am
Monitoring
Terrorism
states security system
security of data
secure Cyber ecosystem
SCADA Systems Security
SCADA systems
SCADA network systems
SCADA architecture
SCADA
RTU
robust cyber security
pubcrawl
PLC
network attack
Resilient Security Architectures
Industries
Human behavior
Global village
cyber terrorism
cyber resilience
Cyber invasions
Cyber Attacks
critical infrastructure
critical information
Conferences
computer security
composability
CII
Resiliency
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
biblio
Survivable SCADA Via Intrusion-Tolerant Replication
Submitted by BrandonB on Thu, 04/30/2015 - 3:07pm
Protocols
Synchronization
survivable SCADA system
Survivability
Servers
security of data
SCADA systems
SCADA architecture
resilience
Reliability
Clocks
production engineering computing
performance degradation
Monitoring
Libraries
intrusion-tolerant replication
intrusion-tolerant protocols
fault tolerance
Cyber Attacks
cyber attack