Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Local area networks
biblio
Research on Multi-object-oriented Automatic Defense Technology for ARP Attack
Submitted by grigby1 on Mon, 10/04/2021 - 2:03pm
domain-control
Switches
Servers
Protocols
multi-object-oriented
Media Access Protocol
Logic gates
Local area networks
IP networks
object oriented security
batch-processing
automatic defense technology
ARP-attack
pubcrawl
Metrics
composability
Resiliency
biblio
Power System Reliability Analysis Considering External and Insider Attacks on the SCADA System
Submitted by grigby1 on Wed, 05/05/2021 - 11:29am
power systems
switched mode power supplies
SCADA Systems Security
SCADA systems
SCADA System Security
SCADA
Resiliency
resilience
Reliability
pubcrawl
Compositionality
power system reliability
Monte Carlo Simulation (MCS)
mean time-to-compromise (MTTC)
Local area networks
insider attacks
Human Factors
Human behavior
Cybersecurity
Computer crime
biblio
On a Deterministic Approach to Solving Industrial Control System Problems
Submitted by grigby1 on Tue, 03/30/2021 - 11:05am
Human Factors
signal transmission
security
queuing theory
queueing theory
Queueing analysis
pubcrawl
production engineering computing
network performance measures
Network calculus
Mathematical model
Local area networks
Industrial Control Systems
industrial control
automation
Human behavior
digital control system problems
deterministic queuing systems network calculus
delays
delay
database updating
Cybersecurity
critical infrastructures
Control System
control engineering computing
Calculus
backlog
biblio
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 10:52am
information technology network
Scalability
risk quantification
Resiliency
resilience
pubcrawl
production engineering computing
Production
operational technology systems
maintenance engineering
maintenance
Local area networks
Intrusion Detection Systems
Intrusion Detection
integrated circuits
anomaly-based intrusion detection configurations
Industrial Control Systems
industrial control
ICS Anomaly Detection
ICs
Government
full-scale ICS test bed
Ethernet based interconnections
Electronic mail
cost reduction
control engineering computing
computer network security
Assessment
anomaly-based network IDS settings
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
Design and Implementation of Full-Scale Industrial Control System Test Bed for Assessing Cyber-Security Defenses
Submitted by grigby1 on Wed, 02/03/2021 - 11:57am
Industrial Control Systems
test beds
Scalability
Safety
Resiliency
resilience
pubcrawl
production environments
production engineering computing
Production
Local area networks
Integrated circuit modeling
computer network security
industrial control
ICS-specific security solutions
ICS test beds
Hardware
full-scale industrial control system test bed
Ethernet-based threat surface
cybersecurity defenses
cyber-security defenses
cyber security
control engineering computing
computer security
biblio
Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
Local area networks
industrial network security heads
industrial network systems
industrialized Early Intrusion Detection System
integrated circuits
intelligent manufacturing systems
internal industrial network
Intrusion Detection
Iptables
Iptables MikroTik
industrial installations
Monitoring
network security
production engineering computing
Protocols
pubcrawl
resilience
routers
Scalability
Servers
ICS Honeypot
Resiliency
Predictive Metrics
computer network performance evaluation
computer network security
control engineering computing
cybersecurity networks
Early Detection approach
Early Intrusion Detection System
honeypots
Router Systems Security
ICS SCADA
IDS performance
IDS Snort
industrial control
industrial control facility networks
industrial control system
Industrial Control Systems
industrial EIDS
Industrial honeypot
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
attack graph
Resilient Security Architectures
Unity software
system resiliency
security property
Resiliency
resilience level assessment
program visualisation
possible attack instances
JKind model checker integrated tool
generated network models
generated attack sequences
generated attack scenarios
cyber-physical-systems
architecture analysis-&-design language
AADL
security of data
faults
attack graphs
stability
Local area networks
Stability analysis
program verification
resilience
Communication networks
cyber-attacks
Analytical models
tools
graph theory
pubcrawl
security
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
industrial control
Information Reuse and Security
real-time Ethernet automation systems
PROFINET
open systems
automation-friendly security solution
operational technology
communication security
Compositionality
security requirements
information technology
computer network security
Local area networks
security architecture
automation
standards
pubcrawl
Resiliency
Industrial Control Systems
real-time systems
Protocols
security
biblio
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
memory exhaustion minimization
Internet Protocol
IP
IP spoofing detection
IP spoofing prevention
IP2HC table
LAND attack
LAND based DDoS attack
local area network denial attack
malformed packets
hop count filtering mechanism
smurf attack
Source port
spoofed packets
SYN flood attack
teardrop attack
TTL
victim server
virtual cloud environment
internet
Cloud Computing
IP networks
distributed denial of service attack
Resiliency
Human behavior
pubcrawl
composability
Metrics
computer network security
Local area networks
IP spoofing
Flooding Attack
DDoS Attack Prevention
CloudSim 3.0 toolkit
Distributed Denial of Service(DDoS)
HCF mechanism
Hop Count Filtering (HCF)
1
2
3
4
next ›
last »