Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication networks
biblio
Overview of Botnet Detection Based on Machine Learning
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
Metrics
Servers
security industry
security
Resiliency
resilience
pubcrawl
protection detection
network space security
network security problems
network security
network equipment
botnet
machine learning
learning (artificial intelligence)
invasive software
information industry
feature extraction
Data models
Compositionality
complex network environment
Communication networks
botnets
Botnet detection
biblio
Privacy Risks in Resource Constrained Smart Micro-Grids
Submitted by grigby1 on Thu, 03/28/2019 - 2:16pm
Metrics
unreliable nature
smart power grids
smart meters
Smart Grid Privacy
resource constrained smart microgrids
Resource Constrained Smart Micro Grids
RCSMG architectures
pubcrawl
privacy risks
privacy
power engineering computing
national power grid connections
microgrid architectures
anonymisation works
lossy networks
Intelligent sensors
Human behavior
Home appliances
distributed lossy networks
distortion
differential privacy
deliberate noise additions
data privacy
data perturbation work
cost-effective power management
composability
Communication networks
biblio
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security
Submitted by aekwall on Mon, 03/18/2019 - 8:54am
power system security
smart power grids
Smart Grids
smart grid security
smart grid hardware-in-the-loop co-simulation
Smart Grid Cyber Security
smart grid behavior
smart grid actions
Smart Grid
security
Scalability
Resiliency
real-time systems
pubcrawl
Protocols
co-simulation
power system
power engineering computing
Phasor measurement units
OpenStack-based evaluation framework
OpenStack-based communication network
Metrics
HIL co-simulation framework
hardware-in-the-loop
hardware-in-the loop simulation
cyber security
Cyber Attacks
computer network security
Communication networks
biblio
Deploying Robust Security in Internet of Things
Submitted by grigby1 on Fri, 02/22/2019 - 3:04pm
risk management
worst-case security risks
uncertainty
Stochastic processes
stochastic model
Stochastic computing
security risk
security offloading
security of data
security incidents
security
Scalability
Robustness
robust security
risk measurement
Cloud Computing
resource-constrained nature
Resiliency
pubcrawl
optimal robust deployment
offloaded security mechanisms
IoT system
IoT security
IoT devices
Internet-of-Things
Internet of Things
expected case security risks
conditional value-at-risk
Communication networks
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 3:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by grigby1 on Fri, 02/08/2019 - 3:28pm
attack path number
attack graphs
potential attack
network vulnerability analysis methods
network security risk
network risk
model checking
logical reasoning algorithm
logical property specification
logical language
logic-based attack graph
LAPA framework
generation attack graph
cognition
attacker
security of data
attack path depth
attack graph
Firewalls (computing)
Vulnerability
Servers
Communication networks
graph theory
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Submitted by grigby1 on Fri, 02/08/2019 - 3:21pm
Resiliency
Human behavior
information
information and communication systems
Metrics
pubcrawl
Public key
public key cryptography
public key cryptography system
resilience
encryption process
Rivest
RSA
RSA 1024
RSA algorithm
RSA encryption
Scalability
security
security system analysis
Shamir
digital signature
Asymmetric Encryption
asymmetric keys
authentication
combination method
Communication networks
composability
Compositionality
Data Security
decryption process
and Adleman algorithm
digital signatures
digital signature algorithm
Digital Signature Standard
DSA
DSA 512
DSA algorithms
DSS
encryption
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
biblio
Protecting vehicular networks privacy in the presence of a single adversarial authority
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
Resiliency
vehicular networks privacy protection
vehicular ad hoc networks
vehicular ad hoc network
traffic-simulator based experiments
traffic engineering computing
threshold-based detection
telecommunication security
single insider adversary
single adversarial authority
Security Credential Management System
security
SCMS design
road vehicles
road traffic
central authority
resilience
relabeling
pubcrawl
privacy information leakage
privacy
principal component analysis
network accountability
Metrics
key management
data privacy
Couplings
Conferences
composability
Communication networks
biblio
An Efficient NSKDP Authentication Method to Secure Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 3:09pm
privacy
Vulnerability
symmetric key distribution method
smart power grids
smart meters
Smart Grids
smart grid power
smart grid consumer privacy
Smart Grid
smart electric meters
Servers
secure smart grid
pubcrawl
private key cryptography
Communication networks
power system security
NSKDP authentication method
Meters
key management
Human Factors
Hash functions
encryption
cyber security
cryptography strategies
Cryptographic Protocols
countermeasures attacks
consumer energy supply
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »