Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial control
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
industrial control
supervisory control
Software
security weaknesses
security of data
security
SCADA systems
SCADA configuration
resilience
pubcrawl
policy-based governance
PLC
Metrics
internet
integrated circuits
Industrial Control Systems
architectural root cause
industrial automation
improper input validation
ICS systems
human-machine interfaces
Human Factors
Human behavior
disclosed software vulnerabilities
Data mining
data acquisition
control systems
computer architecture
component-based architectures
common security architectural weaknesses
common architectural security weaknesses
authorisation
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Research of Classical Machine Learning Methods and Deep Learning Models Effectiveness in Detecting Anomalies of Industrial Control System
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
resilience
machine learning algorithms
machine learning methods
modern industrial control systems
neural nets
Neural networks
privacy
production engineering computing
pubcrawl
machine learning
Resiliency
security
security of data
signal correlations
Support vector machines
Tennessee Eastman process simulation data
Training
Anomaly Detection
linear algorithms
learning (artificial intelligence)
industrial process anomaly detection task
industrial control
ICS security
ICs
Feeds
deep learning models
deep learning
Decision trees
Data processing
Cyber Attacks
control engineering computing
composability
anomaly detection evaluation dataset
biblio
Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:47am
reliable code
malware
memory contents collecting
operating system
operating systems
operating systems (computers)
production engineering computing
pubcrawl
Reliability
malicious software functions
resilience
Resiliency
resulting contents
Scalability
scalable
security incidents
software methods
volatile memory
guaranteed reliability
attacked computer
comprehensive solutions
computer security
continuous monitoring systems
control engineering computing
data collection procedure
digital investigations
forensic
Operating systems security
hardware-based memory acquisition procedure
ICs
industrial control
Industrial Control Systems
information security
integrated circuits
invasive software
biblio
A Control Flow Anomaly Detection Algorithm for Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
Industrial Control Systems
tabbed-assert control flow analysis method
standards
standard path set acquisition
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
pattern matching
path matching
intrusion attack method
Anomaly Detection
industrial control
encoding
control systems
control flow path
control flow anomaly detection algorithm
control flow analysis method
control flow
computer network security
business programs
Business
basic group partition method
anomaly detection ability analysis
biblio
The Urgency of the Threats of Attacks on Interfaces and Field-Layer Protocols in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
integrated circuits
sensors
security of data
scalable
Scalability
Resiliency
resilience
pubcrawl
Protocols
process control
Current loop
information security systems
Industrial Control Systems
industrial control system information security
industrial control system field layer
industrial control system
industrial control
HART-protocol
Current measurement
biblio
Collaborative Model-Based Fallback Control for Secured Networked Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
multiple countermeasures
Switches
Sports equipment
Sorting
sensors
security of data
security
secured networked control systems
scalable
Scalability
Resiliency
resilience
pubcrawl
Petri Net
networked control systems
Networked Control Systems Security
Industrial Control Systems
industrial control system security
industrial control
field network signal
cyber-attacks
countermeasure
control engineering computing
collaborative model-based fallback control
collaborative FCS
Collaborative Fallback Control System
collaboration function
collaboration
analog signal
biblio
Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
program testing
vulnerability mining
test efficiency
taint analysis technology
taint analysis
Software
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
component
Microprogramming
integrated circuits
Industrial Control Systems
industrial control system device firmware vulnerability mining technology
industrial control system
industrial control
Hardware
fuzzing test
firmware
device firmware
Data mining
biblio
Network Security Situation Awareness for Industrial Control System Under Integrity Attacks
Submitted by grigby1 on Thu, 05/09/2019 - 10:45am
novel security situation awareness framework
telecommunication security
system state estimation
state estimation
situation prediction algorithm
Situation Awareness
Sensor Systems
scalable
Scalability
Resiliency
resilience
pubcrawl
process control
Prediction algorithms
particle filtering (numerical methods)
particle filtering
Networked Control Systems Security
nonlinear systems
network security situation awareness
malicious attacks
local estimator
integrity attacks
integrated circuits
Industrial Control Systems
industrial control system network
industrial control system
industrial control
hazard situation detection
control systems
computer network security
Communication networks
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »