Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial control
biblio
A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
risk scoring systems
Metrics
Pervasive Computing Security
production engineering computing
pubcrawl
Quantitative risk assessment
quantitative risk assessment methods
resilience
Resiliency
risk management
Measurement
risk-score dispersion
SCADA(Supervisory Control and Data Acquisition)
security
security design
security of data
security threats
Terms—industrial control systems (ICS)
three-phase risk assessment method
CWSS
automotive-security guideline
Autonomic Security
big data security
composability
control devices
control engineering computing
control systems
CVSS
Automotive engineering
data logger
data loggers
ICS risk assessment
industrial control
Industrial Control Systems
integrated circuits
JASO TP15002
manufacturing systems
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
Reducing Vulnerability to Cyber-Physical Attacks in Water Distribution Networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
sensor measurements
power system security
programmable controllers
pubcrawl
Redundancy
redundant cyber components
Resiliency
security
security of data
power engineering computing
sensors
simple control laws
Vulnerability
water distribution
water distribution networks
water resources
water supply
digital devices
actuators
composability
control requirements
cyber attack
cyber physical systems
Cyber-physical attacks
cyber-physical security level
cyber-physical systems
actuator security
Human behavior
industrial control
Industrial Control Systems
malicious attacks
Metrics
Monitoring
physical processes
biblio
Towards scalable and adaptable security monitoring
Submitted by grigby1 on Fri, 09/28/2018 - 4:15pm
Monitoring
security of data
security
scalable security monitoring
Scalability
Resiliency
resilience
pubcrawl
Protocols
proprietary technology
process control
physical- cyber domain
physical isolation
adaptable security monitoring
Metrics
intrusions
integrated circuits
Industrial Control Systems
industrial control
Image edge detection
edge detection
data reduction approaches
data reduction
cyber-physical systems
control system security
composability
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
security management
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
Industrial Control Systems
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
Databases
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
control systems
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
biblio
Control systems and the internet of things \#x2014; Shrinking the factory
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
pubcrawl
Logic gates
Monitoring
network capable computer
passive infrared detectors
powerful ARM processor
Production facilities
programmable I-O interface
programming interfaces
Lips
Radio network
Raspberry Pi
Scalability
sensor network
sensors
smart interconnected society
user interfaces
wireless LAN
feedback mechanisms
component
control loop
control systems
control-monitoring systems
domestic Internet solution
factory automation
factory control systems
Factory System
battery life
I-O Systems
i-o systems security
industrial control
infrared detectors
Interfaces
internet
Internet of Things
IoT
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
biblio
Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
protocol parsing
transport protocols
telecommunication traffic
telecommunication control
stereo depth IDS
semantic analysis
security of data
SD-IDS
Scalability
rule extraction
Resiliency
resilience
pubcrawl
Protocols
deep inspection
period
modbus TCP protocol
Lenses
Intrusion Detection
integrated circuits
Inspection
industrial traffic
industrial network protocol
Industrial Control Systems
industrial control system
industrial control
ICS Anomaly Detection
biblio
Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
IDS
penetration tests
privacy
production engineering computing
Support vector machines
Training
cyber-attack detection
Europe
ICS Anomaly Detection
pubcrawl
resilience
ICS communication profile
support vector machine
industrial control
industrial control system monitoring
Resiliency
Scalability
security
security of data
integrated circuits
Intrusion Detection Systems
cyber security test
Monitoring
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »