Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial control
biblio
A security protection approach based on software defined network for inter-area communication in industrial control systems
Submitted by grigby1 on Mon, 06/11/2018 - 3:19pm
interarea communication protection
software defined networking
Software Defined Network (SDN)
Software Defined Network
security protection approach
security protection
security interarea communication architecture
security inspection method
Resiliency
resilience
pubcrawl
production engineering computing
Package Inspection
Networked Control Systems Security
Metrics
attacks propagation prevention
Inter-Area Communication
information entropy
Industrial Control Systems
industrial control
hazards propagation prevention
Hazards
Entropy
deep network behaviors analysis
cyber-attacks detection
customized communication protection technology
control engineering computing
computer network security
composability
biblio
Cyber Security of Industrial Communication Protocols
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
Metrics
testbed
security weaknesses
security
Resiliency
resilience
pubcrawl
Protocols
programming
PROFINET
Portals
policy-based governance
Monitoring
collaboration
Machinery
Local area networks
integrated circuits
industrial Ethernet
Industrial Control Systems
industrial control
industrial communication protocols
Human Factors
Human behavior
cyber security
computer network security
commercial-off-the-shelf equipment
biblio
Design, Verification and Implementation of a Lightweight Remote Attestation Protocol for Process Control Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Remote Attestation
policy-based collaboration
privacy
process control
process control systems
program verification
protocol implementation
protocol verification
Protocols
pubcrawl
Policy
remote network infrastructures
Romania
Scyther model checking tool
secure software integrity verification scheme
security
Software
software integrity
specialized components
industrial applications
commodity-off-the-shelf hardware
commodity-off-the-shelf software
Compositionality
COTS
Cryptographic Protocols
data integrity
formal verification
gas transportation network automation
Hardware
closed process control applications
industrial communications
industrial control
isolated components
lightweight remote attestation protocol
Nickel
PCS
Phoenix-Contact industrial controller
physically secured locations
biblio
A Tiered Security Analysis of Industrial Control System Devices
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
Programmable Logic Controllers (PLCs)
vulnerabilities
tiered security analysis
threats
supervisory control and data acquisition (SCADA) systems
Software
security of data
security countermeasures
security
SCADA systems
Resiliency
resilience
pubcrawl
assets
production engineering computing
numerical control
Industrial Control Systems (ICSs)
Industrial Control system devices
industrial control
Industrial Communication
Human behavior
Hardware
Distributed Control Systems (DCSs)
computer security
computer architecture
Compositionality
biblio
A hybrid model for anomaly-based intrusion detection in SCADA networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
learning (artificial intelligence)
Zero-day attacks
vulnerability detection
vulnerabilities
supervisory control and data acquisition systems
security of data
SCADA systems
SCADA networks
robust hybrid model
Resiliency
pubcrawl
Protocols
Metrics
machine learning approach
machine learning
anomaly-based Intrusion Detection Systems
Intrusion Detection
industrial control system dataset
industrial control system
industrial control
Human behavior
feature selection model
Feature Selection
feature extraction
fabrication
Distributed Analytics and Security Institute Mississippi State University Starkville
Cybersecurity
Computational modeling
Compositionality
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Cyber-resilient industrial control system with diversified architecture and bus monitoring
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
ICs
actuators
bus monitoring
computer architecture
control engineering computing
controller architecture
cyber vulnerabilities
cyber-resilient industrial control system
Cybersecurity
cybersecurity test bed
DeterLab
Hardware
security of data
industrial control
integrated circuits
Monitoring
production engineering computing
pubcrawl
Resiliency
resiliency approach
Resilient Security Architectures
Robustness
safety-critical ICS
SCADA
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
biblio
An Integrated Approach for Resilience in Industrial Control Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
Software systems
self-adaptive software system
security
Run Time
Resiliency
resilience
pubcrawl
Monitoring
model-driven engineering techniques
model-driven engineering
meta-adaptive system
Adaptation models
industrial plants
Industrial Control Systems
industrial control system
industrial control
hydropower plant units
hydroelectric power
Hardware
Design Time
controller configurations
contract-based design paradigm
contract-based design
biblio
Ensuring Information Security for Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:29pm
information security
sensors
Security Intelligence application
Resiliency
pubcrawl
Protocols
Metrics
IoT security
Internet of Things
attacks taxonomy
industrial control
Human Factors
Human behavior
Computer crime
composability
Cloud Computing
big data technologies
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »