Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial control
biblio
Design and Implementation of Full-Scale Industrial Control System Test Bed for Assessing Cyber-Security Defenses
Submitted by grigby1 on Wed, 02/03/2021 - 12:57pm
Industrial Control Systems
test beds
Scalability
Safety
Resiliency
resilience
pubcrawl
production environments
production engineering computing
Production
Local area networks
Integrated circuit modeling
computer network security
industrial control
ICS-specific security solutions
ICS test beds
Hardware
full-scale industrial control system test bed
Ethernet-based threat surface
cybersecurity defenses
cyber-security defenses
cyber security
control engineering computing
computer security
biblio
Application of Optimized Bidirectional Generative Adversarial Network in ICS Intrusion Detection
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
optimal model
Training
supervised control
single variable principle
security of data
Scalability
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
parameter optimization
optimized BiGAN
optimized bidirectional generative adversarial network
optimization
optimisation
network intrusion detection
neural nets
massive network traffic data
Intrusion Detection
integrated circuits
Industrial Control Systems
industrial control system
industrial control
ICS intrusion detection method
high-dimensional network traffic data
generative adversarial networks
data acquisition
control system security
control engineering computing
Computational modeling
BiGAN
biblio
Industrial and Home Automation, Control, Safety and Security System using Bolt IoT Platform
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
home computing
industrial automation
Temperature sensors
home automation
Internet of Things (IoT)
Pins
alert sub-system
Bolt IoT platform
cloud connectivity
Fasteners
Safety
Local Area Network (LAN)
machine-learning
safety systems
security subsystem
SMS
Temperature control
temperature data
temperature monitoring
security system
learning (artificial intelligence)
security of data
Cloud Computing
security
machine learning
pubcrawl
resilience
Resiliency
Internet of Things
Scalability
industrial control
control engineering computing
Industries
integrated circuits
Industrial Control Systems
production engineering computing
sensors
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
Local area networks
industrial network security heads
industrial network systems
industrialized Early Intrusion Detection System
integrated circuits
intelligent manufacturing systems
internal industrial network
Intrusion Detection
Iptables
Iptables MikroTik
industrial installations
Monitoring
network security
production engineering computing
Protocols
pubcrawl
resilience
routers
Scalability
Servers
ICS Honeypot
Resiliency
Predictive Metrics
computer network performance evaluation
computer network security
control engineering computing
cybersecurity networks
Early Detection approach
Early Intrusion Detection System
honeypots
Router Systems Security
ICS SCADA
IDS performance
IDS Snort
industrial control
industrial control facility networks
industrial control system
Industrial Control Systems
industrial EIDS
Industrial honeypot
biblio
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
risk management
miniature ICS
proactive security response
probabilistic multiattribute vulnerability criticality analysis model
production engineering computing
pubcrawl
quantitative evaluation
quantitative security metrics
resilience
Resiliency
Metrics
Scalability
Security Criticality Analysis
Security Impact Analysis
security of data
security risk assessment scheme
Vulnerability Analysis
vulnerability host components
vulnerability severities
vulnerability-based impact criticality estimation
Functional Dependency
Compositionality
control engineering computing
control uncertainties
Cyber Dependencies
cyber environments
cyber security risks
cyber threats
Cybersecurity
distributed system
attack probabilities
Human Factors
ICS networks
ICS security
impact estimation
industrial control
Industrial Control System (ICS)
Industrial Control Systems
MAVCA model
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
biblio
Aging Attacks against Electro-Mechanical Actuators from Control Signal Manipulation
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
electro-mechanical actuators
aging
aging attacks
carrier frequency
control signal manipulation
corrupted controller
digital control
Digital controller
digital controller technologies
Cavity resonators
electromechanical actuators
EMA's aging
Harmonic analysis
ICS's physical system
nonlegitimate pulse width modulation control signal
Pulse width modulation
remotely-accessibility capacity
cybersecurity threats
partial discharges
Degradation
actuator security
actuators
control engineering computing
industrial control
Cybersecurity
Metrics
composability
pubcrawl
Human behavior
Resiliency
Industrial Control Systems
security
security of data
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
Towards Industrial Security Through Real-time Analytics
Submitted by aekwall on Mon, 01/25/2021 - 12:51pm
industrial security
security of data
security hardening
security breaches
security
Resiliency
real-time analytics
real-time
pubcrawl
production engineering computing
Metrics
low data utilization
loop ICS architecture
industrial setting
actuator security
industrial control system
industrial control
industrial
ICS community
Human behavior
financial safety harms
DRIP syndrome
data rich information poor syndrome
control stations
Industrial Control Systems
composability
Cloud Computing
actuators
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »