Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial control
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
pubcrawl
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
industrial control system
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
dynamic security control architecture
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
composability
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
biblio
Intrusion Detection of Industrial Control System Based on Stacked Auto-Encoder
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
multiclassification support vector machine
Training
Support vector machines
stacked auto-encoder
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
pattern classification
neural nets
network data feature extraction
Analytical models
Multi-classification support vector machine
intrusion detection model
Intrusion Detection
Internet technologies
industrial production
Industrial Control Systems
industrial control system
industrial control
ICs
feature extraction
Data models
Anomaly Detection
biblio
Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
distributive nature
autonomous systems
CPS
security aspects
sensitive data
Intelligent systems
control methods
critical applications
cyber physical system applications
security issues
eHealth
innovative technologies
IoT related issues
taxonomy analysis
taxonomy based analysis
vehicular technologies
CPS Privacy
privacy
computer network security
Monitoring
data privacy
privacy concerns
Internet of Things
security
Human behavior
pubcrawl
security of data
cyber physical systems
Smart Grid
Smart Grids
sensors
Human Factors
industrial control
taxonomy
biblio
Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
early attack detection
regression analysis
network traffic data
false data injection attacks
Data Exfiltration
Informatics
cyber-attack detection
data diodes
data-driven monitoring
defense-in-depth
cyber attack
host system data
Industrial Control System (ICS)
intrusion detection results
motivated attackers
multiple-layer data-driven cyber-attack detection system
physical system
physically impactful cyber attacks
command injection attacks
integrated circuits
cyber-physical systems
pubcrawl
resilience
Resiliency
computer network security
Analytical models
Data models
industrial control
Monitoring
Industrial Control Systems
network data
composability
DoS attacks
computer security
malware
Metrics
cyber threats
biblio
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS)
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
pubcrawl
Zero-day attacks
Terms Industrial Control Systems
Support vector machines
signal sampling technique
signal sampling
Sensory Channels
sensory channel
security of data
Resiliency
resilience
Anomaly Detection
Metrics
intrusion detection system
Industrial Control Systems
industrial control
IDS framework
feature extraction
control command injection attacks
composability
command injection attacks
biblio
ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems
Submitted by grigby1 on Fri, 08/28/2020 - 2:54pm
pubcrawl
system architecture
subject matter experts
standards practices
simulation engine
security of data
security guidelines
Scalability
Resilience Metrics
resilience
R4 resilience framework
Qualitative Tool
qualitative simulation tool
Resilient Security Architectures
production engineering computing
Industrial Control Systems
industrial control
ICS-CRAT
cyber resilience metrics
cyber resilience assessment tool
cyber resilience
Critical Service Functionality
control engineering computing
Computer simulation
big data security metrics
Resiliency
biblio
Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
cognition
Autonomic Security
strong relevant logic
reasoning method
industrial control network security analysis
Industrial control network
forward reasoning
formal logic
industrial control network system
inference mechanisms
industrial control
computer network security
Security analysis
Communication networks
computer security
decision-making
Decision Making
Production
composability
pubcrawl
Resiliency
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
Identification of Critical-Attacks Set in an Attack-Graph
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
Industrial Control Systems
water treatment cyber-physical system
water treatment
system-level security property
system vulnerabilities
strongly-connected-components
security administrators
SCC
Min Label-Cut
critical-attacks set
complex attacks scenarios
attack-paths
attack-graph
advanced multifaceted attacks
attack graphs
attack scenarios
security of data
attack graph
Predictive Metrics
security measurements
control engineering computing
industrial control
system security
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
security
Internet of Things
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »