Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial control
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Mathematical model
weighted oriented graphs
system protection analysis
Software
Servers
security of data
security
reference security models
reference security model
pubcrawl
production engineering computing
open systems
modeling of protected systems
automated systems
integrated circuits
Information services
information resources
Industrial Control Systems
industrial control
graph theory
Data protection
Cyber Attacks
critical infrastructures
critical infrastructure facilities
Control Theory
control engineering computing
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
Network Scanning and Mapping for IIoT Edge Node Device Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
pseudorandom periodic manner
Metrics
microcontroller units
microcontrollers
Monitoring
network scanning
network services
performance evaluation
predictive maintenance
MCU
pubcrawl
Resiliency
Scalability
scanning procedure
security
security of data
Servers
building block
light emitting diodes
Internet of Things
industrial networks
Industrial Internet of Things
industrial environment
industrial control
Image edge detection
IIoT edge node sensors
IIoT edge node device security
iiot
Hardware
edge device
edge detection
computer network security
composability
biblio
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Submitted by grigby1 on Fri, 05/08/2020 - 1:20pm
OPC UA
unified data model
unified communication architecture
standards
Security Requirements Modeling
security requirement communication
security of data
security
SCADA Security
Resiliency
resilience
pubcrawl
production engineering computing
Production
open platform communications
OPC UA server
composability
object oriented security
Object oriented modeling
Metrics
machine-readable data model
Internet of Things
Industries
industrial IoT security requirements
industrial infrastructures
Industrial Control Systems
industrial control system security
industrial control
Germany
fourth industrial revolution
Data models
biblio
A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
moving target defense
software-defined networking
software defined networking
Software Defined Network
security response measures
security of data
SDN
Resiliency
real-time systems
Real-time intrusion detection
pubcrawl
protection requirement analysis
Predictive Metrics
Networked Control Systems Security
closed-loop security control
IP networks
Intrusion Detection
Industrial Control Systems
industrial control system
industrial control
Anomaly Detection
ICs
dynamic cybersecurity protection method
cybersecurity protection
control systems
control engineering computing
computer security
composability
biblio
Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
industrial control system
Safety
Resiliency
pubcrawl
Protocols
production engineering computing
Predictive Metrics
power systems
power industry control system intrusion
Networked Control Systems Security
network invasion
network intrusion
Control Theory
industrial control network space security
industrial control
control systems
control engineering computing
computer network security
composability
Business
behavior characteristics analysis
attack model
attack behavior analysis
security
biblio
Cloud Based Intrusion Detection and Prevention System for Industrial Control Systems Using Software Defined Networking
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
production engineering computing
microgrid energy management system
network function virtualization
network intrusion services
network security tools
OpenDaylight software
packet inspection
power engineering computing
power grids
power system control
privacy
microgrid
pubcrawl
resilience
Resiliency
SDN controller
service function chaining
software defined networking
virtual private cloud
virtualisation
virtualization privacy
web services
Human Factors
CB-IDPS
cloud Based intrusion detection and prevention system
Cloud Computing
composability
computer network security
control engineering computing
cyber security
data privacy
energy management systems
Human behavior
Amazon Web Services
ICs
Anomaly Detection
ICS delay constraints
ICS networks
industrial control
Industrial Control Systems
intrusion detection and prevention
layer encryption
manufacturing systems
Metrics
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
Deep-Learning-Based Network Intrusion Detection for SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:28am
SCADA network protocols
industrial control
Industrial Control Systems
learning (artificial intelligence)
network intrusion detection system
network-based cyber attacks
pubcrawl
realistic SCADA traffic data sets
Resiliency
individual network packets
SCADA system operators
SCADA System Security
SCADA systems
SCADA Systems Security
site-specific network attack
specialized attacks
supervisory control and data acquisition networks
unseen network attack instances
convolutional neural network
ICs
attacks on DNP3 protocol
Compositionality
computer network security
computing nodes
conventional network attacks
conventional SCADA specific network-based attacks
convolutional neural nets
Anomaly Detection
Cyber Attack Detection
deep learning
deep-learning-based network intrusion detection system
energy-delivery systems
field devices
Human behavior
ICS network infrastructure
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »