Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
process control
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 10:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
High Speed Parallel RC4 Key Searching Brute Force Attack Based on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 2:36pm
Hardware
Xilinx XC3S1600E-4 FPGA device
stream cipher
RC4 algorithm
RC4
random-access storage
pubcrawl
process control
policy-based governance
on-chip BRAM
main controller
key searching unit
key searching speed
Human Factors
High Speed Parallel RC4 Key Searching Brute Force Attack
block RAM
frequency 128 MHz
FPGA
forecast keying methods
Force
field programmable gate arrays
field programmable gate array
encryption
Cryptography
Clocks
clock rate
Ciphers
brute force attacks
Brute force
biblio
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Mathematical model
traditional network active security threat model
security
Safety
pubcrawl
process control
offensive differential game
network security threat
network security target
network attack and defense
network active security threat process
attack defense differential equation
Information systems
Games
Differential Games
Differential game
differential equations
defensive differential game
defense differential game theory
Control Theory
computer network security
Communication networks
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 10:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Multiple Fault Diagnosis for Sucker Rod Pumping Systems Based on Matter Element Analysis with F-statistics
Submitted by aekwall on Mon, 05/18/2020 - 9:49am
Metrics
sucker rod pumping wells
sucker rod pumping systems
Statistics
rods (structures)
Resiliency
pumps
pubcrawl
process control
Petroleum
oilfield production
oil technology
Multiple Faults
multiple fault diagnosis
cyber physical systems
matter-element analysis
matter element analysis
Knowledge Discovery
Human Factors
fuzzy systems
faults classification
fault diagnosis problem
fault diagnosis
F-statistics
dynamometers
dynamometer cards
down-hole working conditions
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 11:01am
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
Using GRU neural network for cyber-attack detection in automated process control systems
Submitted by grigby1 on Fri, 05/08/2020 - 1:44pm
neural nets
Neural Network Security
operating parameters
multivariate time series
information security breaches
GRU-neural network training
forecasting theory
forecasting multivariate time series
end system devices
cyber-attack detection
automated process control systems
APCS
Time series analysis
forecasting
Metrics
security of data
deep learning
production engineering computing
process control
water treatment
control engineering computing
collaboration
policy-based governance
pubcrawl
time series
Neural networks
Anomaly Detection
security
Training
biblio
Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
edge computing
Human Factors
Pervasive Computing Security
wide area network
process modules
process control
platform controller
IoT platform
edge nodes
distributed processing
data-processing flows
container-based virtualization technology
container technology
encryption
Containers
IoT
Human behavior
resilience
Resiliency
Metrics
pubcrawl
Virtualization
virtualisation
Scalability
computer network security
Internet of Things
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »