Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
process control
biblio
Accountable Internet of Things? Outline of the IoT databox model
Submitted by grigby1 on Mon, 06/11/2018 - 2:40pm
IoT databox model
US
trust
social arrangements
Resiliency
resilience
pubcrawl
process control
network accountability
Metrics
legislation
accountability
IoT Databox
Internet of Things (IoT)
Internet of Things
Europe
data protection legislation
Data protection
Data processing
Computational modeling
composability
biblio
Design, Verification and Implementation of a Lightweight Remote Attestation Protocol for Process Control Systems
Submitted by grigby1 on Thu, 05/24/2018 - 11:22am
Remote Attestation
policy-based collaboration
privacy
process control
process control systems
program verification
protocol implementation
protocol verification
Protocols
pubcrawl
Policy
remote network infrastructures
Romania
Scyther model checking tool
secure software integrity verification scheme
security
Software
software integrity
specialized components
industrial applications
commodity-off-the-shelf hardware
commodity-off-the-shelf software
Compositionality
COTS
Cryptographic Protocols
data integrity
formal verification
gas transportation network automation
Hardware
closed process control applications
industrial communications
industrial control
isolated components
lightweight remote attestation protocol
Nickel
PCS
Phoenix-Contact industrial controller
physically secured locations
biblio
Protecting SDN controller with per-flow buffering inside OpenFlow switches
Submitted by K_Hooper on Wed, 05/09/2018 - 9:52am
software defined networking
per-flow buffering
process control
Protocols
pubcrawl
Resiliency
routers
Scalability
SDN controller
SDN security
Servers
packet-in flood
standards-compliant protocol
statistical analysis
switch flow tables
switch memory
table-miss
telecommunication control
telecommunication network routing
telecommunication switching
telecommunication traffic
working principles
DPDK
centralized controller
computer network security
control channel
control logic
control plane
control systems
data plane
denial of service
denial-of-service attacks
DoS attacks
buffer\_id feature
Floods
heavy control traffic conditions
individually buffered packets
IP networks
Monitoring
Open vSwitch
OpenFlow
OpenFlow protocol
OpenFlow switches
OpenFlow traffic
biblio
The APT detection method in SDN
Submitted by K_Hooper on Wed, 05/09/2018 - 9:51am
OpenFlow
Switches
software programming
software defined networking
SDN security
SDN controller plane
SDN
Scalability
Resiliency
pubcrawl
process control
APT
network framework
HMM
Hidden Markov models
Discrete Fourier transforms
data plane
computer network security
Computer crime
communication protocol
APT detection method
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication
biblio
FlowSNAC: Improving FlowNAC with Secure Scaling and Resiliency
Submitted by K_Hooper on Fri, 02/02/2018 - 10:05am
VNF services
secure scaling
Secure State Migration
process control
secure state transfer
security
service degradation
Load management
product life cycle management
pubcrawl
Resiliency
Monitoring
software defined networking
stateless components
traffic steering
FlowNAC
FlowSNAC
Resilient Security Architectures
resource allocation
resource allocations
resource management
life-cycle management
network function virtualization
NFV
orchestration systems
SDN
SDN/NFV management
authentication
Degradation
biblio
Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid
Submitted by grigby1 on Tue, 01/23/2018 - 2:45pm
emulation
Intrusion Detection
Power measurement
process control
pubcrawl
Scalability
scalable
Scalable Security
security
Smart Grids
Topology
Training
biblio
Statesec: Stateful monitoring for DDoS protection in software defined networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:27pm
Metrics
Statesec
stateful monitoring
Software Defined Networks
software defined networking
security threats
SDN
Resiliency
pubcrawl
process control
Ports (Computers)
network management
Monitoring
composability
IP networks
in-switch processing
Human behavior
entropy-based algorithm
distributed denial of service
DDoS protection
DDoS attack mitigation
DDoS attack detection
control systems
computer network security
Computer crime
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 10:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
biblio
A contribution to cyber-security of networked control systems: An event-based control approach
Submitted by grigby1 on Wed, 12/20/2017 - 12:00pm
control system synthesis
signal processing security
three-tank system
residual generator
process control
Observers
nonlinear control systems
networked control systems
NCS
linear matrix inequalities
FTD
fault tolerant detection
fault tolerant control
event-based control approach
Cyber-security
security
control design
BMI
bilinear systems
bilinear matrix inequality
attack/fault detection
Mathematical model
sensors
composability
privacy
Resiliency
pubcrawl
Metrics
Controller Synthesis
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »