Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
process control
biblio
Wireless Routing and Control: A Cyber-physical Case Study
Submitted by grigby1 on Fri, 05/19/2017 - 2:22pm
control
cps resiliency
cyber-physical system
process control
pubcrawl
Resiliency
Routing
wireless sensor-actuator network
biblio
Research and practice on Aluminum Industry 4.0
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
pubcrawl170112
intelligent decision technology
Internet of Things
IoT sensing system
Management
model system
model-driven analysis
process control
Production
production engineering computing
Industry 4.0
real-time systems
securitization intelligent control
security of data
sensors
six-layer aluminum industry 4.0 architecture
standardization
supply chain management
visual monitoring
Cloud Computing
aluminium industry
aluminum electrolytic industry
aluminum industry
aluminum production
architecture
backtracking process
Big Data
big data driven analysis
accurate perception
control engineering computing
data management
Data models
Decision Making
Decision support systems
full lifecycle supply chain management
industrial cloud platform
Industries
biblio
Evaluating the complexity and impacts of attacks on cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
estimation theory
time-to-shutdown
Sensor phenomena and characterization
security risks
security of data
security attributes
quantitative security evaluation
pubcrawl170108
pubcrawl170107
process control
probability
modeling
graph theory
actuators
cyber-to-physical attack
cyber-to-cyber attack
cyber-physical systems
cyber-physical system security
cross-domain attack
CPS
consequence estimation process
Computer crime
attack probability
attack graph
attack consequences
biblio
"SRSC: SDN-based routing scheme for CCN"
Submitted by grigby1 on Tue, 02/21/2017 - 12:04pm
Protocols
Topology
telecommunication network routing
SRSC
software-defined networking
software defined networking
SDN-based routing scheme
scalable routing scheme
Routing
pubcrawl170103
CCN
process control
Peer-to-peer computing
NS-3 simulator
network topology
IP networks
Internet traffic
internet
content centric network
clean-slate approach
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 12:32pm
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
biblio
Countermeasures to Enhance Cyber-physical System Security and Safety
Submitted by BrandonB on Tue, 05/05/2015 - 10:21am
deception attack detection
smart sensors
security of data
security
safety instrumented systems
Safety
Robot sensing systems
process control
ISA-84
intelligent checkers
intelligent checker
integrated circuits
IC
fault diagnosis
anomaly detection technique
data integrity
cyber-physical systems
cyber-physical system security
cyber-physical system safety
cyber-attacks
cross-correlator
CPS security countermeasures
CPS safety protection layers
CPS safety integrity level
CPS failure mitigation
CPS failure detection
catastrophic failures
biblio
Cross-layer security framework for smart grid: Physical security layer
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
physical layer security
Trojan horses
smart power grids
smart power grid cyber technology
Smart Grids
smart grid security
Smart Grid
process control system
Process Control Security
process control
predictive control
power system security
physical security layer
conceptual layering model
PCS
Monitoring
isolated security tool
Hidden Markov models
hardware Trojan threat
Hardware
CyNetPhy PSL resolution
cross-layer security framework
Cross-Layer Security
cooperative real-time security system
control systems
« first
‹ previous
…
8
9
10
11
12
13
14
15
16