Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security monitoring
biblio
An Integrated Safety Management System Based on Ubiquitous Internet of Things in Electricity for Smart Pumped-storage Power Stations
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
pumped-storage power stations
data transmission layer
emergency broadcasting
fall protection module
geological warning module
Integrated
integrated safety management system
ISMS
personnel location module
data processing layer
Safety management
security monitoring module
smart pumped-storage power station
smart pumped-storage power stations
ubiquitous Internet of Things
ubiquitous internet of things in electricity
unified information platform
Ubiquitous Computing Security
Safety
Scalability
Servers
Access Control
Internet of Things
Resiliency
pubcrawl
Metrics
power engineering computing
Monitoring
Human Factors
security monitoring
Personnel
central control module
communication module
data acquisition layer
data display layer
data manipulation layer
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
biblio
Determination of Security Threat Classes on the Basis of Vulnerability Analysis for Automated Countermeasure Selection
Submitted by aekwall on Mon, 08/26/2019 - 10:08am
security threats
Data mining
Vulnerability Analysis
Metrics
policy-based governance
pubcrawl
Human behavior
resilience
security monitoring
open security data sources
data classification
Automated countermeasure selection
security weaknesses
biblio
Towards Security-Aware Virtual Environments for Digital Twins
Submitted by grigby1 on Thu, 05/09/2019 - 10:45am
automation ml
cyber-physical systems
digital twin
Industrial Control Systems
pubcrawl
resilience
Resiliency
Scalability
scalable
security monitoring
simulation
biblio
Enhancement of probabilistic attack graphs for accurate cyber security monitoring
Submitted by grigby1 on Wed, 09/05/2018 - 10:41am
security assessment
vulnerability scoring
probabilistic attack graphs
cyber security monitoring
computer security incidents
Bayesian methods
automatic countermeasure selection
attack response
attack probability
attack models
attack graph nodes
attack graph generation
attack actions
Computing Theory
security
security monitoring
Metrics
Indexes
Computational modeling
computer networks
Bayes methods
Monitoring
Software
security of data
attack graph
pubcrawl
graph theory
Security Metrics
biblio
Behavior Analysis for Safety and Security in Automotive Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
Human Factors
security of data
security monitoring
security modeling and simulation
security
Safety
Resiliency
pubcrawl
process discovery
predictive security analysis
Petri nets
Metrics
Internet of Vehicles
Analytical models
Human behavior
global security operations
cyber physical systems
connected car
Computational modeling
complex event processing
behavior analysis
automotive systems
automotive security
Automotive engineering
automobiles
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance
biblio
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
CyberSA
timing
system-on-chip
SoC
security of data
security monitoring
risk management
pubcrawl170109
Monitoring
Log Source
information and communications technology
ICT systems
HMG protective monitoring controls
Her Majestys Government
government data processing
analysis
cyber situational awareness
cyber security operations centre
Cyber Incident Response
cyber defense strategy support
CSOC Strategy
CSOC framework
CSOC Benefits & Challenges
CSOC
Correlation
Computer crime
business protection
business control
Business
biblio
Synchrophasor Data Baselining and Mining for Online Monitoring of Dynamic Security Limits
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
security monitoring
power system reliability
power system security
power system stability
power transfer measurement
random forest (RF)
SBSA
SCADA measurements
SCADA systems
seasonal security margins
security
power engineering computing
Stability criteria
synchrophasor
synchrophasor data baselining
synchrophasor-based situational awareness
system interfaces
system reliability
system stress
system visibility
Table lookup
network backbone buses
Baselining
clustering
critical interfaces
Data mining
dynamic security assessment (DSA)
dynamic security limits
look-up tables
medoid clustering
Monitoring
angle shifts
nomograms
online monitoring
PAM clustering
partitioning around medoids (PAM)
pattern clustering
phase-angle differences
phasor measurement
phasor measurement unit (PMU)
Phasor measurement units
biblio
Monitoring Security Compliance of Critical Processes
Submitted by BrandonB on Tue, 05/05/2015 - 10:20am
predictive security analysis
security policies
security monitoring
security modeling and simulation
security information and event management
security compliance
security
Runtime
process-aware information systems
process specifications
process behavior model
process behavior analysis
automata
Predictive models
power system security
operational formal models
Monitoring
model-based support
hydroelectric power stations
hydroelectric power plant
critical processes
critical infrastructures
Computational modeling
Business
« first
‹ previous
1
2