Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
protection systems
biblio
Development of a Cyber-Resilient Line Current Differential Relay
Submitted by grigby1 on Fri, 09/18/2020 - 1:08pm
power system relaying
cyber-security concerns
digital communication channels
false line tripping
FDIA
LCDR
LCDR's trip command
line current differential relays (LCDRs)
line terminals
measured superimposed voltages
positive-sequence
cyber-resilient line current differential relay
power transmission faults
protected line
protection systems
remote current measurement
superimposed voltage
Transmission line measurements
transmission line protection
two-terminal lines
command injection attacks
Metrics
Cyber-security
pubcrawl
resilience
Resiliency
Circuit faults
power engineering computing
power system security
composability
computer security
cyber-physical systems
security of data
power transmission lines
power transmission protection
Voltage measurement
false data injection attacks
Global Positioning System
Relays
Current measurement
relay protection
coordinated attacks
biblio
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data
Submitted by grigby1 on Wed, 03/06/2019 - 3:25pm
learning (artificial intelligence)
synthetic minority oversampling technique
SMOTE
Resiliency
resilience
pure detection model
pubcrawl
protection systems
pattern classification
noisy data
networked systems
malicious HTML file prediction
malicious HTML file classification
machine learning
Autonomic Security
Intrusion Detection
Hypertext systems
hypermedia markup languages
feature selection technique
feature extraction
Decision trees
data quality
cybersecurity challenges
computer security
computer network security
composability
class imbalance
Browsers
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 1:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 9:32am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Tue, 05/05/2015 - 9:51am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions