Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network attacks
biblio
Research on the Destructive Capability Metrics of Common Network Attacks
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
improved AHP judgment matrix
security
Scalability
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
network index data
network attacks
network attack metrics system
Metric System
matrix algebra
Indexes
improved network metric data
Computing Theory
destructive capability metrics
destructive capability
computer network security
Communication networks
common network attacks
common attack Smurf
big data security metrics
attack type-attack attribute-attack atomic operation-attack metrics
Atomic measurements
Atomic layer deposition
analytic hierarchy process
AHP algorithm
Security Metrics
biblio
Continuous and Adaptive Learning over Big Streaming Data for Network Security
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
learning setup
telecommunication traffic
Stream Machine Learning
security
Scalability
Resiliency
resilience
pubcrawl
off-the-shelf stream learning approaches
network traffic monitoring
network security
network attacks
microsoft windows
Metrics
machine learning algorithms
machine learning
Adaptation models
learning model
learning (artificial intelligence)
Dynamic Networks and Security
Data models
continual learning
computer network security
composability
big-data
big streaming data
big data security in the cloud
Big Data analytics platform
Big Data
analysis tasks
adaptive learning models
adaptive learning
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
computer centres
System recovery
supervisory control
Spire
sophisticated network-level attacks
simultaneous intrusions
SCADA system management
power grid infrastructure
network-attack-resilient intrusion-tolerant SCADA
nation-state-level attackers
data acquisition systems
control centers
network attack
data centers
intrusion tolerance
Power Grid
security of data
resilience
power system reliability
fault tolerant computing
power grids
Substations
network attacks
composability
pubcrawl
Resiliency
SCADA systems
SCADA
Protocols
distributed processing
Monitoring
computer network security
biblio
Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
Monitoring
tools
telecommunication traffic
sensitive information
security mechanisms
security
Scalability
resource limitations
Resiliency
resilience
Protocols
privacy
network intrusion detection
network attacks
signature based defense
IP networks
IP flow properties
IoT devices
IoT communications
Intrusion Detection Systems
Intrusion Detection
Internet of Things
internet
flow monitoring
defense mechanisms
computer network security
attack signature
pubcrawl
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 12:05pm
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
SDN switch
network security
normal forwarding method
policy-based governance
Protocols
pubcrawl
resilience
Resiliency
SDN controller
network attacks
SDN-Ti prototype
Servers
Software Defined Network
software defined networking
stateless address autoconfiguration protocol
Switches
telecommunication traffic
trusted ID-encoded address
IPv6 address assignment scenarios
attacker traceback
authentication
collaboration
composability
computer network security
Cryptography
internet
IP networks
attack incident
IPv6 addresses
IPv6 networks
ipv6 security
IPv6 testbed
Metrics
network accountability
network administrator
biblio
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance
Submitted by grigby1 on Tue, 01/21/2020 - 11:32am
mission impact graph
security of data
security countermeasures
Scalability
Resiliency
resilience
ranking algorithm
pubcrawl
policy-based governance
network attacks
collaboration
mission impact assessment
Mission Assurance
Metrics
Information Assurance
Human behavior
graph theory
cyber space threat
Cyber Attacks
composability
biblio
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
information security
actuator security
Time series analysis
multidimensional time series values prediction
multidimensional time series
information security breaches detection
distributed control systems
distributed control
data prediction
control system security
actuator data
time series
Kernel
control engineering computing
sensor data
process control
network attacks
convolutional neural networks
Training
Metrics
composability
pubcrawl
Human behavior
Resiliency
biblio
Edmund: Entropy Based Attack Detection and Mitigation Engine Using Netflow Data
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
Human behavior
pubcrawl
composability
Metrics
Entropy
network attacks
resilience
Attack Detection and Mitigation
Malicious Flows
DDoS attack mitigation
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
« first
‹ previous
1
2
3
4
next ›
last »