Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attack
biblio
Blockchain as a Platform for Secure Cloud Computing Services
Submitted by grigby1 on Tue, 04/27/2021 - 12:24pm
computer architecture
Cloud Computing
pubcrawl
Human behavior
Metrics
resilience
Resiliency
privacy
composability
contracts
smart contract
Blockchain as a Platform
cyber-attack
secure cloud computing
Secure File Sharing
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
power systems infrastructures
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
Critical Infrastructure Protection
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
power system faults
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
security of data
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
biblio
A cyber physical power system co-simulation platform
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
power engineering computing
Voltage control
Synchronization
smart power grids
simulations
simulation
Routing protocols
Resiliency
resilience
real-time systems
pubcrawl
power system stability
power system simulation
power system security
power system control
Power Grid
automatic voltage control
Metrics
information and communication technology
hardware-in-the-loop simulation function
Hardware-in-the-loop (HIL)
hardware-in-the loop simulation
denial-of-service attack
cyber-attack
Cyber Physical System (CPS)
Cyber Physical System
cyber physical power system co-simulation platform
CPS modeling
control engineering computing
composability
closed loop systems
AVC
biblio
N-1 RTU Cyber-Physical Security Assessment Using State Estimation
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
state estimation
Damage Assessment
synthetic 200-bus system
power system devices
observability analysis
N-1 RTU cyber-physical security assessment
IEEE 14-bus system
EMS applications
electrical substations
Cyber-physical security assessment
cyber-physical impact
Remote Terminal Units
control center
state estimator
Denial-of-Service
security of data
substation automation
supervisory control and data acquisition system
private networks
SCADA system
power system control
power system state estimation
energy management systems
power system security
cyber-attacks
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
cyber-attack
biblio
Cyber KPI for Return on Security Investment
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
cyber-attacks
security of data
Security Metrics
security investment
RoSI
ROI
Return on Security Investment
return on investment
pubcrawl
Metrics
cyber dashboard
cyber-attack
cyber subject matter experts
cyber security return
cyber security reports
cyber security incident
cyber security benefits
cyber security
cyber KPI
cyber incidents
biblio
Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
cyber threats
Security Audits
threat profiling
feature extraction and selection
cybersecurity audit execution
cybersecurity audit
complicated cyber landscapes
aggressive cyber landscape
auditing
security of data
Scalability
cyber-attacks
pubcrawl
Human behavior
Resiliency
Feature Selection
feature extraction
cyber-attack
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 12:05pm
data loss
Smart Grid Sensors
Wireless Communication Network (WCN)
WCN
Smart Sensor
smart grid wireless network
smart grid communication network
nearby nodes
Internet Protocol address
Internet Protocol (IP)
higher degree nodes
grid power flow
graph theory approach wireless communication network
fuzzy rules
fuzzy logic approach
extreme IP
security of data
cyber intrusion
cyber-attack
Compositionality
Human Factors
radio networks
power system security
power engineering computing
Smart Grid
Fuzzy logic
smart power grids
graph theory
pubcrawl
Resiliency
smart devices
IP networks
biblio
Advanced Petya Ransomware and Mitigation Strategies
Submitted by aekwall on Mon, 10/07/2019 - 11:43am
encryption
Resiliency
ransomware attack
Ransomware
pubcrawl
Petya ransomware
Organizations
Mitigations
Metrics
invasive software
heavy ransom
encryption codes
Advance Petya ransomware
Electronic mail
Cyber-security
cyber-attack
cyber world
cyber threats
cyber era
Cryptography
Computer crime
composability
anti-virus detection
biblio
Vulnerability analysis of power systems based on cyber-attack and defense models
Submitted by willirn1 on Thu, 05/30/2019 - 4:34pm
defender modeling
resilience
RTUs
Smart Grid
SCADA
Cascading Failures
blackouts
Monitoring
Power system protection
power system faults
power transmission lines
Load modeling
Substations
game theory
Attacker Modeling
game-theoretic approach
defense models
Vulnerability Analysis
cyber-attack
system operators
power systems
security of data
power system security
Vanderbilt
power engineering computing
biblio
Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems
Submitted by aekwall on Mon, 03/04/2019 - 10:47am
hardware-in-the-loop
Wide Area Monitoring Protection and Control
wide area monitoring
WAMPAC systems
Substations
substation
smart power grids
Smart Grids
Protection and Control systems
power system forensics
power system analysis computing
PMUs
Phasor measurement units
knowledge based systems
knowledge base
human-in-the-loop security center paradigm
hardware-in-the loop simulation
forensic investigations
Forensic Artifacts
Evidence
authentication
attack-based digital forensic evidences
Digital Forensics
attribution
Metrics
composability
pubcrawl
Human behavior
cyber-attack
Monitoring
« first
‹ previous
1
2
3
4
next ›
last »