Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control systems
biblio
Security Evaluation Methodology for Software Defined Network Solutions
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
SDN architecture
software-defined networking
software defined networking
software defined network solutions
security-related features
security evaluation methodology
Security Evaluation
security controls
security assessment
SDN solutions
SDN security
SDN controllers
SDN choice
authentication
Scalability
Resiliency
resilience
pubcrawl
Organizations
Object recognition
NIST 800-53
Cryptography
control systems
computer networking
computer network security
comprehensive methodology
biblio
Incremental Abstraction for Diagnosability Verification of Modular Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
fault diagnosis
uncertain loops
simple detector automata
scalable production system
polynomial complexity
parallel lines
nonblocking
Modular systems
modular system
incremental abstraction
forbidden loops
Discrete-Event Systems
diagnosability verification
diagnosability
abstraction
scalable verification
Detectors
verification
formal verification
Compositionality
Predictive Metrics
Production systems
Scalability
automata
Complexity theory
computational complexity
control systems
feedback
Synchronization
pubcrawl
Resiliency
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
network topology
WEKA
threat vectors
Support vector machines
support vector machine
software defined networking
security threat protection
SDN network
SDN
random forests
Random Forest
pubcrawl
privacy
Computer crime
nearest neighbour methods
Metrics
Measurement
machine learning
k-nearest neighbors
J48
Floods
distributed denial-of-service attack
DDoS attack detection
DDoS
control systems
computer network security
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Software-defined networking (SDN)
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
ongoing attacks
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
Internet connectivity
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Anomaly Detection
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
biblio
An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
optimisation
time-varying systems
time-varying system matrices
time-varying dynamics
system parameters
system estimation performance
sensors
Scalability
Resiliency
resilience
pubcrawl
actuators
optimal design
moving target defense
Metrics
matrix algebra
integrity attacks
control system security
control systems
Attack detection
adaptive attack strategy
biblio
Enhanced Uptime and Firmware Cybersecurity for Grid-Connected Power Electronics
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
hardware-assisted monitor
distributed energy resource prototype
embedded Linux
encrypted serial communication
firmware cybersecurity
firmware integrity
firmware run-time integrity security
firmware run-time security feature
firmware updating
Grid Security
grid-connected power electronics
digital signal processors
Heart beat
multi-mission controls
operational technology security
power electronics security
power electronics uptime
power flow
run-time security
security techniques
uptime
firmware
Monitoring
Hardware
security
Linux
Resiliency
pubcrawl
composability
Metrics
Cybersecurity
privacy
security of data
power engineering computing
power system security
control systems
power grids
signal processing security
digital signal processing chips
Microprogramming
power electronics
security features
biblio
Industrial Control Systems (Ics) Security in Power Transmission Network
Submitted by grigby1 on Tue, 01/21/2020 - 12:15pm
Organizations
supervisory control and data acquisition
Scalability
SCADA
Resiliency
resilience
pubcrawl
power transmission network
power transmission control
power system security
power stations
power grids
power distribution grids
power distribution control
Industrial Control Systems Anomaly Detection
IT security
integrated circuits
industrials plants
Industrial Control Systems
industrial control system security
industrial control
ICS security
ICs
Firewalls (computing)
firewall
Cybersecurity
control systems
biblio
Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
internet
tamper detection observer
slave-to-master paths
slave sides
slave robots
security of data
secure interactive networked control systems
robots
Resiliency
resilience
pubcrawl
position control
networked control systems
mitigation method
master-to-slave paths
Acceleration
Human behavior
Force
false data injection attacks
False Data Detection
delays
Delay effects
Cybersecurity
cyber physical systems
control systems
control engineering computing
composability
Communication channels
bilateral teleoperation systems
biblio
DDoS Prevention Using D-PID
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
Heuristic algorithms
telecommunication network routing
Static Path Identifiers
Servers
Routing
Resiliency
resilience
pubcrawl
PIDs
Metrics
internet
inter-domain routing component
Inter-domain routing
inter-domain path connector
Human behavior
attacks
Floods
Dynamic Path Identifiers
distributed denial of service attack
DDoS prevention
DDoS Attacks
DDoS Attack Prevention
DDoS
D-PIDs
D-PID usage
control systems
Conferences
computer network security
Computer crime
composability
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »