Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IT systems
biblio
Hybrid Feature Extraction for Palmprint-Based User Authentication
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Metrics
user identity verification
texture
Smartphones
smart phones
security
Resiliency
resilience
pubcrawl
palmprint-based user authentication
palmprint recognition
multifactor authentication
mobile verification scenarios
Mobile handsets
mobile computing
authentication
IT systems
image texture
image colour analysis
hybrid feature extraction
Human Factors
Human behavior
Histograms
feature extraction
Discrete Fourier transforms
Databases
color information
biometry
authorisation
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
Defending IT Systems against Intelligent Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:02pm
privacy
malware binaries
malware classification
malware detection
malware families
malware images
malware variants
Metrics
neural nets
Malware Analysis
pubcrawl
resilience
Resiliency
Signatures
static analysis
Training
unsupervised deep neural networks
adversarial examples
malware
machine learning algorithms
machine learning
learning (artificial intelligence)
IT systems
invasive software
intelligent malware
Human behavior
generative adversarial networks
generative adversarial network
Gallium nitride
dynamic analysis
Classification algorithms
ART
Antivirus Software vendors
biblio
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology for IT Systems
Submitted by grigby1 on Tue, 02/06/2018 - 12:44pm
pubcrawl
Vulnerability Management
Vulnerability
system risk assessments
standards
security of data
Scalability
risk views
risk metrics values
risk metrics
risk management frameworks
risk management
risk assessment
Resiliency
quantitative CVSS
attack graphs
probability
Organizations
Metrics
Measurement
IT systems
high level risk metrics
graph theory
detailed risk assessment
cyber threats
cyber security risks
cyber security risk assessment methodology
computer security
big data security metrics
biblio
Security games on infrastructure networks
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
pubcrawl
Investment
IT systems
Load modeling
Metrics
network security game
networked control systems
node disruptions
optimal attack plans
Policy-Governed Secure Collaboration
interdiction problem
Resiliency
resource allocation
robust control models
Scalability
Science of Security
security
security of data
strategic edge disruptions
distribution networks
collaboration
communication failures
Communication networks
composability
controller-disturbance interaction
cyber-physical security
cyber-physical systems
cyber-security modelling
Density estimation robust algorithm
attacker-defender interactions
game theory
game theory methods
Games
Human behavior
Human Factors
infrastructure networks
Inspection
interdependent security game
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 11:32am
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats