Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyberattacks
biblio
Cyber Security Challenges in Distributed Energy Resources for Smart Cities
Submitted by grigby1 on Fri, 01/20/2023 - 2:46pm
smart grid consumer privacy
collaboration
cyber security
cyberattacks
distributed energy resources
distributed power generation
energy management systems
Fault tolerant systems
maintenance engineering
Policy Based Governance
privacy
pubcrawl
security
smart cities
Smart Grids
biblio
On the Security of Cyber-Physical Systems Against Stochastic Cyber-Attacks Models
Submitted by grigby1 on Thu, 10/20/2022 - 2:36pm
cyber physical systems
Poisson distribution
Negative Binomial(NB) distribution
Medical instruments
Stochastic Process
mechatronics
Resiliency
cyberattacks
Stochastic Computing Security
pubcrawl
Probability distribution
Systematics
system security
sensors
Stochastic processes
Computational modeling
Scalability
resilience
biblio
A Novel Ensemble Machine Learning Method to Detect Phishing Attack
Submitted by grigby1 on Thu, 10/13/2022 - 11:16am
feature extraction
machine learning
Support vector machines
pubcrawl
Human behavior
Radio frequency
Phishing
Electronic mail
random forests
cyberattacks
Phishing Detection
machine learning classifiers
Phishing URLs
Web Threat
biblio
Towards a Secured Blockchain-based Smart Grid
Submitted by grigby1 on Tue, 03/22/2022 - 12:51pm
security
blockchain
pubcrawl
resilience
Resiliency
Conferences
Scalability
cyberattacks
Smart Grid
Smart Grids
Metrics
smart grid security
data integrity
cyberattack
merging
biblio
Simulation of the Effect of False Data Injection Attacks on SCADA using PSCAD/EMTDC
Submitted by grigby1 on Mon, 03/14/2022 - 11:37am
Power system dynamics
transient simulation
Transient analysis
Steady-state
SCADA Systems Security
sampling frequency
Resiliency
resilience
pubcrawl
Compositionality
power grids
polling
Human behavior
frequency estimation
Data models
cyberattacks
Computer crime
biblio
Securing Energy Networks: Blockchain and Accounting Systems
Submitted by aekwall on Tue, 03/01/2022 - 3:31pm
Metrics
Triple Entry Accounting
Scandals and Fraud
risk management
Resiliency
Reliability
pubcrawl
Networks and Security
network accountability
blockchain
Focusing
distributed ledger
cyberattacks
computer network reliability
Computer crime
computer architecture
composability
blockchains
biblio
Cyber Resiliency in the Context of Cloud Computing Through Cyber Risk Assessment
Submitted by aekwall on Fri, 02/04/2022 - 9:34am
Cloud Computing
pubcrawl
risk management
resilience
Redundancy
Buildings
Companies
data analysis
Load management
Resiliency
cyberattacks
resilient cybersecurity cloud
biblio
A Situation Calculus based approach to Cognitive Modelling for Responding to IoT Cyberattacks
Submitted by grigby1 on Tue, 01/25/2022 - 4:03pm
smart cities
Automated Response Actions
situation calculus
Intrusion Response
epistemic logic
Dynamic Logic
Cognitive Model
cyberattacks
Economics
Technological innovation
Internet of Things
real-time systems
home automation
composability
Cybersecurity
Biological system modeling
Resiliency
resilience
pubcrawl
critical infrastructure
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 1:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
1
2
3
next ›
last »