Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyberattack
biblio
Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange
Submitted by grigby1 on Wed, 05/05/2021 - 12:22pm
blockchain
compromised nodes
cyberattack
features
intrusion detection system
latency
pubcrawl
Salability
Scalability
Scalable Security
security
biblio
Reverse Engineering and Backdooring Router Firmwares
Submitted by aekwall on Mon, 05/03/2021 - 1:10pm
cyberattack
Program processors
Resiliency
pubcrawl
Wireless fidelity
Predictive Metrics
Microprogramming
Backdoors
reverse engineering
firmware backdoor
firmware reverse engineering
wireless router hacking
Router Systems Security
biblio
Information security risk assessment based on decomposition probability via Bayesian Network
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Measurement
web security
Urban areas
security
risk management
risk assessment
Resiliency
pubcrawl
probability of cyberattacks
belief networks
IT security
Information systems
information security
Cybersecurity
cyberattack
cyber-physical systems
computer security
biblio
Assessment of Machine Learning Techniques for Building an Efficient IDS
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
telecommunication traffic
realistic background traffic
IDS dataset
efficient IDS
complex environments
CICIDS2017 dataset
denial-of-service attack
cyberattack
IDS
resilience
Buildings
Cyber Attacks
DDoS Attacks
learning (artificial intelligence)
real-time systems
composability
machine learning techniques
telecommunication security
computer network security
Resiliency
pubcrawl
Intrusion Detection Systems
Intrusion Detection
security
machine learning
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
resilience
information-centric cyberattack analysis
intelligence exploitation
internet
markov chain
Measurement
Metrics
networks
policy-based governance
pubcrawl
information security
Resiliency
Scalability
situational awareness
spatiotemporal dynamic graphs
spatiotemporal networks
Spatiotemporal phenomena
statistically-characterized dynamic graphs
system vulnerabilities
tools
cybersecurity capabilities
composability
computer network security
CPS
CPS resilience
cyber threat
cyber-physical systems
cyberattack
cyberattack resilience
Cybersecurity
collaboration
cybersecurity risks
data quality
Entropy
entropy-centric algorithm
graphs
Heuristic algorithms
Human behavior
Information Assurance
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
Predictive Metrics
wireless dynamic networks
self-regulation
network reconfiguration
network games
game theory approach
dynamic network infrastructure
cyber attacks protection
computer attacks
adaptive reconfiguration
game-theoretic approach
game theoretic security
Nash Equilibrium
Biological system modeling
cyberattack
Human Factors
Games
network structure
Measurement
Mathematical model
Wireless communication
pubcrawl
Resiliency
information security
game theory
Scalability
security of data
biblio
A Resilient Control Against Time-Delay Switch and Denial of Service Cyber Attacks on Load Frequency Control of Distributed Power Systems
Submitted by grigby1 on Mon, 03/15/2021 - 1:09pm
power generating stations
time-delay switch cyber attack
telemetry
telemetered control commands
TDS cyber attack
sensors
sensing loops
security of data
resilient TDS control
Resiliency
resilience
pubcrawl
power system stability
power system security
power system control
centralized controller
Metrics
locally generated feedback control laws
load regulation
load frequency control
frequency control
feedback
false data injection cyber attacks
distributed power systems
delays
Delay effects
cyberattack
control signals
composability
command injection attacks
biblio
An Automatic Detection and Analysis of the Bitcoin Generator Scam
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
financial data processing
Web page
USD
security
search engines
scam instances
scam analysis
Scalability
pubcrawl
internet
Human behavior
generic system
Generators
free bitcoins
fraud detection
automatic detection
Data mining
cyberattack
Cryptography
cryptocurrency
cryptocurrencies
Crawlers
Computer crime
blockchain analysis
blockchain
bitcoin-based scam monitoring systems
bitcoin generator scam
bitcoin addresses
bitcoin
BGS
biblio
Is Cryptojacking Dead After Coinhive Shutdown?
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
cryptocurrency
victims
malicious scripts
legal mining service
legal mining scripts
in-browser mining activities
in-browser mining
cryptojacking dead
cryptocurrency mining
coinhive shutdown
coinhive scripts
cryptomining
cryptojacking
Data mining
cyberattack
malicious script
Web sites
online front-ends
Computer crime
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
Human Factors
Task Analysis
Scalability
Resiliency
pubcrawl
Predictive Metrics
optimization
operability
Open Source Software
mission impact propagation graph
mission impact
Metrics
logical attack graph
Computing Theory
cyberattack
cyber-physical systems
Cyber Dependencies
CPS Modeling and Simulation
Control Theory
Computing Theory and Resilience
Computer crime
Computational modeling
Compositionality
composability
Artificial Neural Networks
resilience
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »