Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyberattack
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
denial-of-service attack
mode-switching DoS attacks
k-connected graph
k-connected communication topology
DoS attack modes
distributed secure control
distributed event-triggered controller
distributed controller independent
distributed control schemes
denial-of-service (DoS) attacks
Decentralized Control
construction algorithm
CPSS
attack graphs
denial-of-service attacks
cyberattack
distributed control
telecommunication control
Communication channels
Laplace equations
Predictive Metrics
telecommunication network topology
Topology
security problem
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
computer network security
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
fuzzy technologies
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
differential equations
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
Trojan horses
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
cyberattack
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 2:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
Game theoretic modeling of cyber deception in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 2:59pm
Internet of battlefield things
security of data
security counter measure
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Monitoring
IoBT systems
IoBT control
iobt
Internet of Things
battlefield services
internet
information technology
Human Factors
Games
game theory
game theoretic modeling
cyberattack
cyber deception
Computational modeling
command and control systems
command and control
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
proprietary protocols
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
information technology network
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
fog intrusion detection system
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
anomaly based features
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
biblio
Isolation Forest based Detection for False Data Attacks in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
Vegetation
real-time data
outlier detection
isolation forest based detection algorithm
isolation forest
integrated communication networks
IF based detection method
entire power grid
bad data detection
false data attack
False Data Detection
Transmission line measurements
cyber physical systems
network information
cyberattack
Forestry
fault diagnosis
false data injection attacks
Smart Grids
power systems
IEEE 118-bus system
state estimation
Cyber Attacks
real-time systems
composability
power system security
Resiliency
resilience
Human behavior
pubcrawl
biblio
MILP Modeling of Targeted False Load Data Injection Cyberattacks to Overflow Transmission Lines in Smart Grids
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
optimal power flow constraints
Transmission line measurements
False Data Detection
power system state estimation
attack model
bad data detection constraints
bi-level mixed integer linear programming optimization model
IEEE 118-bus power system
MILP modeling
Mixed Integer Linear Programming (MILP)
cyber physical systems
optimal power flow problem
optimized false data injections
overflow transmission lines
targeted false load data injection cyberattacks
targeted load buses
targeted transmission line
Transmission Line Congestion
upper level optimization problem
composability
security
pubcrawl
Human behavior
resilience
Resiliency
Data models
power system security
smart power grids
security of data
Load modeling
Smart Grids
optimisation
power transmission lines
Load flow
power system simulation
cyberattack
False Data Injection
biblio
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features
Submitted by aekwall on Mon, 10/12/2020 - 11:46am
collective attack behavior
Human Behavior and Cybersecurity
unique attack models
intrusion alerts
ground truth data
empirical cyberattack models
empirical attack models
dynamic generation
dynamic Bayesian approach
Dynamic attack models
critical cyber incidents
critical activities
corporate network
competition data
cyberattack
2017 National Collegiate Penetration
automated system
Aggregates
belief networks
Indexes
Analytical models
Cybersecurity
pubcrawl
Human behavior
feature extraction
Bayes methods
IP networks
security of data
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »