Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyberattack
biblio
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
SDN self-healing mechanisms
fault tolerance
Immune system
multiobjective optimization framework
network orchestration
networking paradigm
quality of service
Run Time
SDN controller
end-to-end packet delay
security cost
security countermeasures
self-healing cyber resilient framework
software defined networking-enabled energy delivery system
Sorting
system resilience
Virtualization
self-healing networks
Cyber Attacks
computer network security
authorisation
computer network management
software defined networking
pubcrawl
composability
optimisation
authentication
cyberattack
resilience
access control rules
automated network management
autonomous attack containment
computational complexity
configurable trust levels
delays
biblio
A Framework for Making Effective Responses to Cyberattacks
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
attribution confidence
USG
U.S. government
suspected attacker
Risk
Response
private sector
policymakers
national intelligence community
Market research
Government
Escalation
effective response decision
Deterrence
decision makers
cyberattack
analysis
attribution
Companies
Decision Making
Computer hacking
Metrics
composability
pubcrawl
Human behavior
Big Data
human-in-the-loop security center paradigm
Computer crime
security of data
biblio
Reliability Assessment of Distribution Network Considering Cyber Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
power distribution faults
System recovery
Switches
smart power grids
Smart Grid
SCADA systems
Resiliency
resilience
reliability assessment
Reliability
pubcrawl
power system stability
power system security
power system reliability
power engineering computing
power distribution reliability
Circuit faults
power distribution control
physical networks
lED
Intelligent sensors
intelligent electronic devices
IEEE-33-bus distribution system
fault recovery process
distribution network
distribution main station
cyberattack
cyber-physical systems
cyber networks
Cyber Attacks
computer network security
biblio
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks
Submitted by aekwall on Wed, 02/13/2019 - 12:02pm
learning (artificial intelligence)
Support vector machines
support vector machine
Servers
security of data
Scalability
Resiliency
Random Forest
pubcrawl
privacy leakage
principal component analysis
machine learning-based detection methods
machine learning algorithms
machine learning
Attack vectors
Human behavior
Feature Selection
feature extraction
Electronic mail
early detection
distributed cyber attacks
denial of services
DDoS Attacks
data privacy
cyberattack
cyber security community
Command & Control communication
C&C communication
biblio
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
road safety
threat mitigation
metric
pubcrawl
Human behavior
Resiliency
traffic engineering computing
technological development
technical mitigation measures
Technical mitigation
security of data
Safety
road vehicles
automobiles
organizational mitigation measures
Organizational Mitigation
increased risks
cybersecurity threats
cyberattack
cyber threats
cyber threat mitigation
autonomous vehicles
automotive vehicle cybersecurity
automotive industry
Automotive engineering
biblio
A Malicious Attack on the Machine Learning Policy of a Robotic System
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
machine learning algorithms
security of data
robots
robotics
robotic vehicle
Robotic system
Resiliency
real-time routing control
radiofrequency identification
Q learning algorithm
pubcrawl
mobile robots
Metrics
malicious attack
machine learning policy
robot operating systems
machine learning
learning (artificial intelligence)
intelligent robots
indirect attack
Human behavior
Cybersecurity
cyberattack
composability
autonomous vehicles
autonomous vehicle
artificial intelligence security
Artificial Intelligence
security
biblio
Evolving Risk Management Against Advanced Persistent Threats in Fog Computing
Submitted by grigby1 on Mon, 01/21/2019 - 12:36pm
evolutionary computation
advanced persistent threats
advanced persistent threats attack
Advanced Persistent Threats attacks
cyber risk management
cyber-insurace
cyber-insurance
cyberattack
defense computing resources
probability
evolutionary subgame
Fog computing
fog computing provider
Insurance
neutralizing cyber risks
purchases ratio
Stackelberg game
Virtualization
mobile computing
edge computing
game theory
distributed processing
Scalability
Resiliency
Metrics
Human behavior
pubcrawl
Games
Computational modeling
optimisation
security of data
risk management
optimization
biblio
Real-Time Identification of Dynamic Events in Power Systems Using PMU Data, and Potential Applications #8212;Models, Promises, and Challenges
Submitted by el_wehby on Mon, 05/14/2018 - 2:23pm
Power system dynamics
Voltage measurement
transmission systems
Switches
situational awareness
real-time identification
power transmission protection
power systems
power system stability
power system security
power system protection security
classification
Power measurement
PMU data
Phasor measurement units
phasor measurement
pattern creation
dynamic events
Data visualization
data communications
cyberattack
1549831
biblio
Vulnerabilities in two-area Automatic Generation Control systems under cyberattack
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
Power Grid
two-area automatic generation control systems
security of data
security measures
security
Resiliency
pubcrawl
power system stability
power system control
power grids
power grid vulnerability analysis
AGC system
Metrics
Mathematical model
Generators
Gain control
cyberattack
cyber criminals
control engineering computing
composability
automatic generation control
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »