Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
legacy systems
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
proprietary protocols
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
information technology network
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
fog intrusion detection system
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
anomaly based features
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
biblio
Host Oriented Factor Normalizing Authentication Resource: More Secure Authentication for Legacy Systems
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
password
software program
scalable multifactor authentication method
legacy systems authentication
legacy systems
host oriented factor normalizing authentication resource
computer systems security
authentication model
two factor authentication
secure authentication
Multi-factor authentication
authorisation
radiofrequency identification
biometrics
authorization
security issues
Human Factors
biometrics (access control)
software maintenance
radio frequency identification
pubcrawl
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Adopting Security Routines in Legacy Organizations
Submitted by K_Hooper on Wed, 10/25/2017 - 10:53am
AAA
Damage Assessment
information security
legacy systems
pbm
pubcrawl
resilience