Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ICS Anomaly Detection
biblio
Explaining Anomalies in Feature Models
Submitted by grigby1 on Fri, 10/27/2017 - 12:15pm
pubcrawl
ICS Anomaly Detection
Feature Models
Explanations
Anomalies
software product lines
Scalability
Resiliency
biblio
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis
Submitted by grigby1 on Tue, 05/16/2017 - 12:34pm
Modbus
statechart
simulation
siemens
SCADA Systems Security
SCADA
s7
Resiliency
pubcrawl
network-intrusion-detection-system
network intrusion detection
actuator security
Metrics
Intrusion Detection Systems
Intrusion Detection System (IDS)
IDS
ICS Anomaly Detection
ICs
Human behavior
CPS modeling
Compositionality
composability
biblio
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
Submitted by grigby1 on Tue, 05/16/2017 - 12:34pm
composability
Compositionality
ethernet/ip
Human behavior
ICS Anomaly Detection
IDS
Intrusion Detection
Intrusion Detection System (IDS)
Intrusion Detection Systems
pubcrawl
Resiliency
SCADA
SCADA Systems Security
biblio
Reading Between the Fields: Practical, Effective Intrusion Detection for Industrial Control Systems
Submitted by grigby1 on Mon, 04/03/2017 - 11:54am
pubcrawl
ICS Anomaly Detection
networked control systems
network intrusion detection
Anomaly Detection
network control systems security
network control systems
Metrics
Intrusion Detection Systems
security
Scalability
Resiliency
intrusion detection system
Industrial Control Systems
IDS
biblio
Buffer Overflow Attack's Power Consumption Signatures
Submitted by grigby1 on Mon, 04/03/2017 - 11:52am
channel coding
composability
Cyber Dependencies
cyber physical security
ICS Anomaly Detection
Metrics
Physical layer
physical layer security
physical-layer security
power consumption anomaly detection
pubcrawl
Resiliency
rop attacks
Scalability
side-channel analysis
simple power analysis
« first
‹ previous
1
2
3
4
5