Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cybersecurity threats
biblio
Aging Attacks against Electro-Mechanical Actuators from Control Signal Manipulation
Submitted by aekwall on Mon, 01/25/2021 - 11:53am
electro-mechanical actuators
aging
aging attacks
carrier frequency
control signal manipulation
corrupted controller
digital control
Digital controller
digital controller technologies
Cavity resonators
electromechanical actuators
EMA's aging
Harmonic analysis
ICS's physical system
nonlegitimate pulse width modulation control signal
Pulse width modulation
remotely-accessibility capacity
cybersecurity threats
partial discharges
Degradation
actuator security
actuators
control engineering computing
industrial control
Cybersecurity
Metrics
composability
pubcrawl
Human behavior
Resiliency
Industrial Control Systems
security
security of data
biblio
Security Threats for Autonomous and Remotely Controlled Vehicles in Smart City
Submitted by grigby1 on Thu, 12/17/2020 - 12:55pm
policy-based governance
traffic engineering computing
threat
telerobotics
Smart City
smart cities
security of data
security graph
security context
security
robot operating systems
Resiliency
resilience
remotely operated vehicles
remotely controlled vehicles
pubcrawl
autonomous controlled vehicles
model
mobile robots
integrity property
integrity
Industrial Control Systems
industrial control
Human Factors
Human behavior
data integrity
cybersecurity threats
cyber
control system security
control engineering computing
AV system
autonomous vehicles
biblio
Cybersecurity education and training in hospitals: Proactive resilience educational framework (Prosilience EF)
Submitted by grigby1 on Wed, 11/04/2020 - 12:59pm
healthcare settings
training development
Training
security of data
security framework
resilience
pubcrawl
Prosilience EF
proactive resilience educational framework
privacy
multilateral educational training scheme
information technology
information security processes
Human Errors
hospitals
holistic cyber resilience
computer security
health care
Electronic healthcare
eHealth
educational training schemes
data protection procedures
cybersecurity training providers
cybersecurity training
cybersecurity threats
cybersecurity education
Cybersecurity
cyber-attacks
cyber resilience level measuring
cyber physical systems
critical infrastructures
biblio
Observation Measures to Profile User Security Behaviour
Submitted by aekwall on Mon, 10/12/2020 - 10:42am
Data collection
Human Behavior and Cybersecurity
user-system interactions
user security behaviour
User profile
user modelling
security behaviour profile
Observation Measures
interactive environment
cybersecurity threats
computer user security
behaviour profiling
Behaviour Profile
Human behavior
human computer interaction
computer security
pubcrawl
security of data
biblio
Distribution Power System Resiliency Improvement Using Distributed Generation and Automated Switching
Submitted by grigby1 on Wed, 02/26/2020 - 3:47pm
Measurement
resiliency scores
resiliency feasible network
resiliency estimation
resiliency enhancement strategy
Resiliency
resilience
Reliability
pubcrawl
power system reliability
power distribution reliability
power distribution
physical threats
modified IEEE 123 node system
analytic hierarchy process
Hurricanes
graph theory
extreme weather events
Distribution system
distribution power system resiliency improvement
distributed power generation
distributed generation
distributed energy resources
cybersecurity threats
contemporary power distribution system
automated switching
automated switches
biblio
A Role for Embedded Instrumentation in Real-Time Hardware Assurance and Online Monitoring against Cybersecurity Threats
Submitted by grigby1 on Wed, 02/26/2020 - 3:44pm
online monitoring
Trojan mitigation
Trojan detection
trojan
threat mitigation
Resiliency
resilience
real-time hardware assurance
pubcrawl
counterfeits
Metrics
invasive software
Human Factors
Human behavior
hardware assurance (HWA)
embedded instrumentation
electronic systems
cybersecurity threats
biblio
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
IDS
threat vectors
telecommunications equipment
Support vector machines
security of data
pubcrawl
privacy
neural nets
Metrics
Measurement
learning (artificial intelligence)
cloud applications
enterprise grade security applications
enterprise applications
deep neural networks
deep learning techniques
deep learning
cybersecurity threats
Cybersecurity
cloud environments
Cloud Computing
biblio
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
Submitted by aekwall on Wed, 02/13/2019 - 10:56am
road safety
threat mitigation
metric
pubcrawl
Human behavior
Resiliency
traffic engineering computing
technological development
technical mitigation measures
Technical mitigation
security of data
Safety
road vehicles
automobiles
organizational mitigation measures
Organizational Mitigation
increased risks
cybersecurity threats
cyberattack
cyber threats
cyber threat mitigation
autonomous vehicles
automotive vehicle cybersecurity
automotive industry
Automotive engineering
biblio
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
Submitted by grigby1 on Fri, 02/08/2019 - 3:15pm
pubcrawl
heterogeneous data
Human behavior
input logs preprocessing
learning (artificial intelligence)
machine learning
machine learning algorithms
Metrics
network sensors
Feature Selection
pyspark
Python
python API
Resiliency
security
security of data
Task Analysis
apache spark
feature extraction
data mining techniques
Data mining
data complexity
cybersecurity threats
cybersecurity attacks
cyber security
computational complexity
composability
Complexity theory
big data security analytics
Big Data
artificial intelligence security
Artificial Intelligence
application program interfaces
biblio
Insider Threat Detection Through Attributed Graph Clustering
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trusted source
security of data
security
Resiliency
pubcrawl
psychology
policy-based governance
pattern clustering
outlier ranking mechanism
Organizations
organizational dynamics
network analysis
Metrics
malicious insider access
malicious attacker unpredictability
Anomaly Detection
Insider Threat Detection
Human Factors
Human behavior
heterogeneous data analysis
graph theory
enterprise users
Electronic mail
data analysis
cybersecurity threats
collaboration
Clustering algorithms
business data processing
Bipartite graph
attributed graph clustering