Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber attackers
biblio
Vulnerabilities and Strategies of Cybersecurity in Smart Grid - Evaluation and Review
Submitted by grigby1 on Fri, 01/20/2023 - 4:06pm
Smart Grids
power system reliability
cyber attackers
cyber security
smart grid security
Power Grid
renewable energy sources
Reliability
Metrics
information security
control systems
Smart Grid
Computer crime
Scalability
Resiliency
resilience
pubcrawl
biblio
Local Outlier Factor Based False Data Detection in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
Smart Grids
local outlier factor
false data attack
electric power delivery
dummy data attack
density-clustering based LOF algorithm
density clustering
cyber attackers
False Data Detection
cyber physical systems
pattern clustering
security of data
power systems
power grids
composability
smart power grids
power engineering computing
Resiliency
resilience
Human behavior
pubcrawl
Anomaly Detection
biblio
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
android
vulnerabilities detection approach
system call
security vulnerabilities detection
security bugs
malicious Android application
detection process
detection algorithm
cyber attackers
Android security vulnerabilities
Android operating systems
system calls
anomaly detection techniques
Compositionality
Android (operating system)
security
vulnerability detection
Measurement
security vulnerabilities
Computer bugs
Anomaly Detection
Correlation
Metrics
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
Software
biblio
Tricking attackers through the art of deception
Submitted by willirn1 on Wed, 09/25/2019 - 2:27pm
Cognitive Security in Cyber
Cognitive Security
cyber attackers
deception
biblio
Are Cyber Attackers Thinking Fast and Slow? Exploratory Analysis Reveals Evidence of Decision-Making Biases in Red Teamers
Submitted by willirn1 on Fri, 09/20/2019 - 2:48pm
Cognitive Security
Cognitive Security in Cyber
cyber attackers
red teamers
decision making process
biblio
Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Mathematical model
zero-sum repeated game
Zero-Sum Games
security of data
security
Scalability
Resiliency
resilience
rational strategy
rational attacker
pubcrawl
optimal cyber-defense strategies
network security
network administrator
Metrics
advanced persistent threats
Human behavior
graph edges
Games
game theory
game theoretical analysis
expressive model
Exponential distribution
defense budget
Data models
cyber attackers
Cyber attack modeling
cognition
budget constrained network administrators
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree