Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attack Detection
biblio
Non-intrusive Runtime Monitoring for Power System Intelligent Terminal Based on Improved Deep Belief Networks (I-DBN)
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
Cyber Attack Detection
power system management
power system intelligent terminal equipment
power system faults
Power management
power companies
nonintrusive runtime monitoring
nonintrusive data collection
nonintrusive business-level monitoring platform
improved deep belief networks
business-level security monitoring
business-level monitoring platform
Deep Belief Network
runtime monitoring
Power industry
Resiliency
fault diagnosis
Power Grid
power distribution
power meters
belief networks
power system measurement
data acquisition
fault detection
power system security
smart power grids
power system analysis computing
composability
pubcrawl
biblio
Deep-Learning-Based Network Intrusion Detection for SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
SCADA network protocols
industrial control
Industrial Control Systems
learning (artificial intelligence)
network intrusion detection system
network-based cyber attacks
pubcrawl
realistic SCADA traffic data sets
Resiliency
individual network packets
SCADA system operators
SCADA System Security
SCADA systems
SCADA Systems Security
site-specific network attack
specialized attacks
supervisory control and data acquisition networks
unseen network attack instances
convolutional neural network
ICs
attacks on DNP3 protocol
Compositionality
computer network security
computing nodes
conventional network attacks
conventional SCADA specific network-based attacks
convolutional neural nets
Anomaly Detection
Cyber Attack Detection
deep learning
deep-learning-based network intrusion detection system
energy-delivery systems
field devices
Human behavior
ICS network infrastructure
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection