Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
biblio
A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
Repeated game
optimal strategic behavior
power engineering computing
power grid security schemes
power system
power system security
power transmission lines
Predictive Metrics
privacy
pubcrawl
Monitoring tools
Resiliency
Scalability
security
security of data
smart grid security
Smart Grids
smart power grid
smart power grids
strategic analysis
game theoretic approach
attack-defense budget
attacker-defender game
attacker-defender interaction
attacker-defender repeated game
attacker-defender strategic interaction
cyber control
Cyber-physical attacks
cyber-physical systems
game payoffs calculation
and budget limitation
game theory
Games
generation power
game theoretic security
Human Factors
IEEE 39 bus benchmark system
Mathematical model
Metrics
Monitoring
biblio
Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
operators defense cost reduction
distributed flexible AC transmission system devices
flexible AC transmission systems
game-theoretic approach
grids transmission line reactances
IEEE bus systems
links subset
MATPOWER simulator
Moving Target Defense strategy
MTD design criteria
D-FACTS device deployment
power transmission economics
power transmission lines
power transmission reliability
sensor measurements
systems operational time
Transmission line matrix methods
Transmission line measurements
undetectable line outages
Smart Grid Sensors
power engineering computing
security of data
telecommunication security
game theory
cyber-physical systems
Resiliency
pubcrawl
cost reduction
power grids
False Data Injection
cyberattack
power system security
Human Factors
state estimation
Compositionality
set theory
CCPA detection
Coordinate measuring machines
coordinated cyber-physical attacks detection
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
file
Protecting Cyber Physical Systems Using A Game-Theoretical Approach
Submitted by Mina Guirguis on Wed, 02/05/2020 - 5:15pm. Contributors:
Leander Davis
Mina Guirguis
Posters
cyber-physical systems
Intrusion Detection
Wired Networking
wireless networking
1814064
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Determining-Tolerable-Attack-Surfaces-that-Preserves-Safety-of-Cyber-Physical-Systems.pdf
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Safety
tracking
timed automata
software fault tolerance
Servers
Security analysis
security
Safety-Critical Systems
safety-critical software
safety analysis
attacker model
railway signaling system
Rail transportation
parameterizable state automaton templates
formal verification
cyber-physical systems
cyber-physical system safety
cyber-physical system
Communication system signaling
automata
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
Submitted by Heather Lucas on Wed, 01/29/2020 - 7:10pm
Rail transportation
timed automata
attacker model
safety analysis
cyber-physical system
tracking
Communication system signaling
security
automata
Servers
cyber-physical systems
Safety
parameterizable state automaton templates
cyber-physical system safety
railway signaling system
Security analysis
Safety-Critical Systems
software fault tolerance
safety-critical software
formal verification
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
primary safety requirement
Benders decomposition algorithm
bi-level integer programs
DSPTI
dynamic defense strategy
Loss measurement
model predictive control strategy
multi-stage dynamic game
predictive control
advanced persistent threat attacks
Real-Time Decision Making
shortest-path tree interdiction Stackelberg game
specialized anti-malware program
SSPTI
static game
stealth malware propagation
Zero Day Attacks and Defense
Safety
APT attacks
CPS
integer programming
Predictive Metrics
Games
Decision Making
composability
pubcrawl
Resiliency
cyber-physical systems
invasive software
game theory
security
malware
Conferences
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
…
next ›
last »