Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
biblio
Security games on infrastructure networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
pubcrawl
Investment
IT systems
Load modeling
Metrics
network security game
networked control systems
node disruptions
optimal attack plans
Policy-Governed Secure Collaboration
interdiction problem
Resiliency
resource allocation
robust control models
Scalability
Science of Security
security
security of data
strategic edge disruptions
distribution networks
collaboration
communication failures
Communication networks
composability
controller-disturbance interaction
cyber-physical security
cyber-physical systems
cyber-security modelling
Density estimation robust algorithm
attacker-defender interactions
game theory
game theory methods
Games
Human behavior
Human Factors
infrastructure networks
Inspection
interdependent security game
biblio
Accountability in cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human Factors
Watermarking
security of data
Science of Security
Scalability
Robustness
responsibility-assignment
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Kullback-Liebler divergence
Attack detection
Human behavior
cyber-physical systems
cyber-physical system
CPS accountability
corrective measures
control systems
Conferences
composability
collaboration
causal information flow analysis
Casting
biblio
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human behavior
telecommunication channels
set-theoretic control framework
set theory
Science of Security
Scalability
resilient control
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
internet
Human Factors
actuators
FDI attacks
encryption algorithms
Detectors
cyber-physical systems
cyber false data injection attacks
Cryptography
control remediation strategy
composability
Communication channels
collaboration
anomaly detector module
biblio
Advances and challenges of quantitative verification and synthesis for cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Monitoring
Wearable devices
software reliability
Software
self-driving cars
Science of Security
Scalability
safety-critical software
safety critical contexts
robotic assistants
Resiliency
Quantitative Verification
pubcrawl
Probabilistic logic
Policy-Governed Secure Collaboration
Adaptation models
Metrics
Markov processes
internet
implantable devices
Human Factors
Human behavior
formal verification
factory automation systems
cyber-physical systems
composability
collaboration
business-critical contexts
Biomedical monitoring
biblio
Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
intrusion prevention
Training
threat model
Threat Index
security threats
security of data
security issues
security
Resiliency
pubcrawl
Protocols
privacy
IoT-based CPS
IoT based CPHS
intrusion tolerance
Byzantine replication
Intrusion Detection
Internet of Things
Indexes
human participation
human involvement
human elements
holistic framework
cyber-physical systems
cyber-physical human systems
CPHS environment
composability
collaborative attacks
collaboration
biblio
Estimation of safe sensor measurements of autonomous system under attack
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
car-follower model
sensor security
security concerns
safety-critical software
safety concerns
safe sensor measurements
recursive least square algorithm
radar antennas
Radar
message authentication
estimation
delay injection
challenge response authentication technique
Metrics
autonomous system
attack vector
delays
Mathematical model
Computer crime
sensors
composability
Human Factors
Human behavior
Resiliency
pubcrawl
cyber-physical systems
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Ecosystems
Software
security
Robustness
Resiliency
Resilience and Robustness
resilience
quantitative assessment
pubcrawl
network performance
network environment
Mission Assurance
interrelated software services
Information Reuse
enterprise networks
Active dependency mapping
distributed systems
distributed processing
dependency relations
dependency analysis
Degradation
Data-driven approach
cyber-physical systems
cyber physical systems
Cyber Dependencies
Conferences
computer security
Automated Dependency Mapping
artificial degradation
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree
biblio
Application and System-level Software Fault Tolerance Through Full System Restarts
Submitted by grigby1 on Tue, 12/12/2017 - 1:21pm
cyber-physical systems
embedded systems
fault-recovery
Fault-Tolerance
pubcrawl
Reliability
Resiliency
runtime restart
System recovery
« first
‹ previous
…
60
61
62
63
64
65
66
67
68
…
next ›
last »