Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Loss measurement
biblio
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
primary safety requirement
Benders decomposition algorithm
bi-level integer programs
DSPTI
dynamic defense strategy
Loss measurement
model predictive control strategy
multi-stage dynamic game
predictive control
advanced persistent threat attacks
Real-Time Decision Making
shortest-path tree interdiction Stackelberg game
specialized anti-malware program
SSPTI
static game
stealth malware propagation
Zero Day Attacks and Defense
Safety
APT attacks
CPS
integer programming
Predictive Metrics
Games
Decision Making
composability
pubcrawl
Resiliency
cyber-physical systems
invasive software
game theory
security
malware
Conferences
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
biblio
Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System
Submitted by grigby1 on Thu, 03/28/2019 - 3:13pm
physical space
factor analysis of information risk model
FAIR Model
Frequency measurement
IoT
Loss measurement
Metrics
national confidential data
personal information
Electronic mail
pubcrawl
resilience
Resiliency
risk management
security of data
situational awareness
situational awareness framework
surveillance
composability
Human Factors
Human behavior
privacy
CPS Privacy
5G mobile
Aerospace electronics
Artificial Intelligence
Big Data
cyber physical systems
CPS environment
Cps technology
CPTED
crime prevention through environmental design
Cyber Crime Prevention Model
Cyber Physical System
Cyberspace
cyberspace attacks
biblio
Towards trustworthy data in networked control systems: A hardware-based approach
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
malfunctioning systems
trustworthy data
transferred data needs
telecommunication security
smart factories
security
Scalability
Resiliency
pubcrawl
process control
networked control systems
Networked Control System
NCS
captured sensor data
Loss measurement
hardware-based approach
forward error correction
encryption
encrypted data
denial-of-service attacks
delays
Cryptography
correct functionality
controlled process
Communication channels
biblio
QoS and security in VOIP networks through admission control mechanism
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
telecommunication congestion control
Resource reservation
computer network security
Probes
Resilient Security Architectures
Loss measurement
IntServ/RSVP
Probe flows
VoIP network security
security
Resiliency
real-time systems
real-time multimedia
quality of service
Internet telephony
information security
Packet loss rate
QoS
Flow priority
digital assets
Multimedia communication
intradomain rerouting
multimedia traffic
Admission control
admission control mechanism
Admission threshold
advance resource reservation technique
Protocols
ecurity
Edge router
NAC
network admission control
pubcrawl
« first
‹ previous
1
2
3