Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial environments
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 10:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
biblio
Experimental Verification of Security Measures in Industrial Environments
Submitted by aekwall on Mon, 03/02/2020 - 11:29am
Human Factors
Ubiquitous Computing Security
vICS verification framework
industrial environments
industrial control security
industrial assets
ICS technology
formal verification
security measures
control engineering computing
ICs
industrial control
security of data
verification
Firewalls (computing)
integrated circuits
Anomaly Detection
production engineering computing
Metrics
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
Advanced Methodologies to Deter Internal Attacks in PTP Time Synchronization Networks
Submitted by grigby1 on Tue, 02/06/2018 - 12:59pm
network infrastructures
trusted platform modules
time synchronization supervisors
time synchronization
Synchronization
synchronisation
security
Resiliency
public key infrastructures
public key cryptography
pubcrawl
PTP time synchronization networks
Protocols
precision time protocol
network intrusion detection systems
accurate time synchronization
microsecond level
IP networks
internal attacks
industrial environments
device time synchronization
delays
cyber-attacks
Cyber Attacks
Cryptography
computer network security
computer network
composability
Clocks