Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial facilities
biblio
Towards Safer Industrial Serial Networks: An Expert System Framework for Anomaly Detection
Submitted by grigby1 on Fri, 08/26/2022 - 9:57am
metadata
Time factors
security
Scalability
Resiliency
resilience
real-time systems
Profibus-DP
Production
pubcrawl
Industrial Serial-based networks
industrial facilities
Human behavior
expert systems
cyber security
Computer crime
anomaly detection systems
biblio
Launching Smart Selective Jamming Attacks in WirelessHART Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:16am
Communication system security
actuator security
WirelessHART Networks
selective jamming
Oil refineries
Industrial Wireless Sensor-Actuator Networks
industrial facilities
Energy Efficiency
denial-of-service attack
security
composability
Human behavior
Resiliency
Metrics
pubcrawl
Wireless communication
wireless sensor networks
biblio
Assessment of the Applicability of Autoencoders in the Problem of Detecting Anomalies in the Work of Industrial Control Systems.
Submitted by grigby1 on Tue, 03/30/2021 - 10:53am
industrial facilities
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
process control systems
process control
Neurons
machine learning
learning (artificial intelligence)
integrated circuits
information security
Industries
anomalies detection
industrial control systems (ICS)
industrial control system
industrial control
ICS Anomaly Detection
deep learning
Decoding
convolutional neural networks
convolutional neural nets
control engineering computing
complex problems
classification problems
autoencoders
auto-encoders
biblio
Determining the Hazard Quotient of Destructive Actions of Automated Process Control Systems Information Security Violator
Submitted by grigby1 on Wed, 02/03/2021 - 11:54am
automation
process criticality category
open sources
multilevel distributed automated process control systems
MATLAB
information security violator
industrial facilities
Hazards
hazard quotient
destructive actions
destructive action
information security system
control system security
security of data
automated process control systems
public domain software
information security
production engineering computing
Industrial Control Systems
process control
control engineering computing
Scalability
Software
Resiliency
resilience
pubcrawl
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
SCADA network cyber-attacks
machine learning
Metrics
production engineering computing
pubcrawl
Resiliency
risk assessment
risk management
SCADA network
Logic gates
SCADA security risk assessment
SCADA systems
SCADA Systems Security
Scalability
security
security risk level
supervisory control and data acquisition
Damage Assessment
learning (artificial intelligence)
industrial systems
industrial facilities
incremental learning
Human behavior
cyber-security risk assessment model
Cyber-security
critical infrastructures
computer network security
Communications technology
belief networks
Bayesian network
Bayes methods
artificial intelligence security
Adaptation models