Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial process
biblio
Applying of Generative Adversarial Networks for Anomaly Detection in Industrial Control Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:56am
Industrial Control Systems
Training
security of data
Scalability
Resiliency
pubcrawl
production engineering computing
Predictive Metrics
neural nets
Intrusion Detection
Integrated circuit modeling
information security
industrial processes anomaly detection
industrial process
industrial control systems (ICS)
ICS Anomaly Detection
industrial control
ICs
Generators
generative adversarial networks (GAN)
generative adversarial networks
Generative Adversarial Learning
deep learning
Data models
Cyber Attacks
control engineering computing
computer architecture
BiGAN architecture
Anomaly Detection
biblio
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
intrusion detection system
system monitoring
System Identification
security of data
Scalability
Resiliency
resilience
pubcrawl
process-related attacks
process-based attacks
process-based anomaly detection
PN identification-based anomaly detection methods
Petri nets
Petri Net model identification
anomalous behaviour
industrial process
Industrial Control Systems
industrial control system
industrial control
improved industrial control system device logs processing method
ICS device
ICs
formalised method
expected behaviour
event-driven system analysis
event logs
cyber-attacks
Anomaly Detection
biblio
Privacy-Enabled Secure Control of Fog Computing Aided Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
cyber physical systems
CPS Privacy
secure estimation scheme
Secure control design
privacy-enabled secure control
observer-based secure control problem
Luenberger observer
fog computing aided CPS
Fog computation
FCA-CPS
Data Perturbation
complicated computation
industrial process
Covariance matrices
Linear systems
Cryptography
Observers
Perturbation methods
fog layer
Human Factors
edge computing
security threats
privacy
pubcrawl
Human behavior
cyber-physical systems
distributed processing
data privacy
encryption
biblio
Generalized Reconstruction-Based Contribution for Multiple Faults Diagnosis with Bayesian Decision
Submitted by aekwall on Mon, 05/18/2020 - 9:48am
belief networks
smearing effect
multiple faults diagnosis
multiple fault diagnosis
Multi-dimensional reconstruction based contribution
industrial process
generalized reconstruction-based contribution
data-driven fault diagnosis method
bayesian decision
process monitoring
fault detection
Covariance matrices
fault diagnosis
Monitoring
numerical simulation
numerical analysis
Human Factors
principal component analysis
Indexes
cyber physical systems
PCA
Metrics
pubcrawl
Resiliency
Bayes methods
biblio
Immunity assessment of a servomotor exposed to an intentional train of RF pulses
Submitted by grigby1 on Wed, 09/12/2018 - 10:13am
intentional interference
susceptibility
smart intentional electromagnetic interference
Servomotors
servomotor
robots
robotics
RF pulses
Resiliency
resilience
radio frequency pulses
Radio frequency
pubcrawl
Off-The-Shelf servomotor
intentional train
automated production lines
industrial process
Induction motors
immunity assessment
functional safety
EMC
Electromagnetics
electromagnetic interference
electromagnetic fields
electromagnetic field
electromagnetic compatibility
DC motors
Damage Assessment
cyber-attacks
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication