Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Scalability
biblio
An OpenPLC-based Active Real-time Anomaly Detection Framework for Industrial Control Systems
Submitted by grigby1 on Fri, 08/18/2023 - 3:12pm
Adaptation models
security
Anomaly Detection
pubcrawl
resilience
Software
Scalability
industrial control
ICS security
real-time systems
Task Analysis
Detectors
ICS Anomaly Detection
Resiliency
OpenPLC
biblio
Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features
Submitted by grigby1 on Fri, 08/18/2023 - 3:11pm
integrated circuits
Testability
gate-level
Resiliency
ICS Anomaly Detection
supervised learning
hardware trojan
Hardware Security
Trojan horses
Logic gates
Scalability
Hardware
resilience
pubcrawl
Anomaly Detection
machine learning
feature extraction
Training
biblio
An error neighborhood-based detection mechanism to improve the performance of anomaly detection in industrial control systems
Submitted by grigby1 on Fri, 08/18/2023 - 3:11pm
Predictive models
Unsupervised Learning
Anomaly Detection
pubcrawl
resilience
performance evaluation
Scalability
industrial control
integrated circuits
industrial control system
real-time systems
ICS Anomaly Detection
Resiliency
Sensor phenomena and characterization
detection mechanism
Mechanical sensors
biblio
Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems
Submitted by grigby1 on Fri, 08/18/2023 - 3:11pm
Analytical models
Resiliency
ICS Anomaly Detection
Intrusion Detection Systems
cyber physical systems
Industrial Control Systems
Robustness
Data models
Scalability
Predictive models
Correlation
resilience
pubcrawl
Intrusion Detection
Anomaly Detection
security
machine learning
biblio
Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 3:41pm
security
IoT
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
blockchain technology
Identity management
blockchains
D2D authentication
device identity management
biblio
The Threat of Deep Fake Technology to Trusted Identity Management
Submitted by grigby1 on Thu, 08/17/2023 - 3:41pm
deep learning
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Identity management
Artificial Intelligence
education
cultural differences
Forgery
Deepfakes
Deep Fakes
Entertainment industry
network trusted identity management
biblio
A Review on Blockchain Based Identity Management System
Submitted by grigby1 on Thu, 08/17/2023 - 3:41pm
Scalability
SAML
personally identifiable information (PII)
Identity Access Management
Cryptography and Identity management system
blockchains
real-time systems
Industries
Identity management
Ciphers
Resiliency
resilience
Human behavior
pubcrawl
blockchain
Servers
security
Cloud Computing
biblio
Decentralized Identity and Access Management of Cloud for Security as a Service
Submitted by grigby1 on Thu, 08/17/2023 - 3:40pm
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Identity management
control systems
Forensics
Data Breach
DID
blockchains
decentralized Identity
distributed ledger
Identity-Access Management
biblio
The Digital Identity Management System Model Based on Blockchain
Submitted by grigby1 on Thu, 08/17/2023 - 3:40pm
information security
blockchain
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Data models
Identity management
Computational modeling
smart contracts
W3C
blockchains
Decentralized IDentifier
biblio
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 3:40pm
resource management
Identity of Things (IDoT)
Identity Management (IdM)
IAM
digital certificates
device identity
Device Certificates
Block Chain
Fog computing
Internet of Things (IoT)
IoT security
Public key
Internet of Things
edge computing
Companies
Computer crime
PKI
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »