Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control system security
biblio
Vulnerability Modeling and Protection Strategies via Supervisory Control Theory
Submitted by grigby1 on Fri, 05/12/2023 - 10:14am
security
IP networks
pubcrawl
Human behavior
Human Factors
resilience
Scalability
Consumer electronics
Reinforcement learning
control system security
supervisory control
Control Theory
Resiliency
Behavioral sciences
biblio
Anomaly Detection and Anomaly Location Model for Multiple Attacks Using Finite Automata
Submitted by grigby1 on Fri, 12/09/2022 - 6:10pm
automata
actuator security
control system security
Binary Decision Diagram
Automaton
Accesslists
Three-dimensional displays
Solid modeling
actuators
Anomaly Detection
Switches
control systems
composability
Resiliency
resilience
Metrics
pubcrawl
biblio
Application of Optimized Bidirectional Generative Adversarial Network in ICS Intrusion Detection
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
optimal model
Training
supervised control
single variable principle
security of data
Scalability
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
parameter optimization
optimized BiGAN
optimized bidirectional generative adversarial network
optimization
optimisation
network intrusion detection
neural nets
massive network traffic data
Intrusion Detection
integrated circuits
Industrial Control Systems
industrial control system
industrial control
ICS intrusion detection method
high-dimensional network traffic data
generative adversarial networks
data acquisition
control system security
control engineering computing
Computational modeling
BiGAN
biblio
Determining the Hazard Quotient of Destructive Actions of Automated Process Control Systems Information Security Violator
Submitted by grigby1 on Wed, 02/03/2021 - 12:54pm
automation
process criticality category
open sources
multilevel distributed automated process control systems
MATLAB
information security violator
industrial facilities
Hazards
hazard quotient
destructive actions
destructive action
information security system
control system security
security of data
automated process control systems
public domain software
information security
production engineering computing
Industrial Control Systems
process control
control engineering computing
Scalability
Software
Resiliency
resilience
pubcrawl
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
Actuator Security Index for Structured Systems
Submitted by aekwall on Mon, 01/25/2021 - 12:51pm
Human behavior
vulnerable actuators
structured systems
Sensor Systems
security
Resiliency
pubcrawl
power system security
Metrics
Linear systems
Large-scale systems
large scale energy systems
Indexes
actuator security
graph-theoretic conditions
generic security index
discrete-time LTI network systems
discrete time systems
directed subgraphs
directed graphs
control system security
composability
Barium
actuators
actuator security index
biblio
Security Threats for Autonomous and Remotely Controlled Vehicles in Smart City
Submitted by grigby1 on Thu, 12/17/2020 - 1:55pm
policy-based governance
traffic engineering computing
threat
telerobotics
Smart City
smart cities
security of data
security graph
security context
security
robot operating systems
Resiliency
resilience
remotely operated vehicles
remotely controlled vehicles
pubcrawl
autonomous controlled vehicles
model
mobile robots
integrity property
integrity
Industrial Control Systems
industrial control
Human Factors
Human behavior
data integrity
cybersecurity threats
cyber
control system security
control engineering computing
AV system
autonomous vehicles
biblio
Approximate Probabilistic Security for Networked Multi-Robot Systems
Submitted by grigby1 on Thu, 12/17/2020 - 1:38pm
multipoint optimization
security
Robot sensing systems
robot operating systems
Resiliency
resilience
pubcrawl
probability
Probabilistic logic
policy-based governance
optimisation
optimal subset
online optimization
Observers
networked multirobot systems
networked control systems
approximate probabilistic security
multi-robot systems
MRS
lower bound estimate
left invertiblility
Human Factors
Human behavior
graph theory
exact probability
disjoint path sets
control system security
computational complexity
combinatorial optimization problem
Boolean functions
binary decision diagrams
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 11:31am
pubcrawl
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
industrial control system
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
dynamic security control architecture
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
composability
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
biblio
Measurement and Analysis of Cyber Resilience for Control Systems: An Illustrative Example
Submitted by grigby1 on Tue, 10/06/2020 - 2:10pm
cyber security
Resiliency
resilience
pubcrawl
load frequency control
Frequency measurement
frequency control
digital systems
Digital Information
cyberattack
cyber-physical systems
cyber threats
control system environment
cyber resilience
cyber physical systems
Cyber Attacks
cyber attack
critical infrastructures
critical infrastructure
CPS resilience
control systems
control system security
control system operation
1
2
next ›
last »