Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
private networks
biblio
Counteraction against Internet of Things Botnets in Private Networks
Submitted by grigby1 on Fri, 09/11/2020 - 12:09pm
Metrics
private networks
private IoT networks
private Internet of Things network
IoT botnets activity
Internet of Things botnets
botnet threats
botnet prevention
botnet behavior
architectural features
botnet
Software systems
Compositionality
computer architecture
botnets
invasive software
Computer crime
data privacy
performance evaluation
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
N-1 RTU Cyber-Physical Security Assessment Using State Estimation
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
state estimation
Damage Assessment
synthetic 200-bus system
power system devices
observability analysis
N-1 RTU cyber-physical security assessment
IEEE 14-bus system
EMS applications
electrical substations
Cyber-physical security assessment
cyber-physical impact
Remote Terminal Units
control center
state estimator
Denial-of-Service
security of data
substation automation
supervisory control and data acquisition system
private networks
SCADA system
power system control
power system state estimation
energy management systems
power system security
cyber-attacks
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
cyber-attack
biblio
A Lightweight Compound Defense Framework Against Injection Attacks in IIoT
Submitted by aekwall on Mon, 12/02/2019 - 12:03pm
Switches
Smart industry
private networks
lightweight compound defense framework
lightweight authentication
injection attack event
injection attack
Industrial Internet of Things
IIoT Security
IIoT network protocols
field data
field agent
Compounds
compound approach
commands
command injection attacks
computer network security
Data Transmission
sensors
message authentication
authentication
production engineering computing
Industries
Metrics
composability
pubcrawl
Resiliency
software defined networking
Protocols
telecommunication security
Internet of Things
Cryptography
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network