Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
defense mechanism
biblio
Robust and Resilient Federated Learning for Securing Future Networks
Submitted by grigby1 on Fri, 01/06/2023 - 4:25pm
resilience
Label Flipping
defense mechanism
poisoning attacks
6G mobile communication
AI Poisoning
Distributed databases
Clustering algorithms
federated learning
Training
Industries
5G mobile communication
Scalability
Resiliency
Human behavior
pubcrawl
machine learning
biblio
Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach
Submitted by grigby1 on Tue, 10/12/2021 - 2:46pm
Adversarial Machine Learning
composability
convolutional neural network (CNN)
defense mechanism
event cause analysis
Metrics
power grid vulnerability
power grid vulnerability analysis
pubcrawl
real-time digital simulator (RTDS)
Resiliency
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Design and Implementation of a New Intelligent Substation Network Security Defense System
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
power system security
Networked Control Systems Security
protection demand
network security protection level
intelligent substation network security risk
intelligent substation network security protection
intelligent substation network security defense system
defense system
intelligent substation
Predictive Metrics
Power system protection
defense mechanism
Monitoring
Communication networks
Substations
Business
composability
pubcrawl
Resiliency
network security
real-time systems
Protocols
security
biblio
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
security
operational assurance
Protocols
Remote Attestation
remote device
resource-constrained edge services
run-time modifications
Scalability
secure edge computing
lightweight dynamic control-flow property-based attestation architecture
security mechanisms
security of data
Software
software assurance
software integrity
software-based attacks
Trusted Component
critical software components
pubcrawl
Human behavior
Resiliency
attack landscape
Cloud Computing
cloud devices
composability
Control-Flow Property-based Attestation
attestation
decentralized solution
defense mechanism
device-integrity
Hardware
industrial IoT applications
intelligent edge computing systems
Internet of Things
biblio
Secure Sensor Design for Resiliency of Control Systems Prior to Attack Detection
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Markov processes
stochastic systems
stochastic control systems
stochastic control scenarios
sensor outputs
security of data
secure sensor design
Scalability
Resiliency
resilience
Random variables
Radio frequency
pubcrawl
process control
possible attacks
Attack detection
Human behavior
Gaussian processes
Games
game theory
Detectability
defense mechanism
cyber physical systems
Cyber Physical System
Cost function
controlled Gauss-Markov process
Control Theory
control systems
control objectives
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
Sybil attack in IOT: Modelling and defenses
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
legitimate nodes
trust value
Throughput
sybil nodes
sybil attacks
security
Routing protocols
Routing
Resiliency
pubcrawl
Peer-to-peer computing
neighbouring nodes
Metrics
ad hoc on-demand distance vector
IoT network
Internet of Things
information technology
enhanced AODV protocol
EAODV protocol
EAODV
delays
defense mechanism
computer network security
composability
behavioural profiling
AODV