Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Attack detection
biblio
Attacks Due to False Data Injection in Smart Grids: Detection Protection
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
Meters
uncertainty
uncertainties
system reliability
system protection
smart power grids
Smart Grids
Smart Grid
Resiliency
resilience
pubcrawl
power system security
Power Grid
power generation reliability
power generation protection
Phasor measurement units
False Data Detection
Mathematical model
Human behavior
H2control
H2 control method
H2 control
feedback controller
feedback
FDI detection methods
false data injection attacks
False Data Injection
estimation
energy saving
cyber physical systems
composability
Attack detection
biblio
A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network
Submitted by aekwall on Wed, 12/18/2019 - 2:26pm
internet
traditional network architecture
software-driven network
software-based networks
service attacks
new-machine learning-based collaborative DDoS mitigation mechanism
DDoS mitigation technique
DDoS detection
DDoS attack mitigation
Switches
resilience
Software Defined Network
Attack detection
SDN
Computer crime
Metrics
machine learning
composability
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
DDoS Attacks
software defined networking
security
telecommunication security
Servers
computer network security
biblio
Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN)
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
SDN
virtual machines
virtual machine
Software Defined Network (SDN)
sFlow mitigation technology
sFlow
real time detection
Mininet
DDoS attack mitigation
distributed denial of service attacks
telecommunication control
Switches
resilience
Attack detection
Computer crime
OpenFlow
network traffic
Metrics
composability
pubcrawl
Human behavior
DDoS Attacks
software defined networking
real-time systems
Protocols
telecommunication traffic
DDoS
computer network security
biblio
Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
routing overhead
DDoS attack mitigation
vehicular ad hoc network
VANETs Security
NS-2
network packet loss
network environment
mobile ad hoc networks
greedy approach
distributed denial of service attacks
attack topology
DDoS Attack
resilience
Attack detection
telecommunication network topology
attack mitigation
network throughput
Throughput
Measurement
telecommunication network routing
Metrics
vehicular ad hoc networks
VANETs
Routing
composability
pubcrawl
Human behavior
DDoS Attacks
computer network security
Computer crime
biblio
Secure Sensor Design for Resiliency of Control Systems Prior to Attack Detection
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Markov processes
stochastic systems
stochastic control systems
stochastic control scenarios
sensor outputs
security of data
secure sensor design
Scalability
Resiliency
resilience
Random variables
Radio frequency
pubcrawl
process control
possible attacks
Attack detection
Human behavior
Gaussian processes
Games
game theory
Detectability
defense mechanism
cyber physical systems
Cyber Physical System
Cost function
controlled Gauss-Markov process
Control Theory
control systems
control objectives
biblio
Using Hardware Performance Counters to Detect Control Hijacking Attacks
Submitted by aekwall on Mon, 10/14/2019 - 10:21am
rop attacks
Attack detection
composability
Hardware performance counters
Human behavior
Human Factors
malicious code execution
pubcrawl
Resiliency
return oriented programming
Scalability
security
biblio
A Multi-layered Outlier Detection Model for Resource Constraint Hierarchical MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
MANET Attack Detection
security dimensions
resource constraint hierarchical MANET
Resiliency
quality-of-service parameters
quality of service
QoS
pubcrawl
Outliers
outlier minimum improvements
novel multilayered outlier detection algorithm
network performance
multilayered outlier detection model
mobile ad hoc networks
Metrics
ad hoc communication MANET
layered architecture
inliers
high security level
hierarchical similarity metric
hierarchical categorized data
fixed infrastructure
Dynamic Network
distributed network
density-based clustering
decentralized network
Data collection
data analysis
composability
Attack detection
biblio
Smart Grid Security Evaluation with a Big Data Use Case
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
pubcrawl
smart power grids
Smart Grids
smart grid systems
smart grid security evaluation
Smart Grid
security of data
security
Scalability
Resiliency
resilience
Attack detection
power system
Power measurement
power engineering computing
Metrics
Energy Sector
Decision trees
Big Data techniques
big data security
Big Data
biblio
An Attack Graph-Based On-Line Multi-Step Attack Detector
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
resilience
pubcrawl
Metrics
Resiliency
composability
Attack detection
attack graphs
Alert correlation
Attack Visualization
Multi-step Attacks
biblio
Actuator deception attack detection and estimation for a class of nonlinear systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
pubcrawl
H∞optimisation
H∞performance optimization
Human behavior
Metrics
Monitoring
nonlinear control systems
nonlinear discrete-time systems
nonlinear systems
estimation theory
Resiliency
Safety
Safety Monitoring System
security of data
state/output estimator
system running status monitoring
unknown deception attacks
unknown inputs
attack/attacker action estimator
active safety monitoring system
Actuator Deception Attack
actuator deception attack detection
actuator security
actuators
Attack detection
attack detector
Attack Estimation
active attack estimator
composability
control system analysis
control system synthesis
control systems safety
Detectors
discrete time systems
estimation
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »