Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructure
biblio
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
oAuth2.0
verification mechanism
update mechanisms
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TLS 1.3
tamper resistant endpoints
Software
smart buildings
smart building cyber-physical systems
security of data
secure communication channels
Resiliency
pubcrawl
composability
IT-security
IoT
Internet of Things
integrity measurement mechanisms
hardware-based security
Hardware
firmware
data integrity
cyber-physical systems
Cryptography
critical infrastructures
critical infrastructure
CPS devices
Containers
computer science
biblio
An overview of cyber-attack vectors on SCADA systems
Submitted by aekwall on Wed, 02/13/2019 - 12:00pm
pubcrawl
transport protocols
TCP/IP based protocols
supervisory control and data acquisition systems
Software
security of data
security
Scalability
SCADA systems
SCADA
Resiliency
Attack vectors
Protocols
Monitoring
Industrial Control Systems
Human behavior
cyber-attack vectors
cyber-attack
critical infrastructures
critical infrastructure
Buffer overflows
biblio
Integrating Design and Data Centric Approaches to Generate Invariants for Distributed Attack Detection
Submitted by grigby1 on Fri, 09/28/2018 - 4:05pm
Cybersecurity
resilience
machine learning
Cyber-physical attacks
pubcrawl
Resiliency
Human behavior
critical infrastructure
policy-based governance
association rule mining
distributed attack detection
water treatment plant
E-Government
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Lateral Thinking for Trustworthy Apps
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
pubcrawl
Trustworthy Systems
trustworthy apps
Trusted Computing
trusted component ecosystem
Substrates
security technologies
security of data
Secure System Design
Resiliency
composability
lateral thinking
Kernel
Isolation technology
Hardware
cyber physical systems
Cryptography
critical infrastructures
critical infrastructure
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
smart grid communications
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
port mutation
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
end-to-end IP-Hopping technique
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
attack complexity
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
biblio
A symmetric address translation approach for a network layer moving target defense to secure power grid networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
power system security
wide area networks
symmetric packet scheduling rules
symmetric address translation
supervisory control and data acquisition network
supervisory control and data acquisition
Substations
security
scheduling
SCADA systems
SCADA network
SCADA
Resiliency
pubcrawl
computer network security
power grids
power grid network security
Network Address Translation
MTD
moving target defense
Metrics
Logic gates
Local area networks
IP-Hopping
IP networks
Cyber Physical System
critical infrastructure
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
IP networks
Semantics
Routing
Resilient Networks
Resiliency
Reliability
pubcrawl
Power Grid
overlay networks
North America
network infrastructure
Monitoring
malicious attacks
composability
IP infrastructure
intrusion-tolerant overlay implementation
intrusion-tolerant network service
intrusion tolerance
internet
high-value applications
global cloud
Europe
East Asia
critical infrastructure
computer network security
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
file
Toward a Cyber Resilient and Secure Microgrid Using Software-Defined Networking
Submitted by thurlwel on Fri, 09/01/2017 - 11:55am
critical infrastructure
Cyber-Resilience
Cyber-security
microgrid
protection
Science of Security
software-defined networking
Hard Problems
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »