Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
networked system
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection
Submitted by aekwall on Mon, 05/04/2020 - 10:15am
deep learning
networked system
network security practices
network attack detection technology
network attack detection tasks
network attack detection
Graph Kernel
flow-based network attack detection
deep learning architecture
anomaly-based approaches
Network Security Architecture
deep neural networks
Computer crime
network traffic
convolutional neural nets
Neural networks
graph theory
pubcrawl
Resiliency
learning (artificial intelligence)
computer architecture
Kernel
IP networks
computer network security
biblio
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/01/2019 - 10:30am
security
lightweight monitoring system
malicious data-integrity attacks
malicious nodes
Metrics
Monitoring
network attacks
networked system
pubcrawl
resilience
Resiliency
IoT security
security of data
sensor correlations
Silicon
telecommunication security
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
WSNs
ECA rule-based wireless sensor networks
abnormal-node detection
abnormality thresholds
Correlation
data integrity
data integrity attack
data-integrity detection
dependability
dependable monitoring system
distributed system
abnormal nodes
ECA rules
embedded sensor devices
event-condition-action rule
failure handling
Fuzzy logic
heterogeneous sensor readings
hierarchical abnormal-node detection
hierarchical framework
Internet of Things
biblio
Improving network connectivity using trusted nodes and edges
Submitted by grigby1 on Thu, 08/23/2018 - 10:52am
Computing Theory
Economics
graph theory
Heuristics
network connectivity
network theory (graphs)
networked system
pubcrawl
Redundancy
resilience
Robustness
security
trusted edges
trusted nodes
TV