Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructures
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
Ransomware Injection
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
cyber attack
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
cyber physical systems
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
invasive software
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 11:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)
forum
Call for Papers: 27th Annual Network and Distributed System Security Symposium
Submitted by willirn1 on Wed, 07/03/2019 - 3:46pm
Call for Papers
27th Annual Network and Distributed System Security Symposium 2020
February 23-26, 2020
San Diego, CA
Calls for Papers
Automotive
Design Automation Tools
Critical Infrastructure
Science of Security
CPS Technologies
Foundations
critical infrastructures
anti-malware
network and distributed systems
network and distributed systems secuirty
Cyber Crime Prevention Model
Architectures
design
security
cyber security
Announcement
biblio
Malware propagation effects on SCADA system and smart power grid
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
power engineering computing
smart power grids
Smart Grids
simulated smart power grid environment
sensors
SCADA Systems Security
SCADA systems
SCADA system
Resiliency
pubcrawl
power system security
power grids
power generation
composability
Phasor measurement units
openDSS
OMNeT++ simulator
malware propagation effects
malware
invasive software
Human behavior
grid computing
cyberattack
Cyber Attacks
critical infrastructures
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
open SCADA protocols
Training
SVM
Support vector machines
support vector machine
supervisory control and data acquisition systems
security of data
SCADA Systems Security
SCADA systems
SCADA
Resiliency
Random Forest
pubcrawl
Protocols
Pipelines
Payloads
Anomaly Detection
network attacks
network attack detection
missing data estimation
malicious intrusions
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Human behavior
gas pipeline system
F1 score
data normalization
critical infrastructures
control engineering computing
composability
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by willirn1 on Thu, 05/30/2019 - 4:04pm
Internet of Things
Vanderbilt
Transportation
security of data
security economics
security
resilient IIoT systems
resilience
Redundancy
production engineering computing
Investment
actuators
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
control
biblio
Information Requirements for National Level Cyber Situational Awareness
Submitted by grigby1 on Thu, 03/28/2019 - 3:13pm
Information Assurance
Stakeholders
situational awareness
security of data
Resiliency
resilience
pubcrawl
nonadversarial service management mistakes
national level cyber situational awareness
national information assurance exercise
Metrics
information requirements
information elements
adversarial behavior
government officials
Government
Electronic mail
cyber situational awareness-decision-makers
cyber security
critical infrastructures
critical infrastructure
Crisis Management
Computer crime
composability
common operational picture
adversarial cyberattacks
biblio
Towards Situational Awareness of Botnet Activity in the Internet of Things
Submitted by grigby1 on Thu, 03/28/2019 - 3:12pm
deep learning
word embedding
mirai
long short term memory networks
situational awareness
cyber situational awareness
Data Analytics
Insurance
critical infrastructures
DDoS
botnet
Computer crime
Servers
malware
IoT
learning (artificial intelligence)
invasive software
composability
Resiliency
Metrics
pubcrawl
Decision Making
resilience
security of data
risk management
Internet of Things
data privacy
biblio
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
oAuth2.0
verification mechanism
update mechanisms
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TLS 1.3
tamper resistant endpoints
Software
smart buildings
smart building cyber-physical systems
security of data
secure communication channels
Resiliency
pubcrawl
composability
IT-security
IoT
Internet of Things
integrity measurement mechanisms
hardware-based security
Hardware
firmware
data integrity
cyber-physical systems
Cryptography
critical infrastructures
critical infrastructure
CPS devices
Containers
computer science
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »