Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication process
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
A Cyber Communication Package in the Application of Grid Tied Solar System
Submitted by grigby1 on Mon, 02/10/2020 - 10:30am
Rivest
internet
internet connected computers
latency reduction
Load modeling
Metrics
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
Human Factors
RSA algorithms
Scalability
secured socket layer
secured socket layer (SSL)
Servers
Shamir and Adleman (RSA)
Shamir and Adleman algorithms
Solar system
SSL
SSL Trust Models
Cryptography
advanced encryption standard (AES)
AES algorithm
bidirectional communication strategy
communication concept
communication methodology
communication process
communication program
Computational modeling
Computer crime
Computers
advanced encryption standard
cyber communication package
cyber network
cyber security
cyber security arrangement
data exchange
electrical data
electronic data interchange
grid connected solar system
grid tied solar system
Human behavior
biblio
A Social Engineer in Terms of Control Theory
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
password
tools
terminal model
telecommunication control
social engineering
social engineer
security of data
security
Resiliency
resilience
pubcrawl
psychology
Planning
communication algorithms
nonstochastic communication object
information security specialists
information security
human model
human factor
Handheld computers
effective communication
Control Theory
contracts
composability
communication process
communication control system
biblio
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
smart meter
nonlight-weight protocol
portable access
pubcrawl
public key cryptography
Security analysis
smart cards
Smart Grid
smart grid technology
mobile computing
smart power grids
subsequent communication
telecommunication security
two factor authentication
two-factor lightweight user authentication scheme
two-factor user authentication
user anonymity
anonymous and untraceability
message authentication
Lightweight Encryption
lightweight anonymous mobile user authentication scheme
Human Factors
Human behavior
electric vehicle
data privacy
Cryptographic Protocols
critical security
communication process
cloud server
charging process
biometric encryption
authorisation
authentication process