Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attacks
biblio
Cyber Attacks on Power System Automation and Protection and Impact Analysis
Submitted by grigby1 on Tue, 10/12/2021 - 2:44pm
power grid vulnerability
substation automation
standards
Smart Grids
Resiliency
real-time systems
pubcrawl
Power system protection
power grid vulnerability analysis
blackout
Metrics
IEC standards
IEC 61850
cyber security
Cyber Attacks
cyberattack
composability
Cascading Failures
biblio
Data Analytics-Enabled Intrusion Detection: Evaluations of ToNİoT Linux Datasets
Submitted by aekwall on Wed, 07/07/2021 - 5:09pm
Intrusion Detection
virtualization privacy
security
Resiliency
pubcrawl
privacy
operating systems
Metrics
Linux Systems
Linux
Linux Operating System Security
Internet of Things
Human behavior
dataset
data privacy
Cyber Attacks
computer architecture
composability
Artificial Intelligence
biblio
Identification of Smart Grid Attacks via State Vector Estimator and Support Vector Machine Methods
Submitted by grigby1 on Thu, 05/13/2021 - 12:20pm
Attack vectors
Cyber Attacks
Human behavior
machine learning
power systems
pubcrawl
Reliability
resilience
Resiliency
Scalability
Smart Grid
Smart Grids
state estimator
Support vector machines
Topology
Training
biblio
Demystifying the Cyber Attribution: An Exploratory Study
Submitted by aekwall on Thu, 05/13/2021 - 11:50am
machine learning algorithms
Human behavior
pubcrawl
composability
Metrics
tools
metadata
machine learning
data analysis
attribution
Cyber Attacks
Information systems
face recognition
Regulation
attack patterns
Cyber attributtions
biblio
Assessment of Machine Learning Techniques for Building an Efficient IDS
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
telecommunication traffic
realistic background traffic
IDS dataset
efficient IDS
complex environments
CICIDS2017 dataset
denial-of-service attack
cyberattack
IDS
resilience
Buildings
Cyber Attacks
DDoS Attacks
learning (artificial intelligence)
real-time systems
composability
machine learning techniques
telecommunication security
computer network security
Resiliency
pubcrawl
Intrusion Detection Systems
Intrusion Detection
security
machine learning
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Insurance
User behavior
signal detection
security settings
security of data
security mechanisms
security measures
security
risk-related behaviors
pubcrawl
Particle measurements
optimal investment
online experiment
maximal investment
investment decisions
Investment
alerting system
IDS
Human Factors
human decisions
Human behavior
fourth condition
Decision Making
Cybersecurity
cyber security system design
Cyber Insurance
Cyber Attacks
computer security
Atmospheric measurements
associated costs
Alerting systems
biblio
Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
Neural network (NN)
imbalanced data problem
Imbalanced dataset
Intrusion Detection
learning (artificial intelligence)
machine learning
MLP Neural Network
Multilayer Perceptron
multilayer perceptrons
network security.
Generators
Neural networks
pattern classification
Predictive Metrics
pubcrawl
Scalability
security of data
Training
UGR16 dataset
Cyber Attacks
Compositionality
Resiliency
adversarial samples
Attack detection
attack labels
balanced attack sample dataset
benign data
classification
Information Reuse and Security
Data models
data wrangling
defense mechanisms
Gallium nitride
Generative Adversarial Learning
generative adversarial network
Generative Adversarial Network (GAN)
generative adversarial networks
biblio
Applying of Generative Adversarial Networks for Anomaly Detection in Industrial Control Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:56am
Industrial Control Systems
Training
security of data
Scalability
Resiliency
pubcrawl
production engineering computing
Predictive Metrics
neural nets
Intrusion Detection
Integrated circuit modeling
information security
industrial processes anomaly detection
industrial process
industrial control systems (ICS)
ICS Anomaly Detection
industrial control
ICs
Generators
generative adversarial networks (GAN)
generative adversarial networks
Generative Adversarial Learning
deep learning
Data models
Cyber Attacks
control engineering computing
computer architecture
BiGAN architecture
Anomaly Detection
biblio
Causal Chain of Time Delay Attack on Synchronous Generator Control
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
SCADA systems
physical power grid
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
robust control
modern power grids
Scalability
security
security of data
synchronous generator control
synchronous generators
Time delay
time delay attack
Time measurement
cyber-space leading
attack vector
Chained Attacks
communication technology
Cyber Attacks
cyber intrusion
cyber security
cyber-physical causal chain
cyber-physical systems
attack tree
Delay effects
delays
denial-of-service attack
frequency control
grid cyber security
grid frequency
grid response
load frequency control
biblio
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:57pm
security of data
network intrusion detection system
Neural networks
noise reduction
pubcrawl
reconstruction from partial observation
resilience
Resiliency
Robustness
network intrusion detection
signature-based NIDS
software defined networking
software-defined network
telecommunication traffic
traffic traversing
Zero day attacks
Zero-day attacks
defense
adversarial example attack
adversarial setting
Anomaly Detection
anomaly-based NIDS
attacks network systems
composability
computer network security
Cyber Attacks
adversarial example
denoising autoencoders
Intrusion Detection Systems
Malicious Traffic
Metrics
Monitoring
network attacks
network function virtualization
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »