Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attacks
biblio
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures
Submitted by aekwall on Mon, 10/05/2020 - 10:46am
cyber-physical systems security
CPS resilience
wastewater treatment plant
wastewater treatment
System Dynamics
situational awareness and security metrics
single system-wide measure
Resilience Metrics
resilience indexes
remote monitoring
general-purpose evaluation methodology
digital computers
cyber-physical system resilience
critical feedback control loop
bulky system logs
CPSS
security of data
Critical Infrastructure Protection
resilience
Indexes
cyber physical systems
Cyber Attacks
Data mining
Mathematical model
risk management
internet
pubcrawl
Resiliency
critical infrastructures
cyber security
security
Monitoring
biblio
Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs
Submitted by aekwall on Mon, 09/28/2020 - 10:34am
microcontrollers
software-based virtualization
software-based security framework
secure software updates
pure software-based approaches
modern automotive architectures
legacy automotive ECUs
insecure legacy ECUs
hardware-based security modules
electronic engineering computing
diagnostics security services
automotive electronics
Automotive engineering
Automated Secure Software Engineering
Cyber Attacks
standards
composability
pubcrawl
Resiliency
computer architecture
embedded systems
Software
security of data
cyberattack
biblio
Towards Protection Mechanisms for Secure and Efficient CAN Operation
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
efficient CAN operation
security solutions
controller area networks
CAN bus
access controller
automotive security
broadband services
CAN data-link layer
CAN Security
Clocks
fault confinement mechanism
iterative research
message priority
numerous proposed solutions
protection mechanisms
real-time message deliverability
secure CAN operation
confinement
Protocols
Automotive engineering
computer network security
telecommunication traffic
authorisation
real-time systems
Resiliency
pubcrawl
composability
automobiles
Industry 4.0
privacy
authentication
Cyber Attacks
cyber-physical systems
error detection
timing
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 12:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Mathematical model
weighted oriented graphs
system protection analysis
Software
Servers
security of data
security
reference security models
reference security model
pubcrawl
production engineering computing
open systems
modeling of protected systems
automated systems
integrated circuits
Information services
information resources
Industrial Control Systems
industrial control
graph theory
Data protection
Cyber Attacks
critical infrastructures
critical infrastructure facilities
Control Theory
control engineering computing
biblio
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
game-theoretic approach
Stackelberg game model
simulations
Resiliency
resilience
pubcrawl
Metrics
measurement signals
Markov processes
Markov game model
Jamming
invasive software
HVAC system
HVAC
host machine infection
Games
Atmospheric modeling
game theory
game theoretical techniques
cyberattack
cyber-physical systems
cyber-attacks
Cyber Attacks
Current measurement
CPS modeling
CPS
control-loop constraints
control systems
control loop
composability
check blocks
BLOC
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
stochastic petri nets
Damage Assessment
transmission line protection systems
substation
power transmission protection
power system structure
power system components
Petrinet
nonintelligent attacks
intelligent attack
IEEE39 bus system
electrical network
cyber security risk assessment method
cyber physical performance
attacks
power supply
security of data
Cyber Physical System
smart power grid
power transmission lines
Stochastic processes
substation automation
cyber security
Petri nets
power system security
power engineering computing
probability
Cyber Attacks
smart power grids
Risk
pubcrawl
Resiliency
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
Law
Wireless communication
version number attack
smart power grids
smart meters
Smart Grid
Scalability
RPL
Routing protocols
routing protocol for low-power and lossy networks
Routing
Resiliency
resilience
pubcrawl
power system security
advanced metering infrastructure
IETF ROLL working group
filtering theory
Cyber Attacks
cuckoo-RPL
cuckoo filter.
cuckoo filter based RPL
computer network security
computer network reliability
Blackhole attack
authorisation
authentication
AMI network
Advanced Metering Infrastructure (AMI)
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »