Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attacks
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
Safe-Guarding Home IoT Environments
user-comprehensible solution
user-centric cyber security
transparent cyber security environment
re-configurable solutions
Personalised Real-time Risk Control
multilayered architecture
IoT-based smart homes
IoT smart home residents
H2020 European research project GHOST
GHOST security framework
disruptive software-enabled network security solutions
cyber security services
cyber security architecture
architectural layers
Network Security Architecture
Computer crime
Cyber Attacks
security challenges
Smart Home
home automation
reference architecture
Smart homes
Logic gates
IoT security
privacy
pubcrawl
Resiliency
computer architecture
Protocols
Internet of Things
computer network security
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
Design of Software Rejuvenation for CPS Security Using Invariant Sets
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
malicious modifications
software rejuvenation design
software engineering
security of data
Safe Coding
run-time system
run-time code
Resiliency
resilience
quadrotor system
pubcrawl
policy-based governance
online software
Metrics
collaboration
Lyapunov methods
Lyapunov function
invariant sets
invariance
Human Factors
Human behavior
Data protection
cyber-physical systems
Cyber Attacks
CPS Security
control-theoretic perspective
control engineering computing
biblio
Security challenges for Water Distribution System Using Supervisory Control and Data Acquisition (SCADA)
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
pubcrawl
water distribution system security
water distribution system
security services
security of data
SCADA Systems Security
SCADA systems
SCADA networks
Resiliency
public utilities
autonomous SCADA systems
Intrusion access control
Human behavior
elastic search
distribution systems
distributed supervisory control and data acquisitions
data modelling
data acquisition
Cyber Attacks
Compositionality
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
IEC 60870-5-104 protocol
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
Petri nets
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
pubcrawl
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
cyberattack
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
biblio
Sequential Node/Link Recovery Strategy of Power Grids Based on Q-Learning Approach
Submitted by grigby1 on Mon, 03/02/2020 - 1:36pm
power system reliability
System recovery
smart power grids
Smart Grids
sequential recovery
sequential node-link recovery strategy
security of data
restoration process
Resiliency
resilience
Reinforcement learning
recovery strategies
Q-learning approach
q-learning
pubcrawl
power system restoration
Cascading Failures
Power system protection
power system faults
power grids
power grid test benchmarks
Power Grid
power generation
power flow cascading failure
power engineering computing
physical attacks
Load flow
learning (artificial intelligence)
large-scale smart grids
grid defender
Cyber Attacks
biblio
Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
machine learning
Text Mining
social networking site Twitter.com
social networking (online)
social media data mining
social media
situational awareness
sentiment analysis
security relevant information retrieval
security of data
Resiliency
resilience
Ransomware
pubcrawl
Metrics
composability
internet
information retrieval
Data mining
data analytics techniques
data analysis
data aggregation
cybersecurity tweet dataset
Cybersecurity
cyberattack
cyber threat landscape
cyber situational awareness information
cyber situational awareness
cyber risk
Cyber Attacks
biblio
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
information security
visualization
Topology
situational awareness
security of data
security
Resiliency
resilience
pubcrawl
Monitoring
Metrics
composability
digital twins
Data collection
cyber-physical systems
cyber situational awareness framework
cyber situational awareness
cyber situation
cyber defense
Cyber Attacks
CPSS
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
biblio
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Human Factors
Xyreum
time-based zero-knowledge proof of knowledge
time-based zero knowledge proof of knowledge
mutual multifactor authentication
Industrial Internet of Things
enhanced IIoT security
computational complexity
computation complexity
blockchain-based security protocol
blockchain solutions
blockchain group decision-making process
blockchain designs
multifactor authentication
authenticated encryption
Privacy-preserving
security
Scalability
Distributed databases
Cyber Attacks
Decision Making
blockchain
Metrics
Cryptography
privacy
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »