Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attacks
biblio
Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
power system faults
message spoofing attacks
Metrics
packet radio networks
power engineering computing
power grid efficiency
power grid system
power grid vulnerability analysis
power grids
internet
power system reliability
power system security
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security of data
cyber-attacks
Base stations
Cascading Failures
cellular radio
complex CPPS
complex cyber physical power system
composability
Compositionality
Cyber Attacks
authentication
Cyber-physical power system (CPPS)
DoS attacks
DTU
general packet radio service
GPRS
GPRS-based SCADA systems
Ground penetrating radar
IEEE 9-node system
biblio
Vulnerability Analysis of Electrical Cyber Physical Systems Using a Simulation Platform
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
power grid vulnerability analysis
Vulnerability Analysis
Vulnerability
transmission lines
Topology
splitting incident
Simulation Platform
Resiliency
resilience
pubcrawl
protection procedure
power transmission
power system security
Power system protection
power system faults
power grids
cascading failure propagation
power grid system
Power Grid
Metrics
Mathematical model
Integrated circuit modeling
IEEE 39-bus system
Generators
framework
electrical cyber physical systems
ECPS
cyber-physical systems
Cyber Attacks
Compositionality
composability
Communication networks
biblio
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
Scalability
patient personal information
patient wellness information
personal health
privacy
pubcrawl
Read only memory
resilience
Resiliency
Medical services
security of data
Wearable devices
wearable IoT healthcare applications
wearables security
XC7Z030 - 3fbg676 FPGA device
Xilinx IP cores
Xilinx Zynq-7000
Healthcare
Algorithm design and analysis
Complexity theory
Cyber Attacks
cyber security architecture
Cyber-security
encryption
field programmable gate arrays
health care
AES
Human behavior
Internet of Things
IoT
IoT based healthcare devices
IoT healthcare industry
IP networks
medical information systems
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience
biblio
Cyber attacks targeting Android cellphones
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
resilience
mobile attack approaches
Mobile communication
mobile computing
mobile phones
Primary Mobile Hack Builder
primary mobile hack builder software
pubcrawl
radiocommunication
Metrics
Resiliency
Scalability
security of data
smart phones
SMS information
Software
software based radio circuit
conversation eavesdropping
android encryption
Android operated cellphone control
Android smartphone
application based attacks
Application Based Mobile Attackers
Cameras
cellphone camera
computer software
Android (operating system)
Cyber Attacks
encryption
frequency based attacks
Frequency Based Mobile Attackers
GSM
Human behavior
Human Factors
biblio
Advanced Methodologies to Deter Internal Attacks in PTP Time Synchronization Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
network infrastructures
trusted platform modules
time synchronization supervisors
time synchronization
Synchronization
synchronisation
security
Resiliency
public key infrastructures
public key cryptography
pubcrawl
PTP time synchronization networks
Protocols
precision time protocol
network intrusion detection systems
accurate time synchronization
microsecond level
IP networks
internal attacks
industrial environments
device time synchronization
delays
cyber-attacks
Cyber Attacks
Cryptography
computer network security
computer network
composability
Clocks
biblio
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Proactive Cyber Defence
infrastructure data analysis
Mission Assurance
mission-context information
near real-time defensive cyber operations
network operators
network responses
network topology
network-based CoA
network-based courses-of-action
Defence Research and Development Canada
pubcrawl
Resiliency
Responsive Cyber Defence
security
situational awareness
Software
Software Vulnerability Mitigation
vulnerability mitigation
Cyber Attacks
Automated computer network defence
Automated Cyber Defence
automated mission-oriented decision support
Automated Response Actions
composability
Computational modeling
computer architecture
computer network security
computer networks
ARMOUR
cyber defence integration framework
cyber defence science-and-technology platform
data analysis
Data models
data sources
Decision Making
decision support
Decision support systems
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
User Behavior Anomaly Detection for Application Layer DDoS Attacks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
legitimate application layer requests
web services
Web servers
user behavior anomaly detection method
subspace anomaly detection method
student resource portal
Resiliency
pubcrawl
Protocols
protocol characteristics
principle component analysis
principal component analysis
Penetration Testing
PCA-subspace
PCA
Metrics
anomalous behavior instance detection
internet
Human behavior
HTTP Web server logs
HTTP DDoS attacks
file servers
feature extraction
distributed denial of service attacks
DDoS attack detection
Cyber Attacks
computer network security
Computer crime
composability
Browsers
application layer DDoS attacks
Anomaly Detection
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »