Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Attacks
biblio
"An efficient classification model for detecting advanced persistent threat"
Submitted by abfox on Tue, 02/14/2017 - 10:44am
Intrusion Detection
Vegetation
Training
targeted attack
pubcrawl170101
pattern classification
Organizations
model
Mathematical model
malware
intrusion prevention systems
advanced persistent threat
international trade
government agencies
firewalls
feature extraction
Cyber Attacks
classification model
APTs
antivirus solutions
advanced persistent threat detection
biblio
Design, deployment and use of HTTP-based botnet (HBB) testbed
Submitted by BrandonB on Wed, 05/06/2015 - 9:23am
HTTP flooding
Web servers
Web access log
real time HTTP-based botnet
malware
invasive software
Intrusion Detection
Internet-connected computer programs
HTTP-GET flooding method
HTTP-based botnet
behavioural-based approaches
http bot traces
HBB testbed
Floods
distributed denial of service attacks
DDoS Attacks
Cyber Attacks
Computer crime
botnet detection systems
botnet
biblio
Operational data classes for establishing situational awareness in cyberspace
Submitted by BrandonB on Tue, 05/05/2015 - 11:30am
networking technologies
US Department of Defense
United States
tactical decision-making
strategic decision-making
security of data
real-time systems
operational needs
operational decision-making
operational data classes
operational cyber environment
Cyber Attacks
military computing
Intrusion Detection
Information systems
Educational institutions
Department of Defense
defence industry
Decision Making
cyberspace operations
Cyberspace
cyber situational awareness
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism
biblio
Survivable SCADA Via Intrusion-Tolerant Replication
Submitted by BrandonB on Thu, 04/30/2015 - 2:07pm
Protocols
Synchronization
survivable SCADA system
Survivability
Servers
security of data
SCADA systems
SCADA architecture
resilience
Reliability
Clocks
production engineering computing
performance degradation
Monitoring
Libraries
intrusion-tolerant replication
intrusion-tolerant protocols
fault tolerance
Cyber Attacks
cyber attack
biblio
Robust H #x221E; cyber-attacks estimation for control systems
Submitted by BrandonB on Thu, 04/30/2015 - 10:59am
Markovian stochastic process
Symmetric matrices
stochastic systems
Stochastic processes
stochastic data DoS attack
stochastic data deception attack
stochastic cyber-attacks
Robustness
robust H∞ cyber-attacks estimation
robust control
quadruple-tank process
QTP
actuators
Markov processes
LMI
linear matrix inequalities
H∞ filters
H∞ filter
H∞ control
estimation
Cyber Attacks
control systems
control system synthesis
Computer crime
file
Active Cyber Defense Dynamics Exhibiting Rich Phenomena
Submitted by shouhuai on Wed, 04/29/2015 - 10:10am. Contributors:
Ren Zheng
Wenlian Lu
Shouhaui Xu
Science of Security
Foundations
cyber defenses
Cyber Attacks
HotSoS 2015
Academia
Presentation
Presentations
file
Achieving High Speed and High Assurance in a Hardware-Based Cross-Domain System Using Guardol
Submitted by Katie Dey on Thu, 04/23/2015 - 5:42pm. Contributors:
David Hardin
Konrad Slind
Presented as part of the
2015 HCSS conference
.
Abstract:
Cyber Attacks
Guardol
high-assurance
National HCSS Conference 2015
Research Organization
Abstract
Presentation
HCSS'15
Sustainable Integrity (HCSS'15)
biblio
InViz: Instant Visualization of Security Attacks
Submitted by llayman on Wed, 09/17/2014 - 5:31pm
Concurrency and Timing
Real-time Systems
Real-Time Coordination
Science of Security
Foundations
ACM CCS
concurrency and timing
Cyber Attacks
cyber security
Cybersecurity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log file
real-time analysis
Real-Time Coordination
real-time systems
Science of Security
visualization
ACM CCS
Cyber Attacks
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
file
Improving Operational Resiliency of Cyber‐Physical Systems to Attacks and Failures
Submitted by BCNeuman on Mon, 02/17/2014 - 3:43pm. Contributor:
Clifford Neuman
CPS Domains
Smart Grid
Energy
autonomy
Cyber Attacks
distributed generation
Energy
CFP Paper Submissions
CFP Submissions
2013 National Workshop on Energy Cyber-Physical Systems
2013
Academia
Position Paper
Publications
« first
‹ previous
…
2
3
4
5
6
7
8
9
10