Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standard protocols
biblio
D-IDS for Cyber-Physical DER Modbus System - Architecture, Modeling, Testbed-based Evaluation
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
IDS detection accuracy
cyber-physical DER Modbus devices
D-IDS
data-integrity attacks
DER
DER inverters
DER Modbus communication
discrete data points
DoS packets
DoS type attacks
hardware-in-the-loop
hardware-in-the-loop CPS DER
analog data points
IDS detection rate
IEEE 13-bus distribution grid
Modbus-specific IDS rule sets
model-based approach
native clear-text packet
open- source IDS rule syntax formats
physics-based threshold bands
testbed-based evaluation
time 0.25 ms
transaction-based threshold bands
CPS Security
pubcrawl
Resiliency
computer network security
Data models
Computational modeling
Smart Grid
standards
composability
Denial of Service attacks
Protocols
computer architecture
standard protocols
Syntactics
resilience
data integrity
timing
distribution networks
IDS
distributed energy resources
distributed intrusion detection system
Modbus
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
Trust-Based Framework for Resilience to Sensor-Targeted Attacks in Cyber-Physical Systems
Submitted by grigby1 on Mon, 08/05/2019 - 11:36am
sensor-targeted attacks
Observers
policy-based governance
primary sensor
process control
process state
pubcrawl
resilience
Resiliency
Safety
Scalability
security
networked control systems
sensors
Silicon
stability
standard protocols
state estimates
state estimation
trust-based framework
Trusted Computing
weighted consensus
wireless sensor networks
false trust
closed loop systems
closed-loop control
collaboration
communication infrastructure
compromised sensors
computer network security
cyber-physical plants
cyber-physical systems
entire plant
false data injections
CPS resilience
far-flung locations
feedback
feedback signal
interconnected processes
local data
local process
malicious agents
Measurement
Monitoring
multisensor networked physical experiment