Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resiliency
biblio
On the Role of Latent Design Conditions in Cyber-physical Systems Security
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
composability
cyber-physical systems
design
i-o systems security
i/o systems security
Industrial Control Systems
io systems security
Metrics
perception
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
Risk
Scalability
biblio
Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
composability
Control applications
Cyber Dependencies
Damage Assessment
Intrusion Detection
intrusion mitigation
Metrics
network intrusion detection
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
resource management
Security of cyber-physical systems
biblio
Buffer Overflow Attack's Power Consumption Signatures
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
channel coding
composability
Cyber Dependencies
cyber physical security
ICS Anomaly Detection
Metrics
Physical layer
physical layer security
physical-layer security
power consumption anomaly detection
pubcrawl
Resiliency
rop attacks
Scalability
side-channel analysis
simple power analysis
biblio
KCAD: Kinetic Cyber-attack Detection Method for Cyber-physical Additive Manufacturing Systems
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
additive manufacturing
composability
CPS Privacy
cyber-physical systems
Intrusion Detection
kinetic cyber-attacks
Metrics
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
security
biblio
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
composability
cyber security
Industrial Control Systems
Metrics
Oil and Gas cyber physical systems
Physical layer
physical layer security
physical security
physical-layer security
pubcrawl
Resiliency
Stackelberg Security Game
biblio
Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
ADS-B
air traffic control
composability
Intrusion Detection
Metrics
multilateration
Physical layer
physical layer security
physical-layer
physical-layer security
pubcrawl
Resiliency
spoofing
biblio
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
composability
Metrics
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
Scalability
Visible Light Communications Security
biblio
Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet
Submitted by grigby1 on Mon, 04/03/2017 - 10:51am
5G
adaptive wormhole
channel reciprocity-based key establishment
composability
Internet of Things
key management
Metrics
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
tactile internet
untrusted relay
wireless physical-layer security
biblio
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding
Submitted by grigby1 on Mon, 04/03/2017 - 10:51am
Adversary Models
ciphertext-only attack
composability
cryptanalysis
information-theoretic security analysis
Metrics
orthogonal blinding
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
theoretical cryptography
biblio
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
Submitted by grigby1 on Mon, 04/03/2017 - 10:32am
Big Data
big data security
big data security metrics
IDS
Industrial Control Systems
Intrusion Detection
intrusion detection system
Intrusion Detection Systems
Metrics
physics-based detection
pubcrawl
Resiliency
Scalability
Security Metrics
stealthy attacks
« first
‹ previous
…
1192
1193
1194
1195
1196
1197
1198
1199
1200
…
next ›
last »