Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computing nodes
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
biblio
Deep-Learning-Based Network Intrusion Detection for SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
SCADA network protocols
industrial control
Industrial Control Systems
learning (artificial intelligence)
network intrusion detection system
network-based cyber attacks
pubcrawl
realistic SCADA traffic data sets
Resiliency
individual network packets
SCADA system operators
SCADA System Security
SCADA systems
SCADA Systems Security
site-specific network attack
specialized attacks
supervisory control and data acquisition networks
unseen network attack instances
convolutional neural network
ICs
attacks on DNP3 protocol
Compositionality
computer network security
computing nodes
conventional network attacks
conventional SCADA specific network-based attacks
convolutional neural nets
Anomaly Detection
Cyber Attack Detection
deep learning
deep-learning-based network intrusion detection system
energy-delivery systems
field devices
Human behavior
ICS network infrastructure