Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network attack
biblio
Research on Network Attack Information Acquisition and Monitoring Method based on Artificial Intelligence
Submitted by grigby1 on Fri, 12/09/2022 - 5:55pm
monitoring method
security situational awareness
Resiliency
resilience
pubcrawl
Predictive Metrics
Personnel
network security
network attack
National security
Artificial Intelligence
Metrics
Market research
IP networks
information acquisition
Human behavior
Cyberspace
composability
artificial intelligence security
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 2:57pm
network intrusion detection system
Training data
Training
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
principal component analysis
networking technologies
Network reconnaissance
network packets
anomaly based IDS
network attack
machine learning
intrusion detection system
Intrusion Detection
IDS systems
Hidden Markov models
feature extraction
entropy based discretization technique
Entropy
discretization
computer network security
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
Deep Learning Poison Data Attack Detection
Submitted by grigby1 on Wed, 11/04/2020 - 2:15pm
model definitions
variational inference approach
Variational inference
transfer learning
training phase
testing data
system-critical applications
Scalability
Resiliency
resilience
pubcrawl
pre-trained model parameters
poisonous data
poisoned training data
neural nets
network attack
adversarial information
MNIST data
maximum entropy principle
Maximum Entropy method
learning (artificial intelligence)
Human behavior
Entropy
deep neural networks
deep learning poison data attack detection
deep learning
computer network security
CNN model
Bayesian statistic
attacking training data
AI Poisoning
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Ontology
Vulnerability
security risk model
security of data
security
pubcrawl
power terminal device
power system stability
power system security
power IoT terminal device
power grids
power engineering computing
operating systems
ontology-based knowledge representation method
ontology based security risk model
APT attack
ontologies (artificial intelligence)
Ontologies
networked power terminal equipment oriented cyberspace security
network attack
Knowledge representation
IoT based technology
Internet of Things
Hardware
electric power IoT
Cryptography
computational intelligence
Compositionality
composability
APT security attack
biblio
If Air-Gap Attacks Encounter the Mimic Defense
Submitted by grigby1 on Fri, 08/07/2020 - 3:37pm
resilience
mimic defense
Hard disks
Electromagnetic radiation
dynamic heterogeneous redundancy structure
dynamic heterogeneous redundancy
DHR structure
air-gap attacks
air-gap attackers
Air gaps
game theory
Transmitters
Atmospheric modeling
security
Metrics
malicious software
malware
composability
network attack
Intrusion Detection
computer network security
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
computer centres
System recovery
supervisory control
Spire
sophisticated network-level attacks
simultaneous intrusions
SCADA system management
power grid infrastructure
network-attack-resilient intrusion-tolerant SCADA
nation-state-level attackers
data acquisition systems
control centers
network attack
data centers
intrusion tolerance
Power Grid
security of data
resilience
power system reliability
fault tolerant computing
power grids
Substations
network attacks
composability
pubcrawl
Resiliency
SCADA systems
SCADA
Protocols
distributed processing
Monitoring
computer network security
biblio
DDOS Attack Detection Prevention in SDN using OpenFlow Statistics
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
DDoS
traffic statistics
Traffic simulation
telecommunication switching
programmable network
packet rate
OpenFlow statistics
network attack
legacy old networks
forwarding rule
forwarding logic
DDoS Attack Prevention
DDoS attack detection
centralized architecture
computer network security
Mininet
Software Defined Network
statistical analysis
SDN
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
distributed denial of service attack
telecommunication traffic
biblio
Research on Improving Network Security of Embedded System
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
information technology
Servers
Resiliency
pubcrawl
promotion countermeasures
network security
network attack
mobile embedded systems
Metrics
IPsec
internet
authentication
embedded systems
embedded system network
Embedded System
embedded network security
computer technology
computer network security
composability
Communication networks
certification
brand-new computer technology
biblio
Detecting and Mitigating Low-and-Slow DoS Attacks in NoC-based MPSoCs
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
low-and-slow DoS attack
NoC-based MPSoC architectures
NoC-based MPSoC
NoC
network-on-chip
Network on Chip (NoC)
network attack
Muti-Processor System on Chip (MPSoC)
multisource attacks
MultiProcessor Systems-on-Chip
multiprocessing systems
network on chip security
Internet of Things
internet
Distributed Monitoring
denial-of-service attacks
Denial of Service (DoS) Attack
computer network security
Metrics
Resiliency
resilience
Scalability
1
2
next ›
last »