Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
detection
file
CYDER- CYbersecure Distribution systems with power Electronically interfaced Renewables
Submitted by mehrizi on Wed, 04/08/2020 - 3:33pm. Contributors:
Ali Mehrizi-Sani
Cheng-Ching Liu
Cybersecurity
power electronics
renewables
detection
Lightning Talks
1837700
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
A Privacy Preserving Approach to Energy Theft Detection in Smart Grids
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
Resiliency
Metrics
photovoltaics
policy-based governance
power system security
privacy
privacy preserving approach
pubcrawl
resilience
malicious activity
Scalability
Smart Grid
Smart Grid Privacy
Smart Grids
Smart Metering
smart meters
smart power grids
collaboration
Human Factors
Human behavior
Geospatial analysis
financial gain
Euclidean distance
energy theft detection
energy theft
energy measurement
energy generation measurements
distributed power generation
distributed energy resources
detection
DER generation measurements
Cryptography
composability
biblio
A System Design of Real-Time Narrowband Rfi Detection And Mitigation for Gnss-R Receiver
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
resilience
mitigation
NF
Passband
pubcrawl
radio detection
radio receivers
radiofrequency interference
real-time narrowband radiofrequency interference detection
real-time narrowband radiofrequency interference mitigation
real-time NB RFI detection
real-time NB RFI mitigation
Receivers
Metrics
Resiliency
RFI
satellite navigation
signal-to-noise ratio
SNR
system analysis and design
system design
threat mitigation
white narrowband interference
Wireless communication
WNBI
FPGA
band-stop filters
cascading IIR band-stop filters
cGNSS-R
continuous wave interference
conventional GNSS-R
CWI
DDM
delay-Doppler map
detection
field programmable gate arrays
fixed-point implementation
Band-pass filters
Global navigation satellite system
Global Navigation Satellite Systems-reflectometry
GNSS-R
Human behavior
Human Factors
iGNSS-R
IIR BSF
IIR filters
IIR notch filter
interference suppression
interferometric GNSS-R receivers
biblio
Cyber Attacks Real Time Detection: Towards a Cyber Situational Awareness for Naval Systems
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
maritime cyber situational awareness elaboration
situational awareness
ships
security of data
Resiliency
resilience
real-time data
public ransomware attacks
pubcrawl
platform management
moving information system
Metrics
ashore assets
maritime actors
maritime
marine engineering
digital systems
detection
cyber threats
cyber situational awareness
cyber situation recognition
cyber attack real time detection
composability
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 2:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
biblio
Cloud Computing: A Paradigm of More Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 11:22am
Resiliency
resilience
pubcrawl
policy-based governance
outsource
organization
Metrics
insider threat
insider
Human behavior
detection
collaboration
Cloud Computing
biblio
An Elaborate Comprehensive Survey on Recent Developments in Behaviour Based Intrusion Detection Systems
Submitted by aekwall on Mon, 01/20/2020 - 11:56am
Intrusion Detection
telecommunication traffic
survey
security of data
Resiliency
Radio frequency
pubcrawl
network activity
intrusion detection technology
Intrusion Detection Systems
Artificial Neural Networks
intrusion
IDS
detection
data monitoring
composability
Cloud Computing
Classification algorithms
behaviour based intrusion detection systems
behavior
file
A Framework for Enhancing the Resilience of Cyber Attack Classification and Clustering Mechanisms
Submitted by Shouhuai Xu on Tue, 01/07/2020 - 11:46am. Contributors:
Shouhaui Xu
Yanfang Ye
Project Slides
data science
intrusion
detection
1814825
SaTC PI Meeting 2019
biblio
Compressive Detection of Random Signals from Sparsely Corrupted Measurements
Submitted by grigby1 on Tue, 12/10/2019 - 11:21am
privacy
testing
Task Analysis
sparsely corrupted measurements
Sparse matrices
sparse error
signal reconstruction
signal processing tasks
signal processing
signal detection problem
signal detection
Resiliency
resilience
random signals
pubcrawl
composability
Noise
Detectors
detection
dense noise
data amount
cyber physical systems
Cyber Physical System
Current measurement
CSP techniques
CS reconstruction
compressive sampling
compressive detection problem
Compressive detection
compressed sensing
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »