Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Pattern Discovery in Intrusion Chains and Adversarial Movement
Submitted by grigby1 on Mon, 02/17/2020 - 4:16pm
Metrics
Time series analysis
time series
social networks
social networking (online)
situational awareness
Resiliency
resilience
pubcrawl
pattern discovery
organisational aspects
adversarial movement
intrusion stages
intrusion chains
Decision Making
data-driven analysis
Data mining
Cybersecurity
cybercrimes
cyber security
Computer crime
composability
biblio
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
flow-based intrusion detection
vulnerability detection
Compositionality
IoT networks
anomaly detection system
CICIDS2017 dataset
edited nearest neighbors
flow-based anomaly detection
flow-based features extraction
network traffic
level-1 model
level-2 model precision
malicious activity detection
recursive feature elimination
sampling methods
synthetic minority over-sampling technique
two-level hybrid anomalous activity detection
UNSW-15 dataset
Human behavior
security of data
telecommunication traffic
Internet of Things
Protocols
nearest neighbour methods
feature extraction
machine learning
Resiliency
Intrusion Detection
pubcrawl
Metrics
pattern classification
vulnerabilities
Training
Cybersecurity
Anomaly Detection
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
Enhanced Uptime and Firmware Cybersecurity for Grid-Connected Power Electronics
Submitted by aekwall on Mon, 02/17/2020 - 1:22pm
hardware-assisted monitor
distributed energy resource prototype
embedded Linux
encrypted serial communication
firmware cybersecurity
firmware integrity
firmware run-time integrity security
firmware run-time security feature
firmware updating
Grid Security
grid-connected power electronics
digital signal processors
Heart beat
multi-mission controls
operational technology security
power electronics security
power electronics uptime
power flow
run-time security
security techniques
uptime
firmware
Monitoring
Hardware
security
Linux
Resiliency
pubcrawl
composability
Metrics
Cybersecurity
privacy
security of data
power engineering computing
power system security
control systems
power grids
signal processing security
digital signal processing chips
Microprogramming
power electronics
security features
biblio
Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
Submitted by aekwall on Mon, 02/10/2020 - 11:11am
software quality
software assurance
technical debt principal
technical consequences
static analysis techniques
source code maintenance
SecDevOps
malicious external attacks
malicious attack tactics
external cybersecurity attacks
external attack tactics
exploitable source code vulnerabilities
cybersecurity attack tactics
Common Weakness Enumerations
system weaknesses
technical debt
security of data
quality assurance
Scalability
program diagnostics
source code (software)
software maintenance
static analysis
computer security
Cybersecurity
tools
composability
pubcrawl
Software measurement
Software
Organizations
biblio
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
integrated circuits
WebUSB
public personal identification service
multifactor web authentication system
Multi-factor authentication
Individual Number Card
cryptographic authenticator
multifactor authentication
Pins
Digital identity
Human Factors
Servers
Public key
password
authentication
Cybersecurity
Internet users
internet
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Towards Automated Security Vulnerability and Software Defect Localization
Submitted by grigby1 on Mon, 02/10/2020 - 10:36am
program diagnostics
undiscovered vulnerabilities
tools
static code analysis
Software systems
software maintenance
software defects
software defect localization
software defect
security vulnerability
security vulnerabilities
security of data
security
resilience
static analysis
modern software
Defect Localization
Cybersecurity
Correlation
Computer bugs
bug
automated security vulnerability
Automated Secure Software Engineering
Resiliency
composability
Human behavior
pubcrawl
biblio
Industrial Control Systems (Ics) Security in Power Transmission Network
Submitted by grigby1 on Tue, 01/21/2020 - 11:15am
Organizations
supervisory control and data acquisition
Scalability
SCADA
Resiliency
resilience
pubcrawl
power transmission network
power transmission control
power system security
power stations
power grids
power distribution grids
power distribution control
Industrial Control Systems Anomaly Detection
IT security
integrated circuits
industrials plants
Industrial Control Systems
industrial control system security
industrial control
ICS security
ICs
Firewalls (computing)
firewall
Cybersecurity
control systems
biblio
A Robust Control Architecture for Mitigating Sensor and Actuator Attacks on PV Converter
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
DC-DC photovoltaic converter
actuator security
μ-synthesis robust controller exhibits
system uncertainty perturbations
system state matrix
Sensor and Actuator Attacks
PV converter system
photovoltaic power systems
Photovoltaic Converter
Perturbation methods
p-synthesis robust control architecture
mitigating sensor
mitigating potential cyberattacks
injected attack signals
DC-DC power convertors
security of data
controller design
control system synthesis
actuator attacks
actuators
uncertainty
Cybersecurity
robust control
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Computer crime
file
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid
Submitted by lalithasankar on Fri, 01/10/2020 - 3:45pm. Contributors:
Lalitha Sankar
Oliver Kosut
Kory Hedman
electric power grid
Cybersecurity
Energy Management System
Posters
1449080
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »