Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
file
Cyber-Resilient Architectural Patterns
Submitted by Anonymous on Mon, 05/06/2019 - 2:24pm. Contributor:
Darren Cofer
Presented as part of the
2019 HCSS conference
.
AADL
CASE
Cybersecurity
DARPA
formal methods
Presentation
HCSS 2019
biblio
CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research
Submitted by aekwall on Wed, 05/01/2019 - 11:41am
monitoring systems
tools
Servers
security research
security of data
security applications
security
Resiliency
real-time systems
real-time cyber-physical system monitoring tool
real-time CPS monitoring tool
real-time constraints
Real time monitoring
publicly available monitoring tools
pubcrawl
physical phenomena
Human Behavior and Cybersecurity
Monitoring
MiniCPS-based case study
Metrics
Industrial Control Systems
human computer interaction
embedded systems
Cybersecurity
cyber-physical systems
cyber physical systems
CPS-MT
CPS simulations
computerised monitoring
computer architecture
composability
Human behavior
biblio
Leveraging Controlled Information Sharing for Botnet Activity Detection
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
Botnet detection
botnets
Compositionality
Cybersecurity
data sharing
information sharing
Metrics
pubcrawl
resilience
Resiliency
biblio
Intrusion Detection in Smart Grid Using Data Mining Techniques
Submitted by grigby1 on Thu, 03/28/2019 - 2:17pm
power meters
Training
Support vector machines
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
smart grid environment
Smart Grid
Smart Environments
Smart City
smart appliances
security devices
pubcrawl
Artificial Neural Networks
power engineering computing
Metrics
IoT
invasive software
intrusion detection system
Intrusion Detection
Internet of Things (IoT)
Internet of Things
Human behavior
Data Mining Techniques.
Data mining
Cybersecurity
composability
profile
Sidi Mohamed ALAOUI
Architectures
Architectures
CPS Domains
Networked Control
Secure Control Systems
Composition
Design Automation Tools
Communication
Embedded Software
Control
Defense
Platforms
Energy
Systems Engineering
Critical Infrastructure
Wireless Sensing and Actuation
Health Care
Manufacturing
Science of Security
CPS Technologies
Education
Foundations
Science Policy
Research Program Overview
Cybersecurity
Artificial Intelligence
blockchain
Internet Of Things.
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 9:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
biblio
Cyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies
Submitted by aekwall on Mon, 02/25/2019 - 10:43am
cyber-attacks
cyber-physical security
Cybersecurity
Internet of Things
IT security
IT security vulnerabilities
Metrics
pubcrawl
Resiliency
Supply Chain Risk Assesment
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor
Submitted by grigby1 on Fri, 02/08/2019 - 3:29pm
attack graph
attack graphs
Vulnerability Evaluation
verification procedure
state estimation
security testing
SCADA System Security
safety-critical applications
nuclear research reactor
nuclear engineering computing
Inductors
hybrid attack graph
formal verification
cyber-physical system
attack graph system state
Databases
cyber-physical systems
Cybersecurity
graph theory
composability
Resiliency
Metrics
pubcrawl
Temperature sensors
resilience
tools
security of data
safety-critical software
Predictive models
biblio
A Malicious Attack on the Machine Learning Policy of a Robotic System
Submitted by grigby1 on Fri, 02/08/2019 - 3:14pm
machine learning algorithms
security of data
robots
robotics
robotic vehicle
Robotic system
Resiliency
real-time routing control
radiofrequency identification
Q learning algorithm
pubcrawl
mobile robots
Metrics
malicious attack
machine learning policy
robot operating systems
machine learning
learning (artificial intelligence)
intelligent robots
indirect attack
Human behavior
Cybersecurity
cyberattack
composability
autonomous vehicles
autonomous vehicle
artificial intelligence security
Artificial Intelligence
security
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »