Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Research on Cybersecurity Strategy and Key Technology of the Wind Farms’ Industrial Control System
Submitted by aekwall on Thu, 06/09/2022 - 10:40am
industrial control
scalable systems
Wind farms
wind farm
security strategies
Key Technologies
Industrial Control Systems(ICS)
mechatronics
Solid modeling
Intrusion Detection
network security
Cybersecurity
Industrial Control Systems
power grids
Resiliency
Scalability
pubcrawl
biblio
Cybersecurity in Industrial Control System (ICS)
Submitted by aekwall on Thu, 06/09/2022 - 10:38am
Computer crime
control systems
Cybersecurity
ICs
industrial control
Industrial Control Systems
information technology
integrated circuits
pubcrawl
Resiliency
Scalability
scalable systems
security
system
biblio
IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
Submitted by aekwall on Thu, 06/09/2022 - 10:07am
Intrusion Detection
Internet of Things
tools
Conferences
Resiliency
composability
testing
Performance analysis
Cybersecurity
intrusion detection system
denial of service
Web servers
pubcrawl
IDS
Anomaly-based
biblio
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT
Submitted by grigby1 on Fri, 05/20/2022 - 3:33pm
Compositionality
theoretical cryptography
secure matrix operations
secure IoT
privacy preserving algorithms
Post-quantum cryptography
Health
support vector machine classification
Industrial Informatics
classification
deep learning
Cybersecurity
Classification algorithms
composability
quantum computing
Cryptography
privacy
pubcrawl
machine learning
machine learning algorithms
biblio
Intrusion Representation and Classification using Learning Algorithm
Submitted by grigby1 on Thu, 05/19/2022 - 11:56am
Training
security
Support vector machines
Intrusion Detection
pubcrawl
privacy
Classification algorithms
Metrics
Cybersecurity
testing
genetic algorithms
threat vectors
intrusion
decomposition
discriminatory
Fitness value
biblio
Hybrid Evolutionary Approach in Feature Vector for Ransomware Detection
Submitted by grigby1 on Thu, 05/19/2022 - 11:56am
Malware Analysis
threat vectors
Support vector machines
static analysis
ransomware detection
Radio frequency
pubcrawl
privacy
network security
Metrics
Ransomware
machine learning algorithms
machine learning
Internet of Things
Feature Selection
feature extraction
Cybersecurity
Cryptography
cyber-physical systems
Resiliency
biblio
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/19/2022 - 11:55am
privacy
Trustworthy Artificial Intelligence
threat vectors
threat assessment
Support vector machines
Stress
risk management
Radio frequency
pubcrawl
Trustworthy Systems
Metrics
machine learning
information management
Healthcare
Cybersecurity
cyber-physical systems
critical infrastructures
Computer crime
biblio
A new Cybersecurity Strategy for IoE by Exploiting an Optimization Approach
Submitted by grigby1 on Tue, 05/03/2022 - 2:55pm
modeling
uncertainty
Security Heuristics
Scalability
Robustness
Resiliency
resilience
pubcrawl
programming
predictability
optimization
cyber-attacks
Meta-heuristics
measurement uncertainty
Mathematical model
Iterative methods
Iterative method
IoE
Investment Strategy
Economics
Cybersecurity
biblio
Detection of Advanced Persistent Threats using Artificial Intelligence for Deep Packet Inspection
Submitted by grigby1 on Mon, 04/25/2022 - 2:23pm
IDS
zero days
telecommunication traffic
Support vector machines
security
Scalability
Resiliency
resilience
Recurrent neural networks
pubcrawl
Payload
Inspection
threat vectors
feature extraction
deep packet inspection
Data models
Cybersecurity
cyber
Big Data
autoencoder
APT
Anomaly Detection
AI
biblio
Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment
Submitted by grigby1 on Thu, 04/21/2022 - 2:09pm
Advanced Security Assurance Case
ASAC
Assessment
assurance
CASE
Cloud Computing
Communication system security
computer security
Cybersecurity
Healthcare
Internet of Things
ISO standards
Medical services
requirement
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »