Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security strategies
biblio
Research on Cybersecurity Strategy and Key Technology of the Wind Farms’ Industrial Control System
Submitted by aekwall on Thu, 06/09/2022 - 10:40am
industrial control
scalable systems
Wind farms
wind farm
security strategies
Key Technologies
Industrial Control Systems(ICS)
mechatronics
Solid modeling
Intrusion Detection
network security
Cybersecurity
Industrial Control Systems
power grids
Resiliency
Scalability
pubcrawl
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 11:00am
internet
Web servers
security strategies
Scalability
robots
Resiliency
resilience
reconnaissance process
Reconnaissance
pubcrawl
Network reconnaissance
IP networks
Computer crime
honeytokens
file servers
delays
delay strategies
deceptive defense strategies
deceptive counter measure abilities
deception based information security
Databases
cyber threat landscape
computer network security