Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Software Defined Cyber-Physical Testbed for Analysis of Automated Cyber Responses for Power System Security
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
Industrial Control Systems
system resilience
software defined networking
software defined cyber-physical testbed
Smart Grid
security of data
Resiliency
pubcrawl
power system security
power grids
Power Grid
power engineering computing
microgrid
intelligent decisions
CPS resilience
cyber-physical testbed
cyber-physical systems
cyber security
composability
automated responses
automated response system
Automated Response Actions
automated response
automated health assessment system
Automated Health Assessment
automated cyber responses
attack surface
cyber physical systems
biblio
TAG: Topological Attack Graph Analysis Tool
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
MulVAL inference engine
topological attack graph analysis tool
tag
situational awareness
security problems
security level estimation
Security Evaluation
Resiliency
pubcrawl
Predictive Metrics
attack graphs
multistage cyberattacks
inference mechanisms
graph theory
cyber security
cyber defense
corrective actions
computer network security
composability
attack paths
biblio
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
cyber threat intelligence article
artificial intelligence security
Unstructured Data
unstructured cyber threat intelligence data
threat intelligence
Structured Data
semantics extraction
latest useful threat intelligence
latest threat intelligence
JAPE feature
GATE framework
cyber threat intelligence unstructured data
security of data
cyber security territory
cyber security professionals
CVE entities
automatic tagging
Ontology
information retrieval
ontologies (artificial intelligence)
data structures
cyber security
pubcrawl
profile
Anita Nicholich
SaTC
cyber security
cyberinfrastructure
TTP
cryptocurrency
Illinois
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
biblio
Distributed Power System Simulation using Cyber-Physical Testbed Federation: Architecture, Modeling, and Evaluation
Submitted by grigby1 on Thu, 07/16/2020 - 11:43am
physical disturbances
Wide Area Monitoring System cyber-physical security
WAMS
two-bus system
transmission line modeling technique
transmission line modeling (TLM)
Testbed Federation
smart power grids
simulations
security of data
Resiliency
resilience
pubcrawl
power system simulation
power system security
attack-resilient smart grid
Metrics
load subsystems
internet
distributed simulation
distributed power system simulation
data integrity attack
data integrity
cyber-physical testbed federation
cyber-physical systems
cyber security
CPS modeling
CPS
composability
biblio
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
security forums
learning (artificial intelligence)
machine learning
machine learning-based crawler
Monitoring
Open Source Software
open-source tools
pubcrawl
security
language models
security Web sites
service-oriented architecture
social networking (online)
social web
statistical language modelling techniques
Task Analysis
telecommunication security
tools
hacker forums
crawler architecture
Crawlers
crawling architecture
cyber security
cyber threat intelligence
cyber-security information
dark web
data harvesting
Computer crime
harvested information
Human behavior
Human Factors
information gathering task
Internet of Things
IoT
IoT-related cyber-threat intelligence
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
stochastic petri nets
Damage Assessment
transmission line protection systems
substation
power transmission protection
power system structure
power system components
Petrinet
nonintelligent attacks
intelligent attack
IEEE39 bus system
electrical network
cyber security risk assessment method
cyber physical performance
attacks
power supply
security of data
Cyber Physical System
smart power grid
power transmission lines
Stochastic processes
substation automation
cyber security
Petri nets
power system security
power engineering computing
probability
Cyber Attacks
smart power grids
Risk
pubcrawl
Resiliency
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
power consumption
security aware design space exploration framework
secure system designing
Secure IoT Systems
optimal design
Mixed Criticality Design Space Exploration
Embedded System Design
door access system use case
Design Process
behavioral security attack description
architectural security attack description
IoT system
Power demand
Space exploration
security requirements
security of data
security measures
tools
internet
Metrics
security attacks
composability
pubcrawl
Resiliency
cyber security
Bayes methods
embedded systems
Task Analysis
Internet of Things
Computer crime
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »