Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Does the NIS implementation strategy effectively address cyber security risks in the UK?
Submitted by aekwall on Mon, 02/17/2020 - 1:28pm
NIS directive
cyber spaces
cyber-risk management capabilities
cyber-security risk management capabilities
DSP
IGP
legislation
national framework
NCSC
network and information security
NIS
cyber security risks
NIS framework
NIS implementation
NIS implementation strategy
NIS key strategic objectives
NIS objectives
noncyber elements
OES
Regulation
Smart City
UK Critical National Infrastructure sectors
Standards organizations
security of data
Computer crime
Scalability
cyber security
Resiliency
pubcrawl
Metrics
Supply Chain
risk management
cyber-physical security
IoT
cyber attack
Security Risk Management
CA
CNI
CNI sectors
collaborative implementation approach
connected smart technology implementations
critical national infrastructure
cross-sector CNI service security measures
cyber risk management
biblio
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack
Submitted by aekwall on Mon, 02/17/2020 - 1:16pm
Smart Grid
smart grid technology
smart electric meter
remote monitoring
electric power companies
data collection Integrity
cyber-attack conditions
cyber attack
smart meter
power meters
Meters
Power demand
cyber physical systems
smart meters
cyberattack
power system security
Smart Grids
power engineering computing
smart grid security
smart power grids
Metrics
privacy
pubcrawl
Resiliency
cyber security
data integrity
Scalability
security of data
biblio
A Cyber Communication Package in the Application of Grid Tied Solar System
Submitted by grigby1 on Mon, 02/10/2020 - 10:30am
Rivest
internet
internet connected computers
latency reduction
Load modeling
Metrics
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
Human Factors
RSA algorithms
Scalability
secured socket layer
secured socket layer (SSL)
Servers
Shamir and Adleman (RSA)
Shamir and Adleman algorithms
Solar system
SSL
SSL Trust Models
Cryptography
advanced encryption standard (AES)
AES algorithm
bidirectional communication strategy
communication concept
communication methodology
communication process
communication program
Computational modeling
Computer crime
Computers
advanced encryption standard
cyber communication package
cyber network
cyber security
cyber security arrangement
data exchange
electrical data
electronic data interchange
grid connected solar system
grid tied solar system
Human behavior
biblio
Using Layer 2 or 3 Switches to Augment Information Assurance in Modern ATE
Submitted by grigby1 on Tue, 01/21/2020 - 10:33am
ATE
collaboration
composability
computer
cyber security
Human behavior
Information Assurance
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
biblio
User Behavior Profiling Using Ensemble Approach for Insider Threat Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:24am
resilience
Monitoring
MSLSTM
multistate long short term memory
multistate LSTM
network walls
Neural networks
Organizations
policy-based governance
pubcrawl
Metrics
Resiliency
security of data
Servers
spatial-temporal behavior features
time series
Time Series Anomaly Detection
user behavior action sequence
user behavior profiling
ensemble hybrid machine learning
behavioural sciences computing
CNN
collaboration
convolution
convolution neural network
convolution neural networks
convolutional neural nets
cyber security
Anomaly Detection
feature extraction
Human behavior
human behavior impact
insider threat
Insider Threat Detection
learning (artificial intelligence)
machine learning
malicious activities
biblio
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
Phishing Detection
Uniform resource locators
Fuses
attention-based hierarchical recurrent neural network module
attention-based hierarchical RNN
blacklisting
character-level spatial feature representations
convolutional neural network module
deep learning-based approach
feature engineering
Human Factors
phishing uniform resource locators
phishing URL classifier
phishing URL detection
phishing Websites
three-layer CNN
word-level temporal feature representations
zero-day phishing attacks
zero trust
pattern classification
cyber security
Electronic mail
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
policy-based governance
machine learning
Scalability
Computer crime
internet
Web sites
unsolicited e-mail
convolutional neural nets
recurrent neural nets
Phishing
deep learning
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 11:04am
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
file
Towards a framework for comprehensive counterfeit detection of additively manufactured parts through unclonable functions
Submitted by Jules White on Thu, 01/16/2020 - 4:02pm. Contributors:
Jules White
Pablo Tarzaga
Chris Williams
Jaime Camelio
Logan Sturm
Carlos Olea
Michael Sandborn
cyber security
cyber-physical security
Impedance
manufacturing
Posters
1931931
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Securing Industrial Wireless Networks: Enhancing SDN with PhySec
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
industrial landscape
sensors
software defined networking
network management
physical layer security
additional overhead
cryptographic procedures
cyber-physical production systems
cyber-security threats
industrial communication networks
network security
industrial wireless networks
interconnected devices
network security requirements
PhySec
secret key generation
transmission bandwidth
wireless solutions
actuator security
Communication system security
Cryptography
Internet of Things
Software
computer network management
Resiliency
Human behavior
pubcrawl
composability
computer network security
Wireless communication
Metrics
production engineering computing
software-defined networking
SDN
Communication networks
cyber security
radio networks
biblio
Deterring Strategic Cyberattack
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
collateral damage control
nuclear regime
nuclear deterrence versus cyber deterrence
nuclear deterrence
legal norm
international agreement
government policies
cyberwar
cyberattack deterrence
cyber-dependent infrastructure
Critical Infrastructure Protection
comprehensive defense
security of data
Deterrence
Cyberspace
resilience
cyberattack
privacy
pubcrawl
Human behavior
critical infrastructures
cyber security
Scalability
Computer crime
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »