Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Network Protocol Reverse Parsing Based on Bit Stream
Submitted by grigby1 on Tue, 03/15/2022 - 1:16pm
Cloud Computing
security
pubcrawl
Conferences
Scalability
Protocols
cyber security
Computer crime
Syntactics
Clustering algorithms
Pattern recognition
association rules
Scalable Security
hierarchical clustering
reverse parsing
biblio
Real-time Power System Simulation with Hardware Devices through DNP3 in Cyber-Physical Testbed
Submitted by grigby1 on Mon, 03/14/2022 - 11:36am
real-time systems
power system simulation
interactive control
hardware-in-the-loop
DNP3 protocol
SCADA Systems Security
power systems
SCADA
Compositionality
security
Communication networks
Hardware
Software
Resiliency
resilience
Human behavior
pubcrawl
cyber security
biblio
Securing IoT-Blockchain Applications Through Honesty-Based Distributed Proof of Authority Consensus Algorithm
Submitted by aekwall on Tue, 03/01/2022 - 3:32pm
Power demand
Transaction Finality
The Internet of Thing (IoT)
Secure Consensus Mechanism
Resiliency
pubcrawl
Protocols
Proof of Authority PoA
Power measurement
blockchain
Organizations
network accountability
Metrics
data analysis
cyber security
Consensus algorithm
composability
biblio
Design and Implementation of A Vulnerability-Tolerant Reverse Proxy Based on Moving Target Defense for E-Government Application
Submitted by grigby1 on Tue, 02/22/2022 - 4:45pm
network security
information security
pubcrawl
Metrics
resilience
Resiliency
Scalability
cyber security
Prototypes
digital transformation
Dynamic scheduling
Uniform resource locators
Economics
E-Government
moving target defense
Communications technology
Web application
biblio
Digital Forensic Investigation Process in Railway Environment
Submitted by grigby1 on Tue, 01/25/2022 - 3:55pm
integrated circuits
railway
industry security
digital forensic
Automated Secure Software Engineering
Rail transportation
chain of custody
composability
SCADA systems
security
cyber security
Safety
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
Artificial Intelligence Enabled Cyber Security
Submitted by grigby1 on Mon, 01/10/2022 - 3:57pm
Manuals
signal processing
robots
Resiliency
resilience
pubcrawl
Organizations
Metrics
Medical services
Advantages of AI
Human behavior
cyber security
Cyber Attacks
Computer hacking
composability
CIA triad
artificial intelligence security
Artificial Intelligence
biblio
A Network Asset Detection Scheme Based on Website Icon Intelligent Identification
Submitted by grigby1 on Mon, 01/10/2022 - 3:56pm
internet
website icon
Training
security
Resiliency
resilience
pubcrawl
network asset
Metrics
Manuals
Artificial Intelligence
Human behavior
detection
Cyberspace
cyber security
computer science
composability
Communications technology
artificial intelligence security
biblio
Using MajorClust Algorithm for Sandbox-Based ATM Security
Submitted by grigby1 on Tue, 12/21/2021 - 11:38am
Online banking
Zero day attacks
Whitelists
whitelisting
tools
software security
Software algorithms
sandboxing
Resiliency
resilience
pubcrawl
ATM
Metrics
Intrusion Protection
Filtering
evolutionary computing
evolutionary computation
defense
cyber security
composability
clustering
Big Data
biblio
A Taxonomy of Insider Threat in Isolated (Air-Gapped) Computer Networks
Submitted by grigby1 on Mon, 12/20/2021 - 12:17pm
insider threat
taxonomy
social sciences
security
Resiliency
resilience
research and development
pubcrawl
Metrics
threat mitigation
Human behavior
Focusing
cyber security
computer networks
Computer crime
composability
air-gapped
Air gaps
biblio
Advanced Persistent False Data Injection Attacks Against Optimal Power Flow in Power Systems
Submitted by aekwall on Mon, 12/20/2021 - 11:22am
Scalability
power systems
Wireless communication
pubcrawl
Metrics
Resiliency
Human behavior
cyber-physical systems
particle swarm optimization
cyber security
cyberattack
Surges
power generation
simulated annealing
advanced persistent threat
Optimal Power Flow (OPF)
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »