Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
biblio
Causal Chain of Time Delay Attack on Synchronous Generator Control
Submitted by grigby1 on Wed, 03/17/2021 - 12:41pm
SCADA systems
physical power grid
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
robust control
modern power grids
Scalability
security
security of data
synchronous generator control
synchronous generators
Time delay
time delay attack
Time measurement
cyber-space leading
attack vector
Chained Attacks
communication technology
Cyber Attacks
cyber intrusion
cyber security
cyber-physical causal chain
cyber-physical systems
attack tree
Delay effects
delays
denial-of-service attack
frequency control
grid cyber security
grid frequency
grid response
load frequency control
biblio
A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
genetic algorithms
security
Scalability
Resiliency
resilience
pubcrawl
Proactive Defence
Metrics
malware creation
malware
Mal-ware Analysis
invasive software
internet
Human behavior
artificial ecosystem
evolutionary computing
evolutionary computation
Evolutionary algorithms
cyber world
cyber security
computing devices
computer malware
co-evolutionary predator-prey framework
BIOS
biologically inspired computing
Bio-inspired computing
artificial world
biblio
From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
cyber threat intelligence
security
Scalability
pubcrawl
Organizations
monetary value
market capitalization
Human behavior
financial data processing
exchange breach
Ecosystems
attacks
cyber security threats
cyber security breaches
cyber security
cryptocurrency exchanges
cryptocurrencies
Computer crime
Bitcoin market value
Bitcoin exchange platforms
bitcoin
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 4:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:46pm
composability
scalable neural-network-based hybrid IDS framework
network-level intrusion detection
IDS field
host-level intrusion detection
host-level IDS
cyber-attackers
ADFA dataset
NSL-KDD dataset
software quality
Scalability
network intrusion detection
neural network
software reliability
cyber-attacks
learning (artificial intelligence)
Computer crime
intrusion detection system
cyber security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
convolutional neural nets
Data mining
security
machine learning
biblio
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:38pm
natural language processing
social networks potential hackers
social engineering attacks detection
social attacks
SEADer++ v2
potential attacks
natural language processing steps
future attacks
Forestry
blacklisting
social engineering
Attack detection
cyber security
security of data
Mathematical model
Libraries
internet
social networking (online)
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Classification algorithms
Scalability
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense
Submitted by grigby1 on Wed, 02/10/2021 - 1:13pm
Peer-to-peer computing
uses Quality
Threat intelligence sharing
reputation system
reputation estimation scheme
Open Cloud testbed
distributed trust
DefenseChain system
DefenseChain implementation
cyber threat intelligence sharing
cloud-hosted applications
blockchain platform
attack mitigation
Cryptography
Cyber Attacks
Attack detection
Cloud Computing
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Distributed databases
blockchain
cyber security
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »