Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
Metrics
Trusted Computing
trusted boot
Time measurement
security of data
security
Resiliency
resilience
pubcrawl
Benchmark testing
measurement uncertainty
malware
hypothesis testing benchmark
Hardware
embedded systems
Embedded System
composability
boot sequence
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
A Learning-based Data Augmentation for Network Anomaly Detection
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
divide-augment-combine strategy
sampling methods
class imbalance problem
network anomaly detection
attack instances
augments data
data augmentation
data instances
Divide-Augment-Combine
Gallium nitride
generative adversarial model
high-quality data
learning-based data augmentation
network traffic traces
public network datasets
statistical sampling
synthetic instances
Generative Adversarial Learning
pattern classification
Scalability
Data models
Support vector machines
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
neural nets
security of data
Anomaly Detection
network traffic
Generators
generative adversarial networks
generative adversarial network
Predictive Metrics
data handling
biblio
Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection
Submitted by aekwall on Mon, 03/29/2021 - 11:58am
Neural network (NN)
imbalanced data problem
Imbalanced dataset
Intrusion Detection
learning (artificial intelligence)
machine learning
MLP Neural Network
Multilayer Perceptron
multilayer perceptrons
network security.
Generators
Neural networks
pattern classification
Predictive Metrics
pubcrawl
Scalability
security of data
Training
UGR16 dataset
Cyber Attacks
Compositionality
Resiliency
adversarial samples
Attack detection
attack labels
balanced attack sample dataset
benign data
classification
Information Reuse and Security
Data models
data wrangling
defense mechanisms
Gallium nitride
Generative Adversarial Learning
generative adversarial network
Generative Adversarial Network (GAN)
generative adversarial networks
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
biblio
Polymorphic Adversarial DDoS attack on IDS using GAN
Submitted by aekwall on Mon, 03/29/2021 - 11:57am
adversarial data
Intrusion Detection
Generators
generative adversarial networks
Predictive Metrics
Malicious Traffic
Intrusion Detection Systems
gan
adversarial attacks
natural language processing
adversarial DDoS attacks
Attack Profile
defensive systems
generative adversarial networks (GAN)
polymorphic Adversarial DDoS attack
unknown types
Generative Adversarial Learning
security of data
Training
incremental learning
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
machine learning algorithms
Data models
malware
telecommunication security
Scalability
IDS
computer network security
biblio
An Effective Semantic Security Metric for Industrial Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
pubcrawl
systems analysis
System-of-Systems
system design
SoS context
Semantics
Semantic Networks
security of data
Security Metrics
security metric definitions
Security Engineering
security by design
security
Runtime
Resiliency
resilience
Measurement
Model-Based Engineering
Metrics
industrial cyber-physical systems
ICPS
embedded systems
embedded system engineering
effective semantic security metric
cyber-physical systems
Current measurement
composability
business processes
business data processing
Business
metrics testing
biblio
Applying of Generative Adversarial Networks for Anomaly Detection in Industrial Control Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:56am
Industrial Control Systems
Training
security of data
Scalability
Resiliency
pubcrawl
production engineering computing
Predictive Metrics
neural nets
Intrusion Detection
Integrated circuit modeling
information security
industrial processes anomaly detection
industrial process
industrial control systems (ICS)
ICS Anomaly Detection
industrial control
ICs
Generators
generative adversarial networks (GAN)
generative adversarial networks
Generative Adversarial Learning
deep learning
Data models
Cyber Attacks
control engineering computing
computer architecture
BiGAN architecture
Anomaly Detection
biblio
Safe and secure software updates on high-performance embedded systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Metrics
traditional certification practices
system dependability
standards
security threats
security of data
security
secure software updates
Safety
Resiliency
resilience
regular software updates
pubcrawl
potentially infinite scenarios
post-deployment evidence
OTASU
Artificial Intelligence
interconnected system resilient
high-performance embedded systems
high performance scale
high computing demands
hardware platform
hardware complexity
extended networking technologies
embedded systems
dependable embedded systems
computational complexity
composability
certification
autonomous systems
automobiles
artificial intelligence algorithms
biblio
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theoretic security
stealthy estimation attack
Signaling Game with Evidence
physical system
online digital model
intelligent attackers
estimation theory
digital twin
Data-Integrity Attack
clandestine attack strategies
Chi-square detector
CPSS
defense strategies
Covariance matrices
game-theoretic approach
security of data
state estimation
Predictive Metrics
estimation
Human Factors
Games
control systems
pubcrawl
Resiliency
cyber-physical systems
game theory
Scalability
Monitoring
Detectors
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »