Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security breaches
biblio
Design and Development of a Smart Surveillance System for Security of an Institution
Submitted by grigby1 on Tue, 05/10/2022 - 3:31pm
pubcrawl
video surveillance
surveillance
smart surveillance
security breaches
security
Safety
Resiliency
resilience
efficiency
Power demand
Metrics
machine learning algorithms
machine learning
Internet of Things (IoT)
Human behavior
fire detection
face recognition
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
Towards Industrial Security Through Real-time Analytics
Submitted by aekwall on Mon, 01/25/2021 - 12:51pm
industrial security
security of data
security hardening
security breaches
security
Resiliency
real-time analytics
real-time
pubcrawl
production engineering computing
Metrics
low data utilization
loop ICS architecture
industrial setting
actuator security
industrial control system
industrial control
industrial
ICS community
Human behavior
financial safety harms
DRIP syndrome
data rich information poor syndrome
control stations
Industrial Control Systems
composability
Cloud Computing
actuators
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
information security market
security breaches
Resiliency
resilience
real-world operations
pubcrawl
password protections mechanisms
parallel computing
optimization functions
neural network approach
neural nets
modern learning mechanism
market computers
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Access controls
IDS system
IDS on GPU
IDS
graphics processing units
GPUs
firewalls
encryption mechanisms
dynamic intrusion detection mechanism
deep learning based intrusion detection system
deep learning algorithms
deep learning
cyber world
composability
Big Data
authorisation
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
Context-Oriented Privacy Protection in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 12:03pm
Metrics
WSN
wireless sensor networks
telecommunication security
security measures
security breaches
Resiliency
pubcrawl
privacy
base station
Location Privacy in Wireless Networks
location privacy
location data
Human behavior
data privacy
context-oriented privacy protection
context oriented
Compositionality
biblio
SUPC: SDN enabled Universal Policy Checking in Cloud Network
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
Protocols
virtualisation
Virtual private networks
SUPC
software defined networking
Software Defined Network (SDN)
Software Defined Network
SF rules
SF rule ordering overlaps
Service Function Chaining (SFC)
service function chain
Security Policy Conflicts
security breaches
SDN enabled universal policy checking
Resiliency
pubcrawl
Security Policies Analysis
policy conflicts
NFV
Network Function Virtualization (NFV)
network function virtualization
multitenant cloud networks
monitoring service functions
Middleboxes
Metrics
Firewalls (computing)
dynamic SFC composition
Dynamic Networks and Security
conflict checking mechanism
computer network security
composability
Cloud Computing
biblio
Security Chaos Engineering for Cloud Services: Work In Progress
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cloud computing security
traditional security paradigms
security chaos engineering
Resilient Architectures
nonsecurity failures
Human Errors
CloudStrike
Cloud-Security
cloud security system
intrusion tolerance
security models
security risk assessment
cloud infrastructure
Intrusion Detection
chaos
software fault tolerance
Fault tolerant systems
cloud services
security breaches
fault tolerance
testing
composability
pubcrawl
Resiliency
Cloud Computing
security of data
biblio
Drone Detection in Long-Range Surveillance Videos
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
learning (artificial intelligence)
Videos
video surveillance
Training
tracking surveillance
Terrorism
SSD
single shot detector
security of data
security breaches
Resiliency
pubcrawl
Proposals
object detection
Metrics
long-range surveillance videos
deep video
Human behavior
high-security risks
Faster-RCNN
Faster R-CNN
drones
drone detection
Detectors
detection methods
deep learning-based object detection
deep learning
convolutional neural nets
CNN-based architectures
Birds
autonomous aerial vehicles
biblio
Security in Wireless Sensor Networks: A formal verification of protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
WSN technology
wireless sensor networks
telecommunication security
Security Properties
security breaches
Security analysis
security
secure transmissions
safe transmissions
real-time communications
pubcrawl
protocol verification
analyzed protocols
policy-based governance
Policy Based Governance
industrial domains
formal verification
Cryptographic Protocols
concerns security aspects
concerns improved guarantees
Compositionality
composability
complex networked control systems
collaboration
1
2
3
next ›
last »