Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
Cross-domain Anomaly Detection for Power Industrial Control System
Submitted by grigby1 on Tue, 03/30/2021 - 11:52am
Anomaly Detection
feature extraction
ICS Anomaly Detection
industrial control
integrated circuits
Neural networks
Power ICS
Protocols
pubcrawl
resilience
Resiliency
Scalability
TrAdaBoost
Training data
transfer learning
biblio
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 11:52am
information technology network
Scalability
risk quantification
Resiliency
resilience
pubcrawl
production engineering computing
Production
operational technology systems
maintenance engineering
maintenance
Local area networks
Intrusion Detection Systems
Intrusion Detection
integrated circuits
anomaly-based intrusion detection configurations
Industrial Control Systems
industrial control
ICS Anomaly Detection
ICs
Government
full-scale ICS test bed
Ethernet based interconnections
Electronic mail
cost reduction
control engineering computing
computer network security
Assessment
anomaly-based network IDS settings
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
biblio
How to stop crashing more than twice: A Clean-Slate Governance Approach to IT Security
Submitted by grigby1 on Tue, 03/16/2021 - 2:09pm
IT industry
security of data
Security certification
security
RNA
Resiliency
resilience
pubcrawl
privacy
policy-based approach
Policy
organisational aspects
Metrics
Licenses
IT security incidents
IT security
certification
ISO standards
integrated circuits
Human behavior
Governance
GDPR
Europe
Equifax
DP management
DP industry
corporate social responsibility
Conferences
collaboration
clean-slate governance approach
clean slate
biblio
The Modbus Protocol Vulnerability Test in Industrial Control Systems
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
command injection attacks
composability
critical infrastructure
industrial control
Industrial Control System (ICS)
integrated circuits
Metrics
Modbus protocol
performance evaluation
Protocols
pubcrawl
resilience
Resiliency
security
Security test
virtual environments
biblio
High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
Human behavior
simulation
security
reverse engineering
pubcrawl
policy-based governance
Logic gates
Intellectual Property (IP) Protection
integrated circuits
Human Factors
intellectual property security
High Efficiency
Force
Camouflage Integrated Circuit (IC)
brute force attacks
Brute Force Attack
Benchmark testing
Resiliency
composability
biblio
Stable cryptographic key generation using SRAM based Physical Unclonable Function
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
SRAM fingerprint
random pattern
resilience
Resiliency
Scalability
secure IoT devices
SRAM
SRAM cells
SRAM chips
random number generation
SRAM physical unclonable function
SRAM PUF
Stability analysis
Static Random-Access Memory based PUFs
Threshold voltage
Transistors
Trusted Computing
zero trust
integrated circuits
Cadence Virtuoso tool
cryptographic key generation stability
cryptographic key sequence
Cryptography
digital fingerprint
fingerprint identification
hardware root-of-trust
Human Factors
authorisation
Internet of Things
IoT
MOS devices
Physical Unclonable Function
policy-based governance
power aware computing
pubcrawl
pufs
biblio
Application of Optimized Bidirectional Generative Adversarial Network in ICS Intrusion Detection
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
optimal model
Training
supervised control
single variable principle
security of data
Scalability
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
parameter optimization
optimized BiGAN
optimized bidirectional generative adversarial network
optimization
optimisation
network intrusion detection
neural nets
massive network traffic data
Intrusion Detection
integrated circuits
Industrial Control Systems
industrial control system
industrial control
ICS intrusion detection method
high-dimensional network traffic data
generative adversarial networks
data acquisition
control system security
control engineering computing
Computational modeling
BiGAN
biblio
Industrial and Home Automation, Control, Safety and Security System using Bolt IoT Platform
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
home computing
industrial automation
Temperature sensors
home automation
Internet of Things (IoT)
Pins
alert sub-system
Bolt IoT platform
cloud connectivity
Fasteners
Safety
Local Area Network (LAN)
machine-learning
safety systems
security subsystem
SMS
Temperature control
temperature data
temperature monitoring
security system
learning (artificial intelligence)
security of data
Cloud Computing
security
machine learning
pubcrawl
resilience
Resiliency
Internet of Things
Scalability
industrial control
control engineering computing
Industries
integrated circuits
Industrial Control Systems
production engineering computing
sensors
biblio
Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
Local area networks
industrial network security heads
industrial network systems
industrialized Early Intrusion Detection System
integrated circuits
intelligent manufacturing systems
internal industrial network
Intrusion Detection
Iptables
Iptables MikroTik
industrial installations
Monitoring
network security
production engineering computing
Protocols
pubcrawl
resilience
routers
Scalability
Servers
ICS Honeypot
Resiliency
Predictive Metrics
computer network performance evaluation
computer network security
control engineering computing
cybersecurity networks
Early Detection approach
Early Intrusion Detection System
honeypots
Router Systems Security
ICS SCADA
IDS performance
IDS Snort
industrial control
industrial control facility networks
industrial control system
Industrial Control Systems
industrial EIDS
Industrial honeypot
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »