Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber-security
biblio
Analytical Choice of an Effective Cyber Security Structure with Artificial Intelligence in Industrial Control Systems
Submitted by grigby1 on Thu, 08/24/2023 - 2:59pm
industrial control system
Flock Behavior
Decentralized Structures
Behavioral sciences
fourth industrial revolution
Industrial Control Systems
Prediction algorithms
Cyber-security
Artificial Intelligence
computer architecture
industrial control
Scalability
Resiliency
resilience
pubcrawl
machine learning algorithms
deep learning
biblio
Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm
Submitted by grigby1 on Thu, 08/24/2023 - 2:49pm
Artificial Intelligence
Human Factors
Cyber Physical System
Learning systems
federated learning
cyber physical systems
education
Context modeling
immersive systems
virtual reality
best practices
Training
computer security
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
machine learning
Cyber-security
biblio
Development and Implementation of a Holistic Flexibility Market Architecture
Submitted by grigby1 on Fri, 05/19/2023 - 2:29pm
Low voltage
Systems architecture
Smart Grids
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
control algorithms
local markets
flexibility
Cyber-security
cyber-physical systems
cyber-physical monitoring
Couplings
coupled congestion control
control systems
biblio
Exploring Timing Covert Channel Performance over the IEEE 802.15.4
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
Compositionality
IEEE 802.15 Standard
Resiliency
Turning
Performance
covert channels
covert channel
timing
resilience
information security
Protocols
Scalability
Safety
performance evaluation
pubcrawl
IoT
security
Cyber-security
biblio
A Case Study for Designing a Secure Communication Protocol over a Controller Area Network
Submitted by grigby1 on Fri, 05/12/2023 - 10:12am
Human Factors
Writing
Software
security
Resiliency
resilience
pubcrawl
Protocols
Memory management
automotive control systems
Human behavior
Hardware
encryption
embedded systems
Cyber-security
controller area network
codes
biblio
Load Redistribution Attacks in Multi-Terminal DC Grids
Submitted by grigby1 on Thu, 05/11/2023 - 4:48pm
False Data Injection
voltage-sourced converter
multi-terminal dc grid
Systems operation
Lead
Resiliency
command injection attacks
cyber-physical system
cyber-attack
Voltage control
Cyber-security
cyberattack
power grids
Vulnerability Analysis
Reliability
composability
optimization
resilience
Metrics
pubcrawl
biblio
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender’s Deception Architecture
Submitted by grigby1 on Fri, 04/28/2023 - 4:01pm
computer security
advanced persistent threats (apt)
Cyber-security
policy governance
Minimization
Resiliency
computer theory
game theory
Ransomware
Compositionality
computer architecture
composability
Cryptography
resilience
Metrics
Human behavior
pubcrawl
security
collaboration
biblio
The Analysis of Human Attitude toward Cybersecurity Information Sharing
Submitted by grigby1 on Thu, 09/29/2022 - 4:38pm
Organizational learning
Management
vulnerabilities
Bibliographies
information sharing
attitude
behavior
Human Attitude
involvement
best practices
Organizations
pubcrawl
Human behavior
computer security
Cyber-security
Cybersecurity
taxonomy
biblio
An Efficient Computational Strategy for Cyber-Physical Contingency Analysis in Smart Grids
Submitted by grigby1 on Tue, 09/20/2022 - 2:03pm
pubcrawl
Metrics
real-time systems
Games
Measurement
Power system protection
power transmission lines
Approximation algorithms
Smart Grids
Security Metrics
Transmission line measurements
Computing Theory
Cyber-Physical Contingency Analysis
Cyber-security
Security games
biblio
Detecting SSH and FTP Brute Force Attacks in Big Data
Submitted by grigby1 on Tue, 06/14/2022 - 1:11pm
Cyber-security
Brute-force Attack
big data security metrics
statistical analysis
CSE-CIC-IDS2018
Decision Tree
Intrusion Detection
Force
Classification algorithms
feature extraction
Big Data
telecommunication traffic
Data models
Scalability
Resiliency
resilience
pubcrawl
1
2
3
4
5
6
7
next ›
last »