Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyber-attacks
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
ARP Spoofing
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity experiments
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
network classification model
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
reconnaissance attack
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
biblio
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:46pm
learning (artificial intelligence)
machine learning
security
Data mining
convolutional neural nets
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
cyber security
intrusion detection system
Computer crime
composability
cyber-attacks
software reliability
neural network
network intrusion detection
Scalability
software quality
NSL-KDD dataset
ADFA dataset
cyber-attackers
host-level IDS
host-level intrusion detection
IDS field
network-level intrusion detection
scalable neural-network-based hybrid IDS framework
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 12:39pm
learning (artificial intelligence)
CPS
cyber-physical systems
pubcrawl
resilience
Resiliency
ICs
SCADA systems
supervisory control and data acquisition systems
invasive software
CPS Security
multi-agent systems
cyber-attacks
cyber-physical systems security
game theory
Nash Equilibrium
CPS network
hybrid game theory
malware author
Multi-Agent Reinforcement Learning
multiagent reinforcement learning
Virus Spreading
Damage Assessment
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
authentication
Conferences
confidentiality
cryptographic key pairs
Cryptography
cyber-attacks
digital era
digital signature
digital signatures
digital world
encryption
integrity
man-in-the-middle attack
message authentication
message integrity
private key cryptography
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
security
sender identity
Signing
biblio
Naval cyber-physical anomaly propagation analysis based on a quality assessed graph
Submitted by aekwall on Mon, 02/08/2021 - 12:39pm
security of data
Scalability
Data models
cyber-physical systems
Resiliency
pubcrawl
graph theory
Computational modeling
Metrics
Analytical models
cyber-attacks
Anomaly Detection
sensors
Human Factors
Compositionality
programmable controllers
navigation
Cyber Dependencies
Marine vehicles
Anomalies
CPS anomalies
cyber-physical system
data and information quality
data streams
data-driven decision system
digital subsystems
information quality measures vectors
naval CPS
naval cyber-physical anomaly propagation analysis
naval engineering computing
naval propulsion management system
optimized supervisory control
programmable logical controller
propagation analysis
quality assessed graph
system graph
biblio
Security Visualization and Active Querying for OT Network
Submitted by grigby1 on Mon, 01/25/2021 - 10:28am
active querying
Air gaps
air-gap
business network
comma separated value format
common event format
composability
computer network security
computer networks
cyber-attacks
Data collection
data visualisation
Data visualization
firewalls
Human behavior
Human Factors
internet
intrusion detection system
intrusion prevention system
Metrics
Monitoring
network behavior
network inclusion
network security
operational technology network
OT Network
physical objects
pubcrawl
real-time systems
resilience
Resiliency
security
Security Visualization
visualization
Workstations
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 1:39pm
security of data
Cyber-security
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Protocols
delays
malware
advanced persistent threat
APT
synchronisation
cyber-attacks
Synchronization
Degradation
Clocks
advanced persistent threats
computer clocks
IEEE 1588
precision time protocol
programmable injector device
programmable Man-in-the-Middle
PTP
PTP infrastructure components
PTP time synchronisation networks
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
deep neural networks
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
internet
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
OT Network
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
Analytical models
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
cyber-attacks
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
Malware Analysis
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
pubcrawl
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
biblio
A Semantic Machine Learning Approach for Cyber Security Monitoring
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
learning (artificial intelligence)
security of data
Training
machine learning
cyber security
Monitoring
pubcrawl
resilience
Resiliency
Safety
Scalability
Data models
Computer crime
cyber-attacks
business processes
cyber-threats
Cyber Attacks
cyber- attacks
destiny attacks
deterministic styles
digital global community
information safety measure
Network Monitoring
semantic machine
software technologies
stochastic styles
Stochastic Computing Security
1
2
3
4
5
6
7
8
9
next ›
last »