Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyber-attacks
biblio
The Rise of Ransomware: A Review of Attacks, Detection Techniques, and Future Challenges
Submitted by grigby1 on Fri, 03/17/2023 - 12:03pm
Training
pubcrawl
Metrics
resilience
Resiliency
security
composability
Cybersecurity
cyber-attacks
Synchronization
Technological innovation
Ransomware
Pressing
Regulation
Insurance
biblio
A Review on The Concerns of Security Audit Using Machine Learning Techniques
Submitted by grigby1 on Fri, 01/13/2023 - 1:46pm
control systems
IT
Propulsion
Security Audits
Productivity
cyber threats
Costs
cyber-attacks
Resistance
pubcrawl
security audit
Information systems
Scalability
Hardware
Software
Resiliency
resilience
Human behavior
biblio
Investigation of Computer Incidents as an Important Component in the Security of Maritime Transportation
Submitted by grigby1 on Fri, 11/25/2022 - 5:48pm
Transportation
modern shipping
Policy Based Governance
pubcrawl
Reliability
resilience
Resiliency
reverse engineering
Scalability
Science of Security
security system
Software
tools
Metrics
automated information system
collaboration
composability
computer incident
computer security
cyber-attacks
forensic science
framework
Human behavior
Human Factors
information security
malware
biblio
Distributed Control for Nonlinear Multi-Agent Systems Subject to Communication Delays and Cyber-Attacks: Applied to One-Link Manipulators
Submitted by aekwall on Fri, 07/01/2022 - 9:46am
simulation
delays
pubcrawl
Scalability
Resiliency
sufficient conditions
Quantization (signal)
Stability analysis
communication delays
cyber-attacks
Decentralized Control
manipulators
Nonlinear Multi-Agent
Single-Link Manipulators
Chained Attacks
biblio
Intrusion Detection Systems Trends to Counteract Growing Cyber-Attacks on Cyber-Physical Systems
Submitted by aekwall on Thu, 06/09/2022 - 11:06am
integrated circuits
Intrusion Detection
Resiliency
composability
machine learning
cyber-physical systems
SCADA systems
cyber-attacks
industrial control
pubcrawl
Terrorism
Cyber Physical Systems (CPS)
IDS
Intrusion Detection Systems (IDS)
machine learning (ML)
Systematic Literature Review (SLR)
biblio
A new Cybersecurity Strategy for IoE by Exploiting an Optimization Approach
Submitted by grigby1 on Tue, 05/03/2022 - 3:55pm
modeling
uncertainty
Security Heuristics
Scalability
Robustness
Resiliency
resilience
pubcrawl
programming
predictability
optimization
cyber-attacks
Meta-heuristics
measurement uncertainty
Mathematical model
Iterative methods
Iterative method
IoE
Investment Strategy
Economics
Cybersecurity
biblio
Measuring and Enhancing Microgrid Resiliency Against Cyber Threats
Submitted by grigby1 on Wed, 04/20/2022 - 3:45pm
cyber-physical systems
pubcrawl
Resiliency
Safety
Metrics
Measurement
resilience
microgrid
cyber-attacks
Microgrids
cyber-vulnerabilities
Through-silicon vias
Common vulnerability scoring system (CVSS)
biblio
Enhancing Microgrid Resiliency Against Cyber Vulnerabilities
Submitted by grigby1 on Wed, 04/20/2022 - 3:45pm
cyber-physical systems
pubcrawl
Resiliency
Mathematical model
Metrics
Measurement
resilience
microgrid
CVSS
Microgrids
cyber-attacks
cyber-vulnerabilities
Through-silicon vias
biblio
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 10:45am
Anomaly Detection
CPS
CPS Privacy
cyber-attacks
data privacy
Gaussian mixture
Human Factors
Intrusion Detection
Kalman filter
power systems
privacy
privacy preservation
pubcrawl
SCADA
SCADA systems
biblio
Threats and data trading detection methods in the dark web
Submitted by grigby1 on Tue, 04/12/2022 - 12:13pm
pubcrawl
Human behavior
Cryptography
Databases
process control
Cyber-security
Data Security
Buildings
visualization
Intelligent systems
cyber-attacks
dark web
drugs
1
2
3
4
5
6
7
8
9
…
next ›
last »