Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
malicious attacks
biblio
From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity
Submitted by
aekwall
on Mon, 10/28/2019 - 9:39am
security of data
Big Data
Conferences
data integrity
Trusted Computing
Resiliency
pubcrawl
graph theory
Computational modeling
trust
provenance graphs
cognition
Semantics
inference mechanisms
Predictive Metrics
data provenance
scientific information systems
Compositionality
cognitive systems
data science
Data validity
data-intensive science and engineering
Knowledge engineering
knowledge provenance
malicious attacks
natural environmental changes
operations mistakes
provenance-based trust reasoning
SCI failures
scientific computing integrity
scientific workflows
Variety
Veracity
Viewpoints
views
Scientific Computing Security
biblio
Network Security Situation Awareness for Industrial Control System Under Integrity Attacks
Submitted by
grigby1
on Thu, 05/09/2019 - 9:45am
Communication networks
computer network security
control systems
hazard situation detection
industrial control
industrial control system
industrial control system network
Industrial Control Systems
integrated circuits
integrity attacks
local estimator
malicious attacks
network security situation awareness
nonlinear systems
novel security situation awareness framework
particle filtering
particle filtering (numerical methods)
Prediction algorithms
process control
pubcrawl
resilience
Resiliency
Scalability
scalable
Sensor Systems
Situation Awareness
situation prediction algorithm
state estimation
system state estimation
telecommunication security
biblio
EDMAND: Edge-Based Multi-Level Anomaly Detection for SCADA Networks
Submitted by
grigby1
on Wed, 05/01/2019 - 10:33am
Anomaly Detection
appropriate anomaly detection methods
composability
Detectors
edge detection
edge-based multilevel anomaly detection
EDMAND
event detection
Image edge detection
large-scale distributed industrial systems
malicious attacks
Metrics
Monitoring
network traffic data
network-based intrusion detection
Protocols
pubcrawl
resilience
Resiliency
SCADA network traffic
SCADA systems
Scalability
security
security of data
supervisory control and data acquisition systems
telecommunication traffic
biblio
Reducing Vulnerability to Cyber-Physical Attacks in Water Distribution Networks
Submitted by
grigby1
on Mon, 01/21/2019 - 11:30am
actuator security
actuators
composability
control requirements
cyber attack
cyber physical systems
Cyber-physical attacks
cyber-physical security level
cyber-physical systems
digital devices
Human behavior
industrial control
Industrial Control Systems
malicious attacks
Metrics
Monitoring
physical processes
power engineering computing
power system security
programmable controllers
pubcrawl
Redundancy
redundant cyber components
Resiliency
security
security of data
sensor measurements
sensors
simple control laws
Vulnerability
water distribution
water distribution networks
water resources
water supply
biblio
A Visible Light Channel Based Access Control Scheme for Wireless Insulin Pump Systems
Submitted by
grigby1
on Mon, 01/21/2019 - 11:21am
security
wireless sensor networks
pubcrawl
Metrics
Resiliency
Scalability
Wireless communication
telecommunication security
Communication system security
light emitting diodes
free-space optical communication
infrared detectors
Insulin pumps
malicious attacks
patient monitoring
patient treatment
photodiodes
RF channels
smart personal insulin pumps
Sugar
Universal Serial Bus
visible light channel based access control scheme
wireless infusion insulin pumps
wireless insulin pump systems
Visible Light Communications Security
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by
grigby1
on Thu, 08/23/2018 - 10:36am
wireless interfaces
war-nibbling
threat intelligence
resilience
pubcrawl
Pins
on-board communications
malicious attacks
Inspection
infotainment
human factor
Human behavior
telecommunication security
security risks
security
Roads
Safety
Resiliency
Cybersecurity
composability
Bluetooth-enabled systems
bluetooth security
Bluetooth connectivity
Bluetooth
automotive applications
automotive electronics
automotive
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by
grigby1
on Mon, 06/11/2018 - 2:47pm
resilience
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
mobile computing
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
Policy
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
mobile cloud computing paradigm
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by
grigby1
on Wed, 05/09/2018 - 1:53pm
Cloud Computing
cloud environment
Cloud Security
cloud-computing technology
collaboration
composability
computer architecture
cost services
Dynamic Malware Analysis
Honeypot Network
honeypot networks
Intrusion Detection
invasive software
malicious attacks
malware
Malware Analysis
network intrusion detection system
network intrusion detection systems
NIDS module
openstack
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Ports (Computers)
pubcrawl
sandboxing
sandboxing environment
Servers
Signature-based detection
Snort
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by
grigby1
on Mon, 04/02/2018 - 11:56am
AES
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
full-fledged security algorithm
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
network threats
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
telecommunication security
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
biblio
Sensor Security Index for Control Systems
Submitted by
grigby1
on Mon, 03/19/2018 - 12:49pm
actuator security
actuators
anomaly detector
composability
Control systems attack
Cyber-physical attack
Detectors
Gold
Human behavior
Indexes
linear control systems
linear dynamic systems
Linear systems
malicious attacks
Metrics
multiple sensors
north eastern electrical grid black out
pubcrawl
resilience
Resiliency
security
security of data
Sensor attack
sensor attacks
sensor bias injection attacks
sensor security index
sensors
Steady-state
Stuxnet
system destruction
system vulnerability
1
2
next ›
last »