Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Local area networks
biblio
On a Deterministic Approach to Solving Industrial Control System Problems
Submitted by grigby1 on Tue, 03/30/2021 - 12:05pm
automation
backlog
Calculus
control engineering computing
Control System
critical infrastructures
Cybersecurity
database updating
delay
delays
deterministic queuing systems network calculus
digital control system problems
Human behavior
Human Factors
industrial control
Industrial Control Systems
Local area networks
Mathematical model
Network calculus
network performance measures
production engineering computing
pubcrawl
Queueing analysis
queueing theory
queuing theory
security
signal transmission
biblio
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 11:52am
anomaly-based intrusion detection configurations
anomaly-based network IDS settings
Assessment
computer network security
control engineering computing
cost reduction
Electronic mail
Ethernet based interconnections
full-scale ICS test bed
Government
ICs
ICS Anomaly Detection
industrial control
Industrial Control Systems
information technology network
integrated circuits
Intrusion Detection
Intrusion Detection Systems
Local area networks
maintenance
maintenance engineering
operational technology systems
Production
production engineering computing
pubcrawl
resilience
Resiliency
risk quantification
Scalability
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
affiliation graphs
computer network management
device discovery and management
encryption-invariant device management strategy
future traffic demand
graph theory
internet
IP networks
Local area networks
management complexity
network administrators
Network reconnaissance
network-connected devices
passive network reconnaissance
pubcrawl
resilience
Resiliency
Scalability
security analysts
security risk
university campus network
biblio
Design and Implementation of Full-Scale Industrial Control System Test Bed for Assessing Cyber-Security Defenses
Submitted by grigby1 on Wed, 02/03/2021 - 12:57pm
computer network security
computer security
control engineering computing
cyber security
cyber-security defenses
cybersecurity defenses
Ethernet-based threat surface
full-scale industrial control system test bed
Hardware
ICS test beds
ICS-specific security solutions
industrial control
Industrial Control Systems
Integrated circuit modeling
Local area networks
Production
production engineering computing
production environments
pubcrawl
resilience
Resiliency
Safety
Scalability
test beds
biblio
Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
Monitoring
Servers
Intrusion Detection
pubcrawl
resilience
Resiliency
computer network security
network security
Scalability
Protocols
industrial control
control engineering computing
integrated circuits
Industrial Control Systems
production engineering computing
Local area networks
computer network performance evaluation
cybersecurity networks
Early Detection approach
Early Intrusion Detection System
honeypots
ICS Honeypot
ICS SCADA
IDS performance
IDS Snort
industrial control facility networks
industrial control system
industrial EIDS
Industrial honeypot
industrial installations
industrial network security heads
industrial network systems
industrialized Early Intrusion Detection System
intelligent manufacturing systems
internal industrial network
Iptables
Iptables MikroTik
routers
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
security of data
security
pubcrawl
graph theory
tools
Analytical models
cyber-attacks
Communication networks
resilience
program verification
Stability analysis
Local area networks
stability
attack graphs
faults
attack graph
AADL
architecture analysis-&-design language
cyber-physical-systems
generated attack scenarios
generated attack sequences
generated network models
JKind model checker integrated tool
possible attack instances
program visualisation
resilience level assessment
Resiliency
security property
system resiliency
Unity software
Resilient Security Architectures
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
computer network security
security
Protocols
real-time systems
Industrial Control Systems
Resiliency
pubcrawl
standards
automation
security architecture
Local area networks
industrial control
information technology
security requirements
Compositionality
communication security
operational technology
automation-friendly security solution
open systems
PROFINET
real-time Ethernet automation systems
Information Reuse and Security
biblio
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
computer network security
Cloud Computing
IP networks
distributed denial of service attack
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Local area networks
IP spoofing
Flooding Attack
DDoS Attack Prevention
CloudSim 3.0 toolkit
Distributed Denial of Service(DDoS)
HCF mechanism
Hop Count Filtering (HCF)
hop count filtering mechanism
Internet Protocol
IP
IP spoofing detection
IP spoofing prevention
IP2HC table
LAND attack
LAND based DDoS attack
local area network denial attack
malformed packets
memory exhaustion minimization
smurf attack
Source port
spoofed packets
SYN flood attack
teardrop attack
TTL
victim server
virtual cloud environment
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
cyberattack
computer network security
information security
Resiliency
pubcrawl
composability
Information systems
Local area networks
security management
Predictive Metrics
circuit design
Circuit synthesis
control unit
Hard disks
LAN computer security control circuit
LAN computers
LAN security
local area network computer security control circuit
management defect
network attack
new technology challenge
ordinary hard disk
secure hard disk
security threat
Networked Control Systems Security
biblio
Re-envisioning digital architectures connecting CE hardware for security, reliability and low energy
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
data privacy
Hardware
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
privacy
internet
Ad hoc networks
electronic data interchange
Network Security Architecture
CE hardware
Consumer Data
consumer electronic systems
Consumer electronics
data connectivity technologies
data exchange
data network architecture
data transfer
digital architectures
Local area networks
Low power
low-power components
multiple bridged peripheral links
network architecture
Network of Things
peripheral interfaces
personal area networks
private universal data platform
push-pull data network architecture
scalable switchable data platform
Software Constructed ad-hoc circuit network
ultra-low power data platform
universal peripheral communications links
USB 3.0
USB 3.0 data transfer cables
1
2
3
4
next ›
last »