Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Modbus
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
deep neural networks
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
internet
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
OT Network
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
biblio
Simulation and Analysis Framework for Cyber-Physical Systems
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
CPS Privacy
Compositionality
cyber physical systems
Human behavior
jamod
Modbus
Nuclear Reactor
pubcrawl
resilience
Resiliency
SCADA systems
security
simulation
biblio
A New Burst-DFA Model for SCADA Anomaly Detection
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
pubcrawl
network-intrusion-detection-system
network intrusion detection
Modbus
ICS Anomaly Detection
security
SCADA systems
ICs
Human behavior
SCADA
Resiliency
resilience
DFA
Compositionality
Anomaly Detection
biblio
Securing SCADA Applications Using OpenPLC With End-To-End Encryption
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
AES
Compositionality
encryption
Human behavior
Modbus
OpenPLC
PLC
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
agent based game theoretic
attack tree
Communication networks
Compositionality
Computer crime
confidentiality
covert channels
covert communications channel
CPS system
critical infrastructure cyber-physical systems
critical infrastructures
cyber attackers
cyber-physical adversary
cyber-physical attackers
cyber-physical systems
denial of service
Industrial Control Systems
Information Assurance
information technology systems
integrated circuits
integrity
Modbus
Protocols
pubcrawl
replay
Resiliency
Scalability
security
security of data
sensors
weak information security applications
biblio
Virtualization of Industrial Control System Testbeds for Cybersecurity
Submitted by grigby1 on Fri, 05/19/2017 - 12:56pm
Compositionality
Cybersecurity
Human behavior
ICs
Modbus
OpenPLC
PLC
pubcrawl
Resiliency
SCADA
SCADA Systems Security
Simulink
Vulnerability Analysis
biblio
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis
Submitted by grigby1 on Tue, 05/16/2017 - 11:34am
actuator security
composability
Compositionality
CPS modeling
Human behavior
ICs
ICS Anomaly Detection
IDS
Intrusion Detection System (IDS)
Intrusion Detection Systems
Metrics
Modbus
network intrusion detection
network-intrusion-detection-system
pubcrawl
Resiliency
s7
SCADA
SCADA Systems Security
siemens
simulation
statechart
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
AGA-12
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
end-to-end security
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
NTRU public key algorithm
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
SCADA communication protocols over TCP/IP
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water