Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyber-attack
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:11pm
security of data
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
power system faults
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
Critical Infrastructure Protection
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
power systems infrastructures
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
biblio
A cyber physical power system co-simulation platform
Submitted by grigby1 on Thu, 07/16/2020 - 10:56am
automatic voltage control
AVC
closed loop systems
composability
control engineering computing
CPS modeling
cyber physical power system co-simulation platform
Cyber Physical System
Cyber Physical System (CPS)
cyber-attack
denial-of-service attack
hardware-in-the loop simulation
Hardware-in-the-loop (HIL)
hardware-in-the-loop simulation function
information and communication technology
Metrics
power engineering computing
Power Grid
power system control
power system security
power system simulation
power system stability
pubcrawl
real-time systems
resilience
Resiliency
Routing protocols
simulation
simulations
smart power grids
Synchronization
Voltage control
biblio
N-1 RTU Cyber-Physical Security Assessment Using State Estimation
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
security of data
cyber-attack
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
cyber-attacks
power system security
energy management systems
power system state estimation
power system control
SCADA system
private networks
supervisory control and data acquisition system
substation automation
state estimation
Denial-of-Service
state estimator
control center
Remote Terminal Units
cyber-physical impact
Cyber-physical security assessment
electrical substations
EMS applications
IEEE 14-bus system
N-1 RTU cyber-physical security assessment
observability analysis
power system devices
synthetic 200-bus system
Damage Assessment
biblio
Cyber KPI for Return on Security Investment
Submitted by grigby1 on Mon, 03/09/2020 - 1:38pm
cyber dashboard
cyber incidents
cyber KPI
cyber security
cyber security benefits
cyber security incident
cyber security reports
cyber security return
cyber subject matter experts
cyber-attack
cyber-attacks
Metrics
pubcrawl
return on investment
Return on Security Investment
ROI
RoSI
security investment
Security Metrics
security of data
biblio
Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
security of data
cyber-attack
feature extraction
Feature Selection
Resiliency
Human behavior
pubcrawl
cyber-attacks
Scalability
cyber threats
auditing
aggressive cyber landscape
complicated cyber landscapes
cybersecurity audit
cybersecurity audit execution
feature extraction and selection
threat profiling
Security Audits
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 11:05am
security of data
IP networks
smart devices
Resiliency
pubcrawl
graph theory
smart power grids
Fuzzy logic
Smart Grid
power engineering computing
power system security
radio networks
Human Factors
Compositionality
cyber-attack
cyber intrusion
data loss
extreme IP
fuzzy logic approach
fuzzy rules
graph theory approach wireless communication network
grid power flow
higher degree nodes
Internet Protocol (IP)
Internet Protocol address
nearby nodes
smart grid communication network
smart grid wireless network
Smart Sensor
WCN
Wireless Communication Network (WCN)
Smart Grid Sensors
biblio
Advanced Petya Ransomware and Mitigation Strategies
Submitted by aekwall on Mon, 10/07/2019 - 10:43am
Advance Petya ransomware
anti-virus detection
composability
Computer crime
Cryptography
cyber era
cyber threats
cyber world
cyber-attack
Cyber-security
Electronic mail
encryption
encryption codes
heavy ransom
invasive software
Metrics
Mitigations
Organizations
Petya ransomware
pubcrawl
Ransomware
ransomware attack
Resiliency
biblio
Vulnerability analysis of power systems based on cyber-attack and defense models
Submitted by willirn1 on Thu, 05/30/2019 - 3:34pm
game theory
power engineering computing
Vanderbilt
power system security
security of data
power systems
system operators
cyber-attack
Vulnerability Analysis
defense models
game-theoretic approach
Attacker Modeling
defender modeling
Substations
Load modeling
power transmission lines
power system faults
Power system protection
Monitoring
blackouts
Cascading Failures
SCADA
Smart Grid
RTUs
resilience
biblio
Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems
Submitted by aekwall on Mon, 03/04/2019 - 9:47am
human-in-the-loop security center paradigm
Monitoring
cyber-attack
Human behavior
pubcrawl
composability
Metrics
attribution
Digital Forensics
attack-based digital forensic evidences
authentication
Evidence
Forensic Artifacts
forensic investigations
hardware-in-the loop simulation
hardware-in-the-loop
knowledge base
knowledge based systems
Phasor measurement units
PMUs
power system analysis computing
power system forensics
Protection and Control systems
Smart Grids
smart power grids
substation
Substations
WAMPAC systems
wide area monitoring
Wide Area Monitoring Protection and Control
biblio
Cyber Security Knowledge Graph Based Cyber Attack Attribution Framework for Space-ground Integration Information Network
Submitted by aekwall on Mon, 03/04/2019 - 9:45am
security of data
human-in-the-loop security center paradigm
Ontologies
cyber-attack
Human behavior
pubcrawl
composability
graph theory
Metrics
internet
tools
computer security
Correlation
cyber attack attribution
cyber security knowledge graph
network attacks
pattern matching
space-ground integration information network
attribution
1
2
3
next ›
last »