Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cyberattack
biblio
Assessment of Machine Learning Techniques for Building an Efficient IDS
Submitted by grigby1 on Fri, 04/09/2021 - 11:35am
learning (artificial intelligence)
machine learning
security
Intrusion Detection
Intrusion Detection Systems
pubcrawl
Resiliency
computer network security
telecommunication security
machine learning techniques
composability
real-time systems
telecommunication traffic
DDoS Attacks
Cyber Attacks
Buildings
resilience
IDS
cyberattack
denial-of-service attack
CICIDS2017 dataset
complex environments
efficient IDS
IDS dataset
realistic background traffic
biblio
Information-Centric Cyberattack Analysis and Spatiotemporal Networks Applied to Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
tools
CPS
cyber-physical systems
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
computer network security
Heuristic algorithms
Scalability
internet
Entropy
information security
composability
Measurement
Cybersecurity
cyberattack
system vulnerabilities
situational awareness
Spatiotemporal phenomena
markov chain
cyber threat
cyberattack resilience
cybersecurity capabilities
cybersecurity risks
data quality
entropy-centric algorithm
graphs
Information Assurance
information-centric cyberattack analysis
intelligence exploitation
networks
spatiotemporal dynamic graphs
spatiotemporal networks
statistically-characterized dynamic graphs
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
cyberattack
security of data
Scalability
game theory
information security
Resiliency
pubcrawl
Wireless communication
Mathematical model
Measurement
network structure
Games
Human Factors
Predictive Metrics
Biological system modeling
Nash Equilibrium
game theoretic security
game-theoretic approach
adaptive reconfiguration
computer attacks
cyber attacks protection
dynamic network infrastructure
game theory approach
network games
network reconfiguration
self-regulation
wireless dynamic networks
biblio
A Resilient Control Against Time-Delay Switch and Denial of Service Cyber Attacks on Load Frequency Control of Distributed Power Systems
Submitted by grigby1 on Mon, 03/15/2021 - 1:09pm
centralized controller
command injection attacks
composability
control signals
cyberattack
Delay effects
delays
distributed power systems
false data injection cyber attacks
feedback
frequency control
load frequency control
load regulation
locally generated feedback control laws
Metrics
power generating stations
power system control
power system security
power system stability
pubcrawl
resilience
Resiliency
resilient TDS control
security of data
sensing loops
sensors
TDS cyber attack
telemetered control commands
telemetry
time-delay switch cyber attack
biblio
An Automatic Detection and Analysis of the Bitcoin Generator Scam
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
automatic detection
BGS
bitcoin
bitcoin addresses
bitcoin generator scam
bitcoin-based scam monitoring systems
blockchain
blockchain analysis
Computer crime
Crawlers
cryptocurrencies
cryptocurrency
Cryptography
cyberattack
Data mining
financial data processing
fraud detection
free bitcoins
Generators
generic system
Human behavior
internet
pubcrawl
Scalability
scam analysis
scam instances
search engines
security
USD
Web page
biblio
Is Cryptojacking Dead After Coinhive Shutdown?
Submitted by grigby1 on Wed, 02/10/2021 - 1:11pm
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
internet
Computer crime
online front-ends
Web sites
malicious script
cyberattack
cryptocurrency
cryptojacking
cryptomining
coinhive scripts
coinhive shutdown
cryptocurrency mining
cryptojacking dead
in-browser mining
in-browser mining activities
legal mining scripts
legal mining service
malicious scripts
victims
biblio
Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
Computer crime
Scalability
Task Analysis
Resiliency
pubcrawl
Computational modeling
Metrics
optimization
cyberattack
cyber-physical systems
resilience
Artificial Neural Networks
Human Factors
Compositionality
Open Source Software
Cyber Dependencies
logical attack graph
mission impact
mission impact propagation graph
operability
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
adversary behavior
Adversary Models
Analytical models
APT
attackers
authorisation
Bronze Butler APT
cyber adversary behavior
cyberattack
Cybersecurity
Data models
defender
DEVS
Entry points
event-driven simulation model
Human behavior
internet
malware
Metrics
network infrastructure
proactive analysis
pubcrawl
request-response session level
resilience
Resiliency
Scalability
session-level adversary intent-driven cyberattack simulator
tools
user access levels
biblio
Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
cyberattack
computer network security
cyber-physical systems
Resiliency
pubcrawl
composability
graph theory
security problem
Topology
telecommunication network topology
Predictive Metrics
Laplace equations
Communication channels
telecommunication control
distributed control
denial-of-service attack
denial-of-service attacks
attack graphs
CPSS
construction algorithm
Decentralized Control
denial-of-service (DoS) attacks
distributed control schemes
distributed controller independent
distributed event-triggered controller
distributed secure control
DoS attack modes
k-connected communication topology
k-connected graph
mode-switching DoS attacks
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
security of data
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Analytical models
Scalability
Computational modeling
Security analysis
Games
Cyber Attacks
advanced persistent threat
APT
threat detection
cyberattack
game theory
Markov processes
q-learning
advanced persistent threats
Dynamic Information Flow Tracking
DIFT-based defender
Limiting average reward criteria
multistage attacks
Rain
real-word attack dataset
refinable attack investigation framework
Stackelberg semiMarkov game
Stackelberg zero-sum semi-Markov games
two-time scale Q-learning algorithm
1
2
3
4
5
next ›
last »