Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
attack model
biblio
Relationship Anonymity Evaluation Model Based on Markov Chain
Submitted by grigby1 on Wed, 02/09/2022 - 2:46pm
markov chain
anonymity
Anonymous assessment
attack model
Communication networks
composability
Computational modeling
Computers
Human behavior
Resiliency
Markov processes
Metrics
Probabilistic logic
Probability distribution
pubcrawl
Receivers
Relationship anonymity
resilience
biblio
MILP Modeling of Targeted False Load Data Injection Cyberattacks to Overflow Transmission Lines in Smart Grids
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
optimal power flow constraints
Transmission line measurements
False Data Detection
power system state estimation
attack model
bad data detection constraints
bi-level mixed integer linear programming optimization model
IEEE 118-bus power system
MILP modeling
Mixed Integer Linear Programming (MILP)
cyber physical systems
optimal power flow problem
optimized false data injections
overflow transmission lines
targeted false load data injection cyberattacks
targeted load buses
targeted transmission line
Transmission Line Congestion
upper level optimization problem
composability
security
pubcrawl
Human behavior
resilience
Resiliency
Data models
power system security
smart power grids
security of data
Load modeling
Smart Grids
optimisation
power transmission lines
Load flow
power system simulation
cyberattack
False Data Injection
biblio
Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
industrial control system
Safety
Resiliency
pubcrawl
Protocols
production engineering computing
Predictive Metrics
power systems
power industry control system intrusion
Networked Control Systems Security
network invasion
network intrusion
Control Theory
industrial control network space security
industrial control
control systems
control engineering computing
computer network security
composability
Business
behavior characteristics analysis
attack model
attack behavior analysis
security
biblio
To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
public cloud services
Virtual machining
virtual machines memory snapshots API call sequences
virtual machines
virtual machine snapshots
virtual machine security
Virtual machine monitors
unsupervised machine
unattacked virtual machine memory snapshots
supervised machine learning techniques
self-heal approach
self-heal algorithm
Self-Heal
security features
security
API calls
pubcrawl
private cloud environment
private cloud
operating systems
Monitoring
malware attacks
malware
machine learning algorithms
learning (artificial intelligence)
invasive software
Cloud Computing
attack model
application program interfaces
biblio
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
nods defection
open wireless medium
packet drop rate
packet dropping attack
packet forwarding
pubcrawl
reactive routing protocols
resilience
Resiliency
Routing
nodes unreliability
routing rules
security
self-configuring automatic vehicles
selfish behaviours
Selfish nodes
T-MANET
Tactical MANET
Tactical Mobile Ad-hoc NETworks
telecommunication security
Wireless communication
MANET
attack model
black hole
Compositionality
DSR routing protocol
energy consumption rate
gray hole
high dynamic network architecture
insider threat model
Insider Threats
malicious insider threats
Ad-Hoc Network
Measurement
Metrics
mobile ad hoc network
mobile ad hoc networks
network flow
Network Simulator 2
network throughput
nodes cooperation
nodes misbehavior
biblio
Attack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring
Submitted by grigby1 on Tue, 05/01/2018 - 11:36am
attack model
attack tree
Human behavior
power grid vulnerability analysis
pubcrawl
resilience
Resiliency
Scalability
security issues
Sophisticated Attacks
supply chain security
Wide Area Monitoring Security
biblio
Hardware Trojans: Lessons Learned After One Decade of Research
Submitted by grigby1 on Wed, 05/17/2017 - 1:34pm
attack model
countermeasures
Hardware security and trust
hardware Trojan attacks
pubcrawl
Resiliency
supply chain security