Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
SCADA Systems Security
biblio
Deploying Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 03/16/2020 - 9:30am
Compositionality
composability
deployment
Human behavior
Intrusion Detection
intrusion tolerance
intrusion-tolerant SCADA system
machine learning
power engineering computing
power generation
Power Grid
power grid protection
power grid SCADA systems
power grid supervisory control and data acquisition systems
power grids
Power industry
power plant
Power system protection
Protocols
pubcrawl
red team
Resiliency
SCADA
SCADA systems
SCADA Systems Security
security of data
biblio
Real-Time SCADA Attack Detection by Means of Formal Methods
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
security
security of data
critical infrastructure
critical infrastructures
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
model checking
Temporal Logic
Safety
automata
automata theory
SCADA Systems Security
Semantics
Compositionality
Chemicals
programmable controllers
programmable logic controller
Clocks
formal methods
chemical manufacturing plants
chemical substances
control smart grid
critical machines
real-time SCADA attack detection
SCADA control systems
SCADA water distribution system
timed automata
timed automaton
timed temporal logic
water supply
biblio
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
security of data
Bayes methods
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
pattern classification
Databases
Correlation
naïve Bayes classifier
smart power grids
power engineering computing
Smart Grid
Noise measurement
cognition
industrial control system
Intrusion Detection Systems
SCADA Systems Security
situational awareness
Compositionality
supervisory control and data acquisition system
security state
SCADA networks
anomaly reasoning
anomaly reasoning framework
belief propagation
CAPTAR
causal analysis
causal polytrees
causal-polytree-based anomaly reasoning
EDMAND anomaly detection framework
meta-alerts
protected SCADA network
real-time reasoning requirement
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
security of data
Internet of Things
security
Protocols
mobile computing
SCADA systems
supervisory control and data acquisition systems
cyber-physical systems
Resiliency
Human behavior
pubcrawl
Databases
production engineering computing
Python
security vulnerabilities
software maintenance
Object recognition
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
documentation
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
biblio
Security challenges for Water Distribution System Using Supervisory Control and Data Acquisition (SCADA)
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
autonomous SCADA systems
Compositionality
Cyber Attacks
data acquisition
data modelling
distributed supervisory control and data acquisitions
distribution systems
elastic search
Human behavior
Intrusion access control
pubcrawl
public utilities
Resiliency
SCADA networks
SCADA systems
SCADA Systems Security
security of data
security services
water distribution system
water distribution system security
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
cyberattack
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
pubcrawl
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
Petri nets
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
IEC 60870-5-104 protocol
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
biblio
Assessment of SCADA System Vulnerabilities
Submitted by aekwall on Mon, 03/16/2020 - 9:28am
security of data
Monitoring
Hardware
security
Software
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
Databases
cyber-attacks
SCADA Systems Security
operating systems (computers)
Compositionality
actuators
domain-specific vulnerability scoring system
legacy operating systems
national vulnerability database
NVD
publicly available vulnerabilities
SCADA attacks
SCADA critical vulnerabilities
SCADA system vulnerabilities
SCADA vulnerabilities
vulnerability assessment
biblio
Deep-Learning-Based Network Intrusion Detection for SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:28am
Anomaly Detection
ICs
attacks on DNP3 protocol
Compositionality
computer network security
computing nodes
conventional network attacks
conventional SCADA specific network-based attacks
convolutional neural nets
convolutional neural network
Cyber Attack Detection
deep learning
deep-learning-based network intrusion detection system
energy-delivery systems
field devices
Human behavior
ICS network infrastructure
individual network packets
industrial control
Industrial Control Systems
learning (artificial intelligence)
network intrusion detection system
network-based cyber attacks
pubcrawl
realistic SCADA traffic data sets
Resiliency
SCADA network protocols
SCADA system operators
SCADA System Security
SCADA systems
SCADA Systems Security
site-specific network attack
specialized attacks
supervisory control and data acquisition networks
unseen network attack instances
biblio
Improving the Reliability and Security of Active Distribution Networks Using SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:28am
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
Reliability
Mathematical model
smart power grids
Fuzzy logic
Smart Grid
power engineering computing
power distribution faults
power distribution reliability
power system reliability
distributed power generation
SCADA Systems Security
Compositionality
Integrated circuit modeling
power system
Voltage control
active distribution networks
MATLAB
power distribution economics
14-node SCADA-based active distribution network model
active electricity distribution network
active infrastructure
Active Network
arresters
circuit breakers
distribution network
emerging network infrastructure
fault condition isolation
fault conditions
fuzzy logic toolbox
passive infrastructure
power fluctuations
reliability analysis
Simulink software
traditional electricity distribution system
biblio
A New Evaluation Model for Information Security Risk Management of SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:28am
Safety
security of data
Monitoring
security
SCADA
SCADA systems
Resiliency
Human behavior
pubcrawl
risk management
failure analysis
process control
Information systems
SCADA system
SCADA Systems Security
Compositionality
Cyber-physical attacks
Information Security Risk Management
critical information infrastructure
cyber layers
design review
FMEA inherent problems
new evaluation model
Pattern recognition
physical layers
RPN
secure SCADA failure modes
semiquantitative high level analysis
structured method
uncertain environment
vague environment
Vague Set Theory
1
2
3
4
next ›
last »