Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Damage Assessment
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by
aekwall
on Mon, 07/06/2020 - 9:19am
CPS resilience
cyber physical systems
cyber threats
cyber-physical systems
Damage Assessment
data-driven attack graph
Erbium
fault graph-based model
graph theory
information technology
operational impact assessment
Operational Resilience
operational technology
optimal cyber defense remediation
pubcrawl
random system faults
resilience
Resiliency
resource management
risk analysis
risk management
Safety
security
security of data
Servers
software fault tolerance
Software Vulnerability
tactical risk
biblio
Online Anomaly Detection of Time Series at Scale
Submitted by
aekwall
on Mon, 07/06/2020 - 9:19am
security of data
Monitoring
Cloud Computing
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
standards
Business
Anomaly Detection
Data mining
business operations
microsoft windows
time series
Time series analysis
automatic network-stream monitoring
cloud computing environments
cloud platforms
cyber breaches
cyber situation awareness
data analysis techniques
financial stability
network stream monitoring
non-parametric methods
nonparametric techniques
online anomaly detection
parametric methods
real-time requirements
reputation damage
stock values
Streaming platforms
targeted corporations
time-series analysis methods
time-series anomaly detection
time-series data analysis
Damage Assessment
biblio
Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment
Submitted by
aekwall
on Mon, 07/06/2020 - 9:19am
Accidents
CEI cyber resilience assessment
Computer crime
critical energy infrastructure
critical infrastructures
cyber incidents
cyber resilience
Damage Assessment
external hostile influences
Fuzzy logic
fuzzy logic-based approach
fuzzy set theory
Linguistics
logic linguistic models
logic-linguistic models
multilevel fuzzy logic models
pubcrawl
resilience
resilience assurance
resilience capacities
Resiliency
risk management
Safety
security of data
Ukrainian CEI
vital physical system
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by
aekwall
on Mon, 07/06/2020 - 9:19am
security of data
Resiliency
pubcrawl
Risk
smart power grids
Cyber Attacks
probability
power engineering computing
power system security
Petri nets
cyber security
substation automation
Stochastic processes
power transmission lines
smart power grid
Cyber Physical System
stochastic petri nets
power supply
attacks
cyber physical performance
cyber security risk assessment method
electrical network
IEEE39 bus system
intelligent attack
nonintelligent attacks
Petrinet
power system components
power system structure
power transmission protection
substation
transmission line protection systems
Damage Assessment
biblio
N-1 RTU Cyber-Physical Security Assessment Using State Estimation
Submitted by
aekwall
on Mon, 07/06/2020 - 9:19am
security of data
cyber-attack
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
cyber-attacks
power system security
energy management systems
power system state estimation
power system control
SCADA system
private networks
supervisory control and data acquisition system
substation automation
state estimation
Denial-of-Service
state estimator
control center
Remote Terminal Units
cyber-physical impact
Cyber-physical security assessment
electrical substations
EMS applications
IEEE 14-bus system
N-1 RTU cyber-physical security assessment
observability analysis
power system devices
synthetic 200-bus system
Damage Assessment
biblio
A Study of Security Modeling Techniques for Smart Systems
Submitted by
aekwall
on Mon, 07/06/2020 - 9:18am
security of data
security
Software
Resiliency
pubcrawl
Analytical models
risk management
Stochastic processes
Unified modeling language
system resources
critical security systems
fault trees
secure smart system development life cycle
Security modeling
Security Modeling Techniques
Smart Systems
Smartness
system services
Threat Modeling
Damage Assessment
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by
aekwall
on Mon, 07/06/2020 - 9:18am
security
security of data
critical infrastructure
critical infrastructures
information security
Resiliency
pubcrawl
computer security
Cyberspace
National security
Europe
critical information infrastructure
air gap
common cyberspace
critical infrastructure security
cyber environment
information environment
informational space
intergovernmental national views
protection of critical infrastructure
Damage Assessment
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by
aekwall
on Mon, 07/06/2020 - 9:18am
Inspection
critical infrastructure
Resiliency
pubcrawl
Cameras
Three-dimensional displays
autonomous aerial vehicles
National security
Bridges
Aircraft
disasters
—sUAS
automated damage assessment
Homeland Security
Infrastructure Inspection
Laser radar
lidar
natural disasters
online mapping technique
optical radar
post-disaster response
small unmanned aircraft systems
sUAS
Damage Assessment
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by
grigby1
on Tue, 02/18/2020 - 11:05am
Analytical models
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Moving Target Defence
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
performance overhead
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
security
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
biblio
Security risk assessment of the PeopleBot mobile robot research platform
Submitted by
grigby1
on Wed, 09/12/2018 - 10:13am
collision avoidance
control
critical missions
Damage Assessment
Ethernet
internet
mobile robot platform
mobile robots
PeopleBot mobile robot research platform
pubcrawl
remote access service
remote accessing
resilience
Resiliency
risk management
Robot sensing systems
robotic systems
robots
security
security access
security of data
security risk assessment
security threats
Service robots
ubiquitous computing
WiFi
1
2
3
next ›
last »