Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Chained Attacks
biblio
Stabilization of Cyber Physical System exposed to a random replay attack modeled by Markov chains
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
computer network security
Scalability
cyber-physical systems
Resiliency
pubcrawl
delays
Stability analysis
Markov processes
Linear systems
stability
Trajectory
CPS
closed-loop system
closed loop systems
linear matrix inequalities
Cyber Physical System
Numerical stability
communication delays
jumping parameters
linear matrix inequality formulation
Markov chains
Markovian jump linear system
packet losses
random replay attack
stabilization problem
stochastic stabilization
stochastic systems
Chained Attacks
biblio
A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
security of data
IP networks
Scalability
Data models
cyber-physical systems
Resiliency
pubcrawl
power grids
password
power engineering computing
power system security
Markov processes
electricity grid
Power Grid
cyber-physical system
markov chain
attack graph
attack propagation
bad data injection
Cyber-physical security assessment
PLADD
attack models
data injection attack scenario
Chained Attacks
biblio
A Hybrid Attack Model for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
security of data
Scalability
security
Data models
cyber-physical systems
learning (artificial intelligence)
Resiliency
pubcrawl
Mathematical model
smart power grids
Substations
power grids
power engineering computing
power system security
Games
Markov processes
electricity grid
Power Grid
Planning
markov chain
attack graph
attack propagation
bad data injection
bad data injection attack
Cyber-physical security assessment
Dynamic Defender model
execution stage
execution stages
HAM
hybrid attack model
Markov Chain model
PLADD
preparation stage
Probabilistic Learning Attacker
Chained Attacks
biblio
Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
computer network security
Scalability
Resiliency
pubcrawl
statistical analysis
Compromised Switches
middlebox-bypass attack
probe-based methods
service function chaining
Service Function Chaining (SFC)
SFC
statistics-based methods
Chained Attacks
biblio
Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Scalability
Cryptography
Resiliency
pubcrawl
logic locking
Security analysis
computability
logic circuits
Boolean functions
ATPG
benchmark circuits
Boolean satisfiability based attack
IP piracy
locked circuits
logic locking attacks
logic locking security
restricted scan chain access
robust design-for-security architecture
robust DFS design
robust DFS technique
SAT attack
scan chain
secret key recovery
unauthorized scan access
working chip
Chained Attacks
biblio
Markov Models of Cyber Kill Chains with Iterations
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Chained Attacks
command and control systems
cyber kill chain with iterations
cyber kill chains bases
cyber threats
cyber-attack kill chains
cyber-attack life cycle
cyber-attack process
cyber-attacks life cycles
homogeneous continuous time Markov chain
homogeneous continuous time Markov chains
Information systems
Markov Models
Markov processes
pubcrawl
Reconnaissance
Resiliency
Scalability
security of data
stochastic models
targeted cyber attacks
targeted cyber-attack processes
Weapons
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
security of data
Scalability
security
Data models
Resiliency
pubcrawl
Google
relay attack
Relays
embedded system security
Markov processes
Training data
Near Field Communication
attack anomalies
electronic payment cases
intrusive detection system
markov chain
near-field communication
target NFC network
Chained Attacks
biblio
Accurate Marking Method of Network Attacking Information Based on Big Data Analysis
Submitted by grigby1 on Fri, 08/28/2020 - 2:33pm
Chained Attacks
accurate marking method
adaptive learning model
attack
attack information chain
attack information tagging
Big Data
Big Data analysis method
Big Data fusion tracking recognition
big data security in the cloud
Cloud Computing
computer network security
Conferences
data analysis
information marking
learning (artificial intelligence)
Metrics
Network
network attack detection ability
network attack information nodes
network attack nodes
network attacking information
network offensive information
network security defense
open network environment
pubcrawl
resilience
Resiliency
Scalability
security of data
smart cities
task scheduling method
telecommunication scheduling
Transportation
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
Chained Attacks
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
cloud-computing environment
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
insider attack
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
resilience
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 12:36pm
Chained Attacks
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
CPS domain
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
cyber-physical systems
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
power engineering computing
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
1
2
3
next ›
last »