Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
critical infrastructures
biblio
Physical Security Detectors for Critical Infrastructures Against New-Age Threat of Drones and Human Intrusion
Submitted by
grigby1
on Mon, 01/11/2021 - 12:58pm
complex cyber-physical systems
continuous stream
critical infrastructure operators
critical infrastructure security
critical infrastructures
cyber incidents
deep video
Deep-learning
DEFENDER project
distributed cyber-physical systems
drone detection
early stage threat detection
fast restoration
human intruders
human intrusion
Intrusion Detection
learning (artificial intelligence)
Media Data
Metrics
modern critical infrastructures
multithreaded media input streams
neural nets
neural network deep-learning model
NVIDIA GeForce GTX 1080
NVIDIA GeForce RTX 2070 Max-Q Design
physical intrusion
physical security detectors
physical security sensors
proactive protection
pubcrawl
real-time threat identification
Region based Fully Connected Neural Network (RFCN)
remotely operated vehicles
resilience
Resiliency
Scalability
security of data
video analytics solution
Vulnerability
biblio
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices
Submitted by
grigby1
on Tue, 12/01/2020 - 3:35pm
collaboration
composability
computer network security
computer security
critical infrastructure
critical infrastructures
electric industrial facilities
Home appliances
Human behavior
Human Factors
internet
Internet background radiation traffic
Internet frontier
internet of malicious things
Internet of Things
Internet-scale Computing Security
Internet-scale insecurities
internet-scale unsolicited IoT devices inference
Internet-wide scanning
IoT cyber security situational awareness
IoT malicious raw data
IoT paradigm
Metrics
Policy Based Governance
pubcrawl
resilience
Resiliency
Scalability
smart home appliances
Smart homes
unsolicited Internet-scale IoT devices
unsolicited IoT devices
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by
aekwall
on Mon, 11/16/2020 - 1:57pm
security
security of data
critical infrastructure
critical infrastructures
Resiliency
pubcrawl
vulnerabilities
Companies
Government
Software Architecture
5G mobile communication
resilience
Telecommunications
threats
Communications
security approach
disasters
natural disasters
criminal attacks
extreme weather events
holistic situation awareness
RESISTO H2020 EU-funded project
risk mitigation
telecom infrastructures
Resilient Security Architectures
biblio
Cybersecurity education and training in hospitals: Proactive resilience educational framework (Prosilience EF)
Submitted by
grigby1
on Wed, 11/04/2020 - 12:59pm
computer security
critical infrastructures
cyber physical systems
cyber resilience level measuring
cyber-attacks
Cybersecurity
cybersecurity education
cybersecurity threats
cybersecurity training
cybersecurity training providers
data protection procedures
educational training schemes
eHealth
Electronic healthcare
health care
healthcare settings
holistic cyber resilience
hospitals
Human Errors
information security processes
information technology
multilateral educational training scheme
privacy
proactive resilience educational framework
Prosilience EF
pubcrawl
resilience
security framework
security of data
Training
training development
biblio
Measurement and Analysis of Cyber Resilience for Control Systems: An Illustrative Example
Submitted by
grigby1
on Tue, 10/06/2020 - 1:10pm
control system environment
control system operation
control system security
control systems
CPS resilience
critical infrastructure
critical infrastructures
cyber attack
Cyber Attacks
cyber physical systems
cyber resilience
cyber security
cyber threats
cyber-physical systems
cyberattack
Digital Information
digital systems
frequency control
Frequency measurement
load frequency control
pubcrawl
resilience
Resiliency
biblio
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Submitted by
aekwall
on Mon, 10/05/2020 - 10:47am
Resilient Security Architectures
Resiliency
Active Defence
business operations
CPS resilience
critical infrastructure
critical infrastructures
cyber physical systems
cyber resilience
Cyber Resilient Embedded System
Cyber-Physical Embedded System
embedded architectures
embedded security domains
embedded security microarchitecture
embedded security requirements
embedded systems
embedded technologies
international security regulations
microarchitectural characteristics
next-generation critical infrastructure
pubcrawl
Recover
Response
security breach
security foundation
security methods
security of data
Security Regulation
serious embedded security challenges
technology manufacturers
biblio
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures
Submitted by
aekwall
on Mon, 10/05/2020 - 10:46am
security of data
Monitoring
security
cyber security
critical infrastructures
Resiliency
pubcrawl
internet
risk management
Mathematical model
Data mining
Cyber Attacks
cyber physical systems
Indexes
resilience
Critical Infrastructure Protection
cyber-physical systems security
CPSS
bulky system logs
critical feedback control loop
cyber-physical system resilience
digital computers
general-purpose evaluation methodology
remote monitoring
resilience indexes
Resilience Metrics
single system-wide measure
situational awareness and security metrics
System Dynamics
wastewater treatment
wastewater treatment plant
CPS resilience
biblio
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems
Submitted by
aekwall
on Mon, 09/28/2020 - 11:16am
Human Behavior and Cybersecurity
Adaptation models
Artificial Intelligence
artificial intelligent
cognition
Cognitive cybersecurity
cognitive cybersecurity framework
cognitive methods
cognitive techniques
computer security
CPS Privacy
CPS-IoT
CPS-IoT enabled healthcare services
critical infrastructure systems
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity specialists
data privacy
emerging cybersecurity
health care
Healthcare
healthcare ecosystem
Human behavior
human cognitive behaviour
Human Factors
human life
infrastructures
innovative cognitive cybersecurity
Internet of Things
machine learning
Medical services
privacy
Privacy Threats
pubcrawl
security of data
sophisticated attack methods
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by
grigby1
on Fri, 07/24/2020 - 12:01pm
automated systems
control engineering computing
Control Theory
critical infrastructure facilities
critical infrastructures
Cyber Attacks
Data protection
graph theory
industrial control
Industrial Control Systems
information resources
Information services
integrated circuits
Mathematical model
modeling of protected systems
open systems
production engineering computing
pubcrawl
reference security model
reference security models
security
security of data
Servers
Software
system protection analysis
weighted oriented graphs
biblio
Ransomware Threat and its Impact on SCADA
Submitted by
grigby1
on Fri, 07/10/2020 - 12:08pm
production engineering computing
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
cryptocurrency
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
Data Mitigation
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Ransom
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
1
2
3
4
5
6
7
next ›
last »