Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data acquisition systems
biblio
Design of Intrusion Prevention System for OT Networks Using Deep Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Air gaps
automation industries
automation scenarios
behavior-based intrusion prevention system
computer network security
cyber-attacks
data acquisition
data acquisition systems
Deep Neural Network
deep neural networks
deep packet inspection
DNP3
DoS attack
feature extraction
industrial control
Industries
industry control system
insider attacks
integrated circuits
internet
intrusion prevention system
invasive software
IPS system
malware
Modbus
network threats
neural nets
Neural networks
operational technology system elements
OT Network
OT networks
Protocols
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA test bed
Scalability
telecommunication security
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
security of data
computer network security
Monitoring
distributed processing
Protocols
SCADA
SCADA systems
Resiliency
pubcrawl
composability
network attacks
Substations
power grids
fault tolerant computing
power system reliability
resilience
computer centres
Power Grid
intrusion tolerance
data centers
network attack
control centers
data acquisition systems
nation-state-level attackers
network-attack-resilient intrusion-tolerant SCADA
power grid infrastructure
SCADA system management
simultaneous intrusions
sophisticated network-level attacks
Spire
supervisory control
System recovery
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 9:10am
composability
computer network security
constantly morphing surface
critical infrastructure environments
critical infrastructures
critical physical processes
cyber defenders
cyber defense
cyber security
cyber threat landscape
data acquisition
data acquisition systems
deception
generating deception environments
Human behavior
ICs
ICS networks
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization