Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
composability
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by
aekwall
on Mon, 12/02/2019 - 11:05am
autonomous aerial vehicles
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
geolocation strategies
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
human-unmanned aerial vehicle
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
security
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
invasive software
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
cyber physical systems
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
cyber attack
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
Ransomware Injection
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
biblio
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
security of data
security
Protocols
Resiliency
pubcrawl
composability
Metrics
Substations
IEC standards
power engineering computing
power system security
quality of service
command injection attacks
communications channels
generic object oriented substation events messaging service
IEC61850s GOOSE messaging service
Message service
QoS requirements
Queueing analysis
SaS
security technologies
stealthy injection attacks
substation automation
substation automation system
Time factors
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
security of data
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
Metrics
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
message transmission
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
information scanning
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
biblio
SENAD: Securing Network Application Deployment in Software Defined Networks
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
computer network security
Access Control
authorisation
authorization
Runtime
Software
computer architecture
computer network management
software defined networking
Resiliency
pubcrawl
composability
Metrics
SDN controller
process control
network management
command injection attacks
APC
app-to-control threats
application plane controller
Computer crashes
data plane controller
DPC
dubbed SENAD
malicious command injection
network application deployment
network programmability
OpenFlow entries
resource exhaustion attack
resource isolation
SDN architecture
Software Defined Networks
telecommunication control
telecommunication network management
biblio
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
security of data
computer network security
intrusion detection system
IP networks
security
Software
real-time systems
Resiliency
pubcrawl
composability
Global Positioning System
malicious activities
Metrics
standards
Decision Making
Phasor measurement units
smart power grids
Smart Grid
power engineering computing
command injection attacks
aforementioned cyber-attacks
attack capabilities
command injection attack
Cyber-physical attacks
decentralized decision making capability
defense mechanisms
IEEE standards
packet drop attack
phasor measurement
potential physical impacts
stealthy cyber-attacks
stealthy data manipulation attack
stealthy man-in-the-middle attacks
synchrophasor communication standard
synchrophasor devices
synchrophasor network security
synchrophasor technology
synchrophasor-based synchronous islanding testbed
synchrophasor-based systems
biblio
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
Servers
encryption
Resiliency
pubcrawl
composability
Metrics
public key cryptography
Elliptic curve cryptography
Elliptic curves
command injection attacks
Bitcoin curve
elliptic curve parameters
embedded security
Fault attack
Invalid curve attack
Loading
Neves curve attack
OpenSSL
OpenSSL command line tools
Rapsberry Pi single board computer
Singular curve
singular curve point decompression attacks
Supersingular curve
Tibouchis degenerate curve attack
biblio
A Lightweight Compound Defense Framework Against Injection Attacks in IIoT
Submitted by
aekwall
on Mon, 12/02/2019 - 11:03am
computer network security
Cryptography
Internet of Things
telecommunication security
Protocols
software defined networking
Resiliency
pubcrawl
composability
Metrics
Industries
production engineering computing
authentication
message authentication
sensors
Data Transmission
Switches
command injection attacks
commands
compound approach
Compounds
field agent
field data
IIoT network protocols
IIoT Security
Industrial Internet of Things
injection attack
injection attack event
lightweight authentication
lightweight compound defense framework
private networks
Smart industry
biblio
2MA: Verifying Voice Commands via Two Microphone Authentication
Submitted by
aekwall
on Mon, 12/02/2019 - 11:03am
Resiliency
pubcrawl
composability
Metrics
authentication
Internet of Things
command injection attacks
biblio
Phase Jamming Attack: A Practical Attack on Physical Layer-Based Key Derivation
Submitted by
grigby1
on Wed, 11/27/2019 - 2:01pm
pubcrawl
adversary signal transmission
communication channel networks
communication management
Communication system security
composability
Cryptography
Jamming
jamming attack
key generation technique
Metrics
phase attack
phase jamming attack
phase quantization regions
Physical layer
physical layer security
physical layer-based key derivation procedure
physical-layer security
probability
Quantization (signal)
received signal phase quantisation
resilience
Resiliency
secret key generation
secret keys
security
security enhancement performance
Signal to noise ratio
Wireless communication
1
2
3
4
5
6
7
8
9
…
next ›
last »