Browsing by Subject "Cybersecurity"
Now showing items 1-10 of 10
-
(2022-04-21)The power transmission grid plays a pervasive role in modern society and its failure has a significant impact. In the past, the grid has been subjected to malicious attacks. With the increasing ...
-
Covering arrays have proven to be highly effective in detecting software bugs in what is known as combinatorial testing. A t-way covering array includes all t-way combinations of variable values, up to a specified level ...
-
(2021-12-01)Intrusion detection systems (IDS) play a critical role in cybersecurity and are used to identify malicious behaviour in network traffic. The weakness of modern approaches is that they are reactive responses reliant on ...
-
(2023-01-04)This work investigates and develops a novel method of cyberattack which aims to take control of an autonomous aerospace system by injection of false measurement data. This work demonstrates that an attacker can use ...
-
(2022-04-20)The cybersecurity field has grown exponentially in recent history with little to no general understanding of the requirements for professionals in the field. Our research question is: how can the perception of the cybersecurity ...
-
(2021-12-01)Material from CSCE 704 Data Analytics for Cybersecurity taught by Dr. Martin Carlisle is made available here as part of the National Science Foundation (NSF) grant (award number 1730695)- CyberTraining: CIP: CiSE-ProS: ...
-
(2021-12-01)Fundamentals of Cybersecurity is an undergraduate course presented by Dr. Phillip Ritchey. In this collection, material from the 18 modules presented during Summer 2021 are included as part of the National Science Foundation ...
-
(2022-08-17)Power grids are currently evolving into modern smart grids by integrating Information and Communication Technologies (ICT) into large-scale power networks to generate, transmit, and distribute electricity more efficiently. ...
-
(2017-08-30)In this thesis, we address issues related to middleware, architecture and applications of cyber-physical systems. The first problem we address is the cross-layer design of cyber-physical systems to cope with interactions ...
-
(2021-12-02)The integration of Information Technology (IT) and Industrial Control Systems (ICS) has made the monitoring and remote controlling of ICSs inexpensive and reliable. However, the lack of cybersecurity protection of field ...