Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
potential physical impacts
aforementioned cyber-attacks
attack capabilities
command injection attack
Cyber-physical attacks
decentralized decision making capability
defense mechanisms
IEEE standards
packet drop attack
phasor measurement
command injection attacks
stealthy cyber-attacks
stealthy data manipulation attack
stealthy man-in-the-middle attacks
synchrophasor communication standard
synchrophasor devices
synchrophasor network security
synchrophasor technology
synchrophasor-based synchronous islanding testbed
synchrophasor-based systems
Global Positioning System
computer network security
intrusion detection system
IP networks
security
Software
real-time systems
Resiliency
pubcrawl
composability
security of data
malicious activities
Metrics
standards
Decision Making
Phasor measurement units
smart power grids
Smart Grid
power engineering computing
biblio
Analytical Challenges in Reliability and Resiliency Modeling
Submitted by grigby1 on Wed, 10/02/2019 - 2:55pm
resilience
power generation reliability
power grids
power markets
power system reliability
power transmission reliability
pubcrawl
Reliability and Resiliency Standards
Reliability engineering
power distribution reliability
Resiliency
resiliency modeling
resiliency requirements
Resource Adequacy
standards
transmission facilities
Transmission Security
analytical challenges
North America
Natural gas
maintenance records
maintenance engineering
industry expectations
grid resiliency
Fuel Security
frequent weather conditions
energy limited resources
electric services
electric loads
Electric Grid
economic activities
distribution facilities
changing generation mix
biblio
Cross-Release Code Churn Impact on Effort-Aware Software Defect Prediction
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
open-source projects
standards
software quality
software metrics
software defect prediction
Safe Coding
Resiliency
resilience
regression analysis
public domain software
pubcrawl
Predictive models
Pop effort aware measure
policy-based governance
AUC
Open Source Software
Metrics
Measurement
Human Factors
Human behavior
GM
effort-aware software defect prediction
design metrics
cross-release code churn impact
Cross-release code churn
Correlation
complex systems
collaboration
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 10:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
biblio
Determining a Security Roadmap for the Microelectronics Industry
Submitted by grigby1 on Wed, 09/11/2019 - 2:43pm
security
Microelectronics
microelectronics manufacturing industry
Microelectronics Security
microfabrication
process control
production engineering computing
pubcrawl
resilience
Resiliency
Metrics
security maintenance
security of data
security technology roadmap
smart manufacturing
standards
Supply Chain
supply chain management
technological forecasting
industrial property
Big Data
big data explosion
Cloud Computing
cloud-based solutions
composability
data sharing
data systems
electronic equipment manufacture
electronics industry
advanced process control efforts
Industry 4.0
industry-wide standards
information security
International Roadmap for Devices and System Factory Integration International Focus Team
IP networks
IP security
IRDS FI IFT
manufacturing
biblio
Cybersecurity assurance control baselining for smart grid communication systems
Submitted by aekwall on Mon, 08/05/2019 - 10:42am
Smart Grid
Resiliency
security assurance controls
security baseline
security categorization
security impact levels
security level
security levels
security of data
Security Technical Implementation Guides
security zone
recent innovative risk-based approaches
smart grid communication networks
smart grid communication systems
smart grid security architecture
smart grid system architecture
Smart Grids
standards
Systems Security
technical functional controls
US Defense Information Systems Agency
Human behavior
assurance
assurance baseline
Business
composability
computer security
control systems
cybersecurity assurance base lining concepts
cybersecurity assurance control baselining
cybersecurity assurance controls
Networked Control Systems Security
IEC standards
industrial automation
Information Assurance
Information systems
key cybersecurity control baselining
Metrics
national security systems
policy-based governance
pubcrawl
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 10:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
biblio
IoT Standardisation: Challenges, Perspectives and Solution
Submitted by grigby1 on Mon, 07/01/2019 - 10:02am
computer security
cyber threats
Human behavior
Human Factors
IoT
legislation
privacy
pubcrawl
resilience
Resiliency
Scalability
security audit
Security Audits
standards
biblio
Robust Functional Verification Framework Based in UVM Applied to an AES Encryption Module
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
Measurement
Verification Framework
UVM
Universal Verification Methodology
System Verilog-based functional verification
standards
scalable verification
Scalability
robust functional verification framework
Resiliency
resilience
Reliability engineering
pubcrawl
Metrics
AES encryption module
information-security applications
Industries
high-level designs
hardware description languages
functional verification
formal verification
encryption
direct verification methodologies
digital design industry
design requirements
Cryptography
Compositionality
biblio
Optimal Privacy-Enhancing And Cost-Efficient Energy Management Strategies For Smart Grid Consumers
Submitted by aekwall on Mon, 06/24/2019 - 3:05pm
pubcrawl
Metrics
optimal energy management strategies
optimal privacy-enhancement
optimal solution
policy-based governance
privacy
Privacy Risk
privacy-cost trade-off
privacy-enhancement
Markov processes
Resiliency
signal processing
Smart Grid Consumeer Privacy
smart grid consumer privacy
smart grid consumers
Smart metering system
smart power grids
standards
unauthorized testing
energy cost
Bellman dynamic programming
Conferences
consumer behavior
consumer privacy
cost-efficient energy management strategies
data privacy
decision theory
design problem
dynamic programming
belief state Markov decision process problem
energy management
energy management systems
Energy storage
Human behavior
kullback-leibler divergence
Kullback-Leibler divergence rate
Markov Decision Process
Markov decision process framework
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »