Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attacks
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Big Data Security Issues and Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
Computer crime
natural language processing technology
DNS
cyber security issues
big data security issues
advanced persistent threat detection
Phishing
Information Assurance
data privacy
natural language processing
cyber-attacks
spam detection
Vulnerability Analysis
advanced persistent threat
pubcrawl
Human behavior
Resiliency
information security
cyber security
security
malware
Conferences
Organizations
Big Data
Scalability
biblio
An abstraction layer for cybersecurity context
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
Metrics
virtual services
telecommunication security
software components
security-related data
security of data
security context
security appliances
Resiliency
resilience
pubcrawl
object-oriented programming
object oriented security
cloud applications
lightweight inspection
IoT devices
Internet of Things
heterogeneous sources
flexible abstraction layer
enforcement hooks
cybersecurity context
cyber-security frameworks
cyber-attacks
composability
Cloud Computing
biblio
Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
Submitted by grigby1 on Fri, 04/24/2020 - 4:38pm
algorithmic approaches
Power Grid Vulnerability Assessment
Voltage measurement
SCADA
power system stability
power related errors
power grid control systems
power flow cyber-attack vulnerabilities
power flow constraints
Numerical Resilience
Load flow
Economic dispatch
cyber-attacks
contingency analysis
attack models
security of data
Metrics
power grids
convergence
control systems
composability
Smart Grid
power system security
power engineering computing
state estimation
Indexes
Resiliency
resilience
pubcrawl
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Time factors
Scalable Security
Statistics
security events data
QuickAdapt
distributed BDCA system
descriptive statistics
Big Data Cyber Security Analytics
BDCA system
Adaptation
fuzzy rules
Accuracy
security of data
Scalability
quality of service
fuzzy set theory
data analysis
cyber-attacks
pubcrawl
feature extraction
cyber security
computer architecture
Big Data
Computer crime
biblio
Assessment of SCADA System Vulnerabilities
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
operating systems (computers)
vulnerability assessment
SCADA vulnerabilities
SCADA system vulnerabilities
SCADA critical vulnerabilities
SCADA attacks
publicly available vulnerabilities
NVD
national vulnerability database
legacy operating systems
domain-specific vulnerability scoring system
actuators
Compositionality
security of data
SCADA Systems Security
cyber-attacks
Databases
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
Software
security
Hardware
Monitoring
biblio
Cyber KPI for Return on Security Investment
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
cyber-attacks
security of data
Security Metrics
security investment
RoSI
ROI
Return on Security Investment
return on investment
pubcrawl
Metrics
cyber dashboard
cyber-attack
cyber subject matter experts
cyber security return
cyber security reports
cyber security incident
cyber security benefits
cyber security
cyber KPI
cyber incidents
biblio
New security architecture using hybrid IDS for virtual private clouds
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
learning (artificial intelligence)
virtual private clouds
virtual private cloud
virtual machines
virtual machine security
virtual machine
telecommunication traffic
security architecture
private cloud environments
privacy vulnerability
neural nets
network-based intrusion detection system
network-based IDS
network security
Malicious Traffic
machine learning
IDS
intrusion detection system
IDS based ANN
hybrid Intrusion Detection System
hybrid IDS
host-based intrusion detection system
digital transformation
digital revolution
detection engine
data privacy
cyber-attacks
computer network security
Cloud Computing
artificial neural network
anomalies detection
pubcrawl
biblio
Secure estimation for intelligent connected vehicle systems against sensor attacks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Acceleration
Security Risk Estimation
state estimator
sensor attacks
Sensor attack
intelligent control
Intelligent connected vehicles
intelligent connected vehicle system
Channel estimation
closed loop systems
secure estimation
vehicular ad hoc network
telecommunication control
wireless channels
connected vehicles
road vehicles
estimation
Human Factors
Stability analysis
cyber-attacks
Metrics
Wireless communication
Communication system security
vehicular ad hoc networks
telecommunication power management
wireless sensor networks
pubcrawl
Resiliency
telecommunication security
Scalability
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »