Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security techniques
biblio
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
hyper-connected society
automotive security-risk analysis
automotive vehicles
car-hacking studies
car-hacking techniques
common-vulnerabilities- exposure system
cyber kill chain-based cyberattack analysis method
electronic control devices
formal vulnerability-analysis system
automotive industry
ICT environment
information security techniques
mechanical devices
security risk analysis
systematic security-risk-assessment
vehicle-related cyberattacks
vulnerability-information-sharing architecture
Chained Attacks
Computer crime
resilience
Resiliency
automobiles
Automotive engineering
Autonomous Driving
Scalability
5G mobile communication
Industries
pubcrawl
risk analysis
information sharing
traffic engineering computing
Cyber Kill Chain
automotive cybersecurity
Ransomware
5g network
automotive CVE
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Thu, 04/30/2015 - 11:54am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection