Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
smart grid devices
power system
power system security
predefined vulnerability patterns
program diagnostics
resilience
Safety
security of data
security threats
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
smart terminals
Syntactics
terminal devices
terminal security
vulnerability detection
Compositionality
pubcrawl
Human behavior
composability
Resiliency
Analytical models
automatic static analysis
buffer-overflow vulnerabilities
buffer-overflow vulnerability detection
static analysis
Computer bugs
device program information
error reporting
feature extraction
Metrics
modern power transmission network
power engineering computing
biblio
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
Symbolic-Model
privacy
protocol verification
Protocols
pubcrawl
radiofrequency identification
RFID protocols
Security Properties
stateful cryptographic protocols
symbolic model
policy-based governance
Tamarin
Tamarin prover
Theorem Proving
tools
user-defined equational theories
verification tool
XOR operations
XOR theory
Cryptography
attack identification
automated unbounded verification
collaboration
composability
Compositionality
Computational modeling
Cryptographic Protocols
Cryptographic-Protocols
Analytical models
electronic payment protocols
equational theory
Exclusive-OR
exclusive-or operations
formal verification
Formal-Verification
Mathematical model
observational equivalence
biblio
Quantifying & minimizing attack surfaces containing moving target defenses
Submitted by Katie Dey on Fri, 09/13/2019 - 5:48am
Measurement
timeliness violations
threat assessment
Surface treatment
security of data
security
Resilient Systems
Quantification
moving target defenses
modeling
Minimization
Analytical models
IP networks
Human Machine Teaming
dynamic proactive defenses
cyber security exposure
cyber security analysis
cyber friendly fire
Computational modeling
C3E 2019
attack surface minimization
Human Machine Teaming
C3E 2019
biblio
Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation
Submitted by Katie Dey on Mon, 09/09/2019 - 3:29pm
user evaluation
HMT
Graphics
Computer graphics
visualization
Human-computer interaction
Alex Endert
IN-SPIRE
Computational modeling
Data models
Data visualization
Analytical models
Semantics
cognition
human-in-the-loop system design
model steering functionality
user analytic process
user interaction methodology
analytical reasoning
Computation
visual analytics
semantic interaction
human computer interaction
data visualisation
data analysis
Human Machine Teaming
Interactions
C3E 2019
biblio
Using a Robust Metadata Management System to Accelerate Scientific Discovery at Extreme Scales
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
-EMPRESS
Metadata Discovery Problem
software fault tolerance
scientific discovery
scale-up scientific applications
query functionality
Production systems
metadata management system
Fault tolerant systems
EMPRESS 2.0
EMPRESS 1.0
custom-metadata
atomic operations
Acceleration
-SIRIUS
Scalability
-descriptive-metadata
-Decaf
-data-tagging
-ATDM
storage management
meta data
fault tolerance
Analytical models
metadata
query processing
Computational modeling
composability
pubcrawl
Resiliency
biblio
Modeling and Analysis of Cascading Failures in Interdependent Cyber-Physical Systems
Submitted by grigby1 on Mon, 08/26/2019 - 11:06am
Power system protection
large-scale failures
Metrics
network parameters
network theory (graphs)
novel interdependent system model
Numerical models
physical network
power system faults
intricate dependencies
pubcrawl
resilience
Resiliency
Robustness
Scalability
security of data
system robustness
Analytical models
intra-dependency
interdependent cyber-physical systems
interdependency model
integrated cyber-physical systems
initial flow
Human Factors
Human behavior
failure analysis
cyber-physical systems
cyber-network
Cyber Dependencies
Compositionality
complex networks
Communication networks
Cascading Failures
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by willirn1 on Fri, 05/31/2019 - 10:41am
resilience
hardware-in-the-loop simulation testbed
HIL testbed
model based software development framework
Model Integrated Computing
physical components
physical system
platform specific performance measurements
railway transportation system
hardware-in-the-loop
security of data
simulation environment
Software
software engineering
system functions
testbed
Vanderbilt
vulnerability assessment
cyber-attack effect evaluation
actuation capability
Analytical models
Computational modeling
computer architecture
computer security
CPS attack experiments
cyber components
cyber physical systems
System-security co-design
cyber-physical system
cyber-physical systems
cybersecurity design process
embedded computers
embedded systems
Experimentation
Hardware
hardware-in-the loop simulation
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats
Submitted by grigby1 on Thu, 03/28/2019 - 3:15pm
defense strategies
signature based defense
tagging
suspicious information
signature-based antivirus systems
refinable attack investigation framework
realworld attack dataset
RAIN framework
optimal adversary
nonadversarial information tracking
multistage game
memory overhead
information flow passes
dynamic information flow tracking games
DIFT games
security
adversarial information flows
Resiliency
Cyber Attacks
firewalls
Stochastic processes
game theory
Scalability
pubcrawl
Monitoring
resilience
Games
Computational modeling
Analytical models
security of data
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
…
next ›
last »