Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber attack
biblio
Using Attack Pattern for Cyber Attack Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 11:23am
cyber attribution problem
pubcrawl
Metrics
information system
individual organization
Human behavior
data integrity
data confidentiality
data availability
attack pattern
Cyber Attribution
cyber attack initiator identification
cyber attack
computer network security
composability
attribution
attack scenario
biblio
Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
advanced attacking skills
APT attack
threat intelligence sharing community
threat intelligence
Sharing Community
persistent attacking skills
low-quality shared intelligence
intelligence information
information processing
data sharing
cyber attack
analyzing malicious behavior
business data processing
cyber-attacks
APT
advanced persistent threat
Metrics
Computer crime
Scalability
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
Phishing URL Detection Via Capsule-Based Neural Network
Submitted by grigby1 on Fri, 04/10/2020 - 11:37am
Neural networks
Web sites
URL Detection
unsolicited e-mail
Uniform resource locators
uniform resource locator
substantial manual feature engineering
social engineering
sensitive information
pubcrawl
phishing Website
phishing detection method
Phishing Detection
phishing criminals
phishing attacks
Phishing
capsule network
machine learning
Human Factors
Human behavior
Heuristic algorithms
feature representations
feature extraction
deep learning
cyber security
cyber attack
critical threat
convolutional neural nets
convolutional layer
convolution
Computer crime
capsule-based neural network
biblio
A Data-Driven Dynamic State Estimation for Smart Grids under DoS Attack using State Correlations
Submitted by aekwall on Mon, 03/09/2020 - 10:17am
Scalability
Resiliency
pubcrawl
Metrics
smart grid security
Human Factors
time series
cyber attack
data-driven dynamic state estimation
state correlations
Security Risk Estimation
biblio
Does the NIS implementation strategy effectively address cyber security risks in the UK?
Submitted by aekwall on Mon, 02/17/2020 - 1:28pm
NIS directive
cyber spaces
cyber-risk management capabilities
cyber-security risk management capabilities
DSP
IGP
legislation
national framework
NCSC
network and information security
NIS
cyber security risks
NIS framework
NIS implementation
NIS implementation strategy
NIS key strategic objectives
NIS objectives
noncyber elements
OES
Regulation
Smart City
UK Critical National Infrastructure sectors
Standards organizations
security of data
Computer crime
Scalability
cyber security
Resiliency
pubcrawl
Metrics
Supply Chain
risk management
cyber-physical security
IoT
cyber attack
Security Risk Management
CA
CNI
CNI sectors
collaborative implementation approach
connected smart technology implementations
critical national infrastructure
cross-sector CNI service security measures
cyber risk management
biblio
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack
Submitted by aekwall on Mon, 02/17/2020 - 1:16pm
Smart Grid
smart grid technology
smart electric meter
remote monitoring
electric power companies
data collection Integrity
cyber-attack conditions
cyber attack
smart meter
power meters
Meters
Power demand
cyber physical systems
smart meters
cyberattack
power system security
Smart Grids
power engineering computing
smart grid security
smart power grids
Metrics
privacy
pubcrawl
Resiliency
cyber security
data integrity
Scalability
security of data
biblio
Towards a Security Cost Model for Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
cyber attack
actuator security
security incident
security costs
security cost model
resulting costs
providing security
physical world
onion layer model
flexible systems
engineering secure systems
Cost of security
CPS
actuators
security of data
sensors
Measurement
Mathematical model
Industry 4.0
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Task Analysis
security
Cloud Computing
biblio
Securing IS assets through hacker deterrence: A case study
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
wireless networks
internal threat deterrence
information systems security
hacker deterrence
external threat deterrence
external computer criminals
e-commerce organization
cyber attack
broken windows theory
Deterrence
electronic commerce
Computer crime
Computers
Information systems
resilience
Companies
Computer hacking
pubcrawl
Human behavior
Scalability
computer network security
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
Ransomware Injection
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
cyber attack
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
cyber physical systems
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
invasive software
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
« first
‹ previous
1
2
3
4
5
next ›
last »