Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Stuxnet
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
Ransomware Injection
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
cyber attack
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
cyber physical systems
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
invasive software
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
biblio
Sensor Security Index for Control Systems
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
multiple sensors
system vulnerability
system destruction
Stuxnet
Steady-state
sensors
sensor security index
sensor bias injection attacks
sensor attacks
Sensor attack
security of data
security
Resiliency
resilience
pubcrawl
north eastern electrical grid black out
actuator security
Metrics
malicious attacks
Linear systems
linear dynamic systems
linear control systems
Indexes
Human behavior
Gold
Detectors
Cyber-physical attack
Control systems attack
composability
anomaly detector
actuators
biblio
BIOS integrity an advanced persistent threat
Submitted by BrandonB on Wed, 05/06/2015 - 12:56pm
information security spectrum
Vectors
Trusted Computing
Stuxnet
Servers
security
Roots of Trust (RoTs)
Roots of Trust
Original Equipment Manufacturer (OEM)
Organizations
Iranian Nuclear Power Plant
advanced persistent threat
Hardware
firmware
data integrity
computer network security
BIOS Integrity Measurement
BIOS integrity
Biological system modeling
basic input output system
Advanced Persistent Threat (APT)
biblio
Challenges pertaining to cyber war under international law
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
Force
Tallinn Manual
Stuxnet
state-level cyber intrusion
security of data
Manuals
legal position
Law
international law
challenges
Estonia
cyberspace state-level intrusion
cyberspace intrusion
cyberspace governance
Cyberspace
cyber war
Computer crime
biblio
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust
Submitted by BrandonB on Thu, 04/30/2015 - 12:35pm
information flow security
Trusted Computing
trust state manipulation
Stuxnet attacks
Stuxnet
Software
security of data
security models
security
nondeducibility
multiple security domains nondeducibility
MSDND
Monitoring
modal model
modal frames
Analytical models
information flow disruption attacks
implicit trust
human operators
event system analysis
electronic monitors
doxastic logic
cyber-physical systems
cyber security
Cyber Physical System
CPS
Cost accounting
cognition
Bismuth
belief manipulation