Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security assessment
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 12:51pm
Metrics
Vulnerability
SIEM logs
security of data
Security Metrics
security assessment
security
Risk
pubcrawl
network flow
Network
Attack Circuit
IoT network security
IoT device security
Internet of Things
impact
graph theory
Exploitability
Computing Theory
attack graphs
attack graph
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
security assessment
Dynamic Networks and Security
test networks
semantic reasoning
Security Ontology
scalable security analysis
risk assessment experience
ontology- and graph-based approach
integrating semantic reasoning
Inference algorithms
security knowledge
attack graph
inference mechanisms
Semantics
cognition
security problems
security of data
ontologies (artificial intelligence)
cyber-attacks
risk management
Decision Making
tools
Metrics
Mobile handsets
graph theory
composability
pubcrawl
Resiliency
network security
security
Ontologies
enterprise networks
biblio
Model-based simulation and threat analysis of in-vehicle networks
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
intelligent navigation
automated controls
automobile industry
automotive systems
connectivity interfaces
Controller area network (CAN)
cyber-security risks
driving experience
in-vehicle features
in-vehicle networks
air pollution
model-based design
network simulation
operational errors
rapid pace
safety systems
SDN technologies
security assessment
software defined networking technologies
threat analysis
vehicular ad hoc networks
security of data
computer network security
Internet of Things
real-time systems
Time measurement
software defined networking
cyber-physical systems
Resiliency
pubcrawl
IoT
security threats
sensors
Threat Landscape
security risks
Atmospheric modeling
controller area network security
power control
network data
adequate testing
biblio
Multi-beam Physical Security Scheme: Security Assessment and Impact of Array Impairments on Security and Quality of Service
Submitted by grigby1 on Fri, 07/03/2020 - 3:55pm
radio transmitters
multilevel constellation
multiple-input multiple-output
perfect channel state information
Phase shift keying
power amplification
pubcrawl
quality of service
quasiconstant envelope signals
multibeam physical security scheme
Receivers
security assessment
signal components
Springs
telecommunication security
transmitting antennas
wireless channels
cyber physical systems
antenna arrays
array impairments
array power gain increments
array signal processing
channel level
component signal
Compositionality
CSI
amplification branch
decomposition
envelope variations
fact constrains
high order constellation signals
Metrics
MIMO communication
mMIMO
biblio
Security Evaluation Methodology for Software Defined Network Solutions
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
SDN architecture
software-defined networking
software defined networking
software defined network solutions
security-related features
security evaluation methodology
Security Evaluation
security controls
security assessment
SDN solutions
SDN security
SDN controllers
SDN choice
authentication
Scalability
Resiliency
resilience
pubcrawl
Organizations
Object recognition
NIST 800-53
Cryptography
control systems
computer networking
computer network security
comprehensive methodology
biblio
Early Hybrid Safety and Security Risk Assessment Based on Interdisciplinary Dependency Models
Submitted by grigby1 on Mon, 02/17/2020 - 4:07pm
security risks
risk analysis
risk management
Safety
safety assessment
security
security assessment
security design weaknesses
security risk assessment
Resiliency
security weaknesses
social reasons
Software
system complexity
system operation
tools
Unified modeling language
complex critical infrastructures
resilience
pubcrawl
policy-based governance
modeling
Model driven engineering
Metrics
interdisciplinary interactions
interdisciplinary dependency models
hybrid safety
Human behavior
fault trees
environmental reasons
economic reasons
Design Process
critical infrastructures
biblio
A Novel Security Assessment Method Based on Linear Regression for Logic Locking
Submitted by aekwall on Mon, 02/10/2020 - 10:42am
logic locking
security assessment
Resiliency
pubcrawl
probability
Predictive Metrics
multiple linear regression
Microelectronics Security
logic locking security assessment method
composability
linear regression
key-inputs modeling
Hardware Security
encrypted key-inputs
encrypted combinational benchmark circuits
encrypted circuit
distribution probabilities
Cryptography
biblio
Rapid Security Situation Prediction of Smart Grid Based on Markov Chain
Submitted by aekwall on Mon, 02/10/2020 - 10:42am
pubcrawl
system state prediction
system state distribution
state transition matrix
state probability distribution
smart power grids
smart power grid
smart grid stability
smart grid security
Situation Transition Probability Matrix
Situation Prediction
sequential Monte Carlo method
security assessment
Scalability
Resiliency
rapid security situation prediction
automation
probability
Predictive Metrics
power system stability
Monte Carlo methods
Microelectronics Security
Metrics
Matlab program
Markov state transition probability matrix
Markov processes
Markov Mode
Markov chain analysis method
Conferences
composability
component state transition probability matrix
component state prediction
biblio
An Expert System Based on Belief Rule to Assess Bank Surveillance Security
Submitted by grigby1 on Thu, 01/02/2020 - 1:46pm
pubcrawl
virtual life
surveillance security
security of data
security assessment
security
Scalability
RIMER approach
RIMER
Resiliency
resilience
real-time security data
real-life security system
bank data processing
knowledge base
inference mechanisms
Human behavior
generic belief rule based inference methodology
expert systems
evidential reasoning algorithm
BRB inference methodology
belief rule based expert system
belief rule base
bank surveillance security assessment
bank security assessment
banking security
biblio
Security Assessment of Brute-Force Attack to Subset Sum-Based Verifiable Secret Sharing Scheme
Submitted by grigby1 on Mon, 12/30/2019 - 1:17pm
Brute-force Attack
exponential regression
exponentiation
pubcrawl
Resiliency
Scalability
security assessment
Subset sum
verifiable secret sharing scheme
« first
‹ previous
1
2
3
4
next ›
last »