Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber vulnerability
biblio
Adding Cyberattacks To An Industry-Leading CAN Simulator
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
communication bus
controller area network security
cyberattacks
controller area networks
attack prevention systems
automotive cyber-security
automotive cybersecurity
CAN simulator
car
controller area network
conformance testing
cyber vulnerability
data usage
in-vehicle network
performance critical components
representative attack demonstrations
safety critical components
automobiles
Attack detection
Logic gates
safety-critical software
simulation
Intrusion Detection
testing
Roads
pubcrawl
Resiliency
cyber-physical systems
telecommunication security
Internet of Things
traffic engineering computing
security of data
Automotive engineering
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 12:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Reliability analysis of power grids with cyber vulnerability in SCADA system
Submitted by BrandonB on Fri, 05/01/2015 - 6:26am
power grids
system breaker trip
system breaker
supervisory control and data acquisition system
Substations
SCADA systems
SCADA system
RTS79
remote access point
reliability test system 79
Reliability
power system security
power system reliability
Bayes methods
power grid reliability analysis
power engineering computing
loss of load probability
LOLP
Generators
forced outage rate
FOR model
cyber-physical power systems
cyber vulnerability
cyber security
critical data eavesdropping
Bayesian attack graph model