Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious
biblio
Observations on the Theory of Digital Signatures and Cryptographic Hash Functions
Submitted by grigby1 on Thu, 06/29/2023 - 12:02pm
non-repudiation
pubcrawl
resilience
Resiliency
Scalability
authentication
Computers
Elliptic curve cryptography
Cryptographic Hash Function
digital signatures
digital signature
malicious
Forgery
integrity
Hash-based
Reliable
biblio
ASAF: Android Static Analysis Framework
Submitted by aekwall on Fri, 08/12/2022 - 4:10pm
static analysis
composabiity
datasets
ASParse
APK
parsing
pubcrawl
malicious
android
security
malware
Human behavior
Resiliency
feature extraction
Analytical models
operating systems
tools
biblio
APT attack response system through AM-HIDS
Submitted by aekwall on Mon, 12/20/2021 - 12:23pm
Companies
White List
Personnel
NIST
malicious
Anti
AM-HIDS
APT
advanced persistent threat
security
malware
Human behavior
Resiliency
Metrics
pubcrawl
Computer crime
Scalability
real-time systems
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
Ransomware Injection
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
cyber attack
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
cyber physical systems
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
invasive software
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
biblio
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository As a Malicious Service
Submitted by grigby1 on Tue, 09/26/2017 - 12:39pm
cloud
Human behavior
malicious
pubcrawl
Resiliency
Scalability
security
Security Audits
seo
threat mitigation
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling