Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEC standards
biblio
How formal analysis and verification add security to blockchain-based systems
Submitted by grigby1 on Thu, 08/23/2018 - 10:37am
ISO standards
tools
security of data
security layers
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
process transactions
blockchain
integrated technology
IEC standards
formal verification
formal method
formal analysis
domain specific language
Cryptography
contracts
blockchain-based system security
blockchain security
biblio
A live static code analysis architecture for PLC software
Submitted by grigby1 on Thu, 06/07/2018 - 2:12pm
programmable controllers
tools
timing
static code analysis
static analysis
software engineering
Software
Resiliency
resilience
regular compiler
pubcrawl
composability
program diagnostics
PLC software
live static code analysis architecture
IEC standards
IEC 61131-3
Human behavior
development process
debugging
control engineering computing
computer architecture
biblio
Digital Forensic Readiness Framework Based on Behavioral-Biometrics for User Attribution
Submitted by grigby1 on Mon, 03/05/2018 - 12:03pm
Human behavior
user attribution
Scalability
pubcrawl
policy-based governance
Organizations
ISO/IEC 27043 standard
IEC standards
Human Factors
attribute-based encryption
Digital forensics Readiness
Digital Forensics
digital forensic readiness framework
collaboration
biometrics (access control)
Behavioral biometrics
authentication
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
A microgrid ontology for the analysis of cyber-physical security
Submitted by K_Hooper on Wed, 02/14/2018 - 11:00am
cyber-physical systems
IEC 61850-7-420 DER extension
IEC 61850
Human behavior
fault state
Energy storage
electrical system
electrical substation automation
distributed power generation
distributed generation
distributed energy resource
DER unit controllers
DER-associated devices
IEC 61850 protocol suite
cyber-physical security evaluation
cyber-physical security
control loop
controllable loads
control directives
common information model
common data classes
capacity limits
asset-specific attributes
artificial intelligence security
ADVISE framework
pubcrawl
threat model
substation design
substation configuration
substation automation
ADversary View Security Evaluation framework
state-of-charge
adversary objectives
61850-7-420 DER object classes
Scalability
Resiliency
rated capacity
ramp rate
utility grid
power system security
Power system protection
power system applications
power engineering computing
ontologies (artificial intelligence)
object models
Microgrids
microgrid ontology
Metrics
message classes
IEC standards
biblio
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO}/IEC 27037:2012
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
DTF methodologies
Window malware forensic toolkit
pubcrawl170109
operating systems (computers)
malware forensics
malware
ISO/IEC 27037:2012
ISO/IEC 27037
ISO standards
invasive software
internet
IEC standards
Hacker
Computer crime
digital triage forensics framework
digital triage forensics
Digital Forensics
digital forensic
digital evidence handling
data leakage
Cybercrime
cyber security incident
critical analysis
crime scene investigation
Computers
biblio
Software tool for verification of sampled values transmitted via IEC 61850-9-2 protocol
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
power engineering computing
system buses
Substations
substation protection
substation
software tool
software protection system
sampled values
Protocols
process bus
Current measurement
merging
Local area networks
IEC standards
IEC 61850-9-2 protocol
GOOSE messages
Ethernet
Decoding
Data visualization
biblio
Detection of cyber intrusions using network-based multicast messages for substation automation
Submitted by BrandonB on Wed, 05/06/2015 - 12:59pm
sampled value
network security
network-based cyber intrusion detection system
network-based multicast messages
NIDS
packet modification
power engineering computing
predefined security rules
replay
misclassified abnormal packets
SaS
security of data
simultaneous cyber attacks
specification-based algorithm
substation automation
substation automation systems
SV
GOOSE
computer security
cyber security of substations
cyber security testbed
denial-of-service attacks
Educational institutions
false negative ratio
FNR
generic object-oriented substation event
Anomaly Detection
GOOSE and SV
IEC 61850
IEC standards
IEEE 39-bus system model
Intrusion Detection
intrusion detection system
low-fault negative rate
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
biblio
Current issues and challenges on cyber security for industrial automation and control systems
Submitted by BrandonB on Tue, 05/05/2015 - 8:35am
control systems
Cyber incident
cyber security
cyber threat
IACS
IEC standards
industrial automation and control systems
industrial control
malware
production engineering computing
Protocols
security
security of data
Vulnerability
« first
‹ previous
1
2
3
4
5
next ›
last »