Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber incident
biblio
‘Releasing the Hounds?’1 Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations
Submitted by grigby1 on Fri, 03/17/2023 - 12:04pm
Ransomware
ransomware-as-a-service
offensive cyber operations
Cyber incident
profitability
Costs
user experience
law enforcement
cryptocurrency
pubcrawl
Cybercrime
composability
Industries
Ecosystems
Resiliency
resilience
Metrics
biblio
Potential cyber-attacks against global oil supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Information Flow
threats to energy sector
Temperature sensors
supply chains
supply chain management
security of data
risk management
ripple effect
pubcrawl170112
petroleum industry
organization
organisational aspects
oil supply chain
information management
Companies
globalisation
global supply chain
global oil supply chain
global market
financial losses
Energy Sector
damaging effect
cyber-attacks countermeasures
cyber-attacks
cyber-attack
cyber risk assessment
Cyber incident
Computer hacking
biblio
Comparative analysis of Governmental Countermeasures to cyber attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
ISAO
US government
United States
strengthening national cyber security posture initiative
South Korea
Sony
security of data
sanctions EO
retaliatory action
pubcrawl170109
presidential secretary
North Korea
ministry of industry
Law
KHNP
Comparative Analysis
Interviews
internet
information sharing EO
Inductors
governmental countermeasures
Government
cyber-attacks
cyber security response capability
Cyber incident
Cyber Attacks
CTIIC
control tower
Computer hacking
Computer crime
biblio
Current issues and challenges on cyber security for industrial automation and control systems
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
control systems
Cyber incident
cyber security
cyber threat
IACS
IEC standards
industrial automation and control systems
industrial control
malware
production engineering computing
Protocols
security
security of data
Vulnerability