Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security weaknesses
biblio
An Analysis and Classification of Vulnerabilities in Web-Based Application Development
Submitted by grigby1 on Mon, 04/18/2022 - 2:37pm
application security
Companies
Complexity theory
Human behavior
Phase measurement
policy-based governance
pubcrawl
resilience
Resiliency
security
security weaknesses
Task Analysis
taxonomy
vulnerability classification
Web Application Security
Web application vulnerability
biblio
Analysis System for Security Situation in Cyberspace Based on Knowledge Graph
Submitted by grigby1 on Mon, 04/18/2022 - 2:37pm
knowledge graph
Web pages
Systematics
Soft sensors
security weaknesses
Resiliency
resilience
pubcrawl
policy-based governance
Correlation
Knowledge engineering
intrusion detection system
internet
Human behavior
Cyberspace
cyber situation
cyber security
biblio
Cyber-Physical Security Assessment and Resilience of a Microgrid Testbed
Submitted by grigby1 on Mon, 04/18/2022 - 2:37pm
energy management systems
Human behavior
Industries
Inverters
Microgrids
Microgrid Testbed
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security
security weaknesses
biblio
Why Security Defects Go Unnoticed During Code Reviews? A Case-Control Study of the Chromium OS Project
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Chromium
code review
Computer bugs
Human behavior
Logistics
Open Source Software
policy-based governance
pubcrawl
quality assurance
resilience
Resiliency
security
security weaknesses
software engineering
Vulnerability
biblio
A Tree-Based Machine Learning Methodology to Automatically Classify Software Vulnerabilities
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Manuals
Software Vulnerability categorization
Software
security weaknesses
security
Resiliency
resilience
random forests
pubcrawl
policy-based governance
Conferences
machine learning
Human behavior
Hardware
gradient boosting
Forestry
Decision trees
Databases
Cyber-security
biblio
Predicting Entity Relations across Different Security Databases by Using Graph Attention Network
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Predictive models
Software
Semantics
security weaknesses
Security entity
Security database
Resiliency
resilience
pubcrawl
Conferences
policy-based governance
Measurement
knowledge graph
Knowledge engineering
Human behavior
Graph attention network
Entity relation prediction
Databases
biblio
A Survey on Security and Privacy Threats to Federated Learning
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
policy-based governance
security weaknesses
security threat
Resists
Resiliency
resilience
pubcrawl
Protocols
Privacy-preserving
privacy
Collaborative Work
poisoning attacks
inference attacks
IEEE standards
Human behavior
generative adversarial networks
GAN attacks.
federated learning
Computational modeling
biblio
Experimental Evaluation of Security Monitoring and Notification on Network Intrusion Detection System for Server Security
Submitted by grigby1 on Mon, 04/18/2022 - 2:35pm
Force
Human behavior
Network
network intrusion detection
policy-based governance
Protocols
Prototypes
pubcrawl
real-time systems
resilience
Resiliency
security
security weaknesses
Servers
server security
biblio
A Security Scoring Framework to Quantify Security in Cyber-Physical Systems
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
industrial cyber-physical systems
threat analysis
Security Scoring
security scalability
Security Rating
Security Metrics
security metric
pubcrawl
Metrics
security weaknesses
Data models
cyber-physical systems
critical infrastructure
connected vehicles
Conferences
automation
Adaptation models
biblio
Security Analysis of Smart Home Systems Applying Attack Graph
Submitted by aekwall on Mon, 01/10/2022 - 12:50pm
pubcrawl
visualization
tools
Software
Smart homes
smart Home Systems
security scalability
security
Resiliency
security weaknesses
privacy
Predictive Metrics
Market research
Layout
composability
building management system
Building automation system
attack graphs
1
2
3
4
5
next ›
last »