Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack patterns
biblio
Demystifying the Cyber Attribution: An Exploratory Study
Submitted by aekwall on Thu, 05/13/2021 - 10:50am
machine learning algorithms
Human behavior
pubcrawl
composability
Metrics
tools
metadata
machine learning
data analysis
attribution
Cyber Attacks
Information systems
face recognition
Regulation
attack patterns
Cyber attributtions
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 9:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
internet
vulnerable SOHO router detection
vulnerabilities
telecommunication network routing
SOHO routers
Servers
pubcrawl170109
Object recognition
man-in-the-middle attacks
IP networks
Internet of Vulnerable Things
Internet of Things
ASN space
information security
Indian autonomous system number space
domain name space settings
DNS settings
DNS information extraction
DNS Changer
Data mining
consumer grade small scale routers
computer network security
Computer crime
attack patterns
biblio
Security Testing Based on Attack Patterns
Submitted by BrandonB on Tue, 05/05/2015 - 9:48am
security
Unified modeling language
UML state machine
UML state charts
testing
SQL injection
software prototyping
Software
security testing
security of data
Adaptation models
program testing
model-based testing
internet
HTML
Databases
cross-site scripting
attack patterns
attack pattern
agile software development processes