Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security measures
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
Phishing
virtual experiences
unsolicited e-mail
threats
threat mitigation
threat
security measures
security defense mechanisms
risk mitigation
Resiliency
resilience
pubcrawl
Attack vectors
Metrics
mass email infrastructures
machine learning
Human Factors
Human behavior
fraudulent content
fraud
email attacks
electronic mail service
Computer crime
biblio
Challenges of the Existing Security Measures Deployed in the Smart Grid Framework
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
Smart Grid
smart meter
smart grid framework
intelligent energy utility
energy requirement
AMI
power grid system
Meters
smart cities
security measures
ICs
smart meters
Smart Grids
security of data
smart grid security
smart power grids
Metrics
privacy
pubcrawl
Resiliency
SCADA
smart devices
security
Servers
Scalability
Monitoring
biblio
Security Metrics: Principles and Security Assessment Methods
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
security assessment
Taxonomy of Security Metric
taxonomy
Standards organizations
security standards
security sections
security of data
Security Metrics
security metric
security measures
security conditions
security assessments
security assessment methods
Measurement
pubcrawl
Organizations
organizational security
Metrics
metric standards
Meta-Metric
information technology
information security
business data processing
benchmarking method
Benchmark testing
metrics testing
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
security management
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
Industrial Control Systems
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
Databases
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
control systems
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
biblio
Node energy based virus propagation model for bluetooth
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
mobile computing
Viruses (medical)
Virus Propagation
smart-phone Era
smart phones
security measures
Resiliency
resilience
pubcrawl
optimal control
Node energy based virus propagation model
Node Energy Based Virus Propagation
node capacity
network traffic
NBV model works
composability
Mobile communication
mobile based Wireless technologies
human factor
Human behavior
Grippers
Electronic mail
E-mail worm Propagation model
computer viruses
computer network security
Computational modeling
Bluetooth
Bluetooth network
bluetooth security
biblio
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
Phishing
zero-day semantic social engineering attack detection
Zero day attacks
user deception threat
threat detection
technical security countermeasures
Spear-phishing
social engineering
Semantics
semantic social engineering attacks
semantic attacks
security measures
security
Reliability
pubcrawl
Predictive models
application spoofing
multimedia masquerading
machine learning
learning (artificial intelligence)
information security scenarios
Human-as-a-Sensor
human-as-a-security-sensor paradigm
Human Factors
Human behavior
feature extraction
Electronic mail
defense
cyber security
Computer crime
Browsers
biblio
Vulnerabilities in two-area Automatic Generation Control systems under cyberattack
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
Power Grid
two-area automatic generation control systems
security of data
security measures
security
Resiliency
pubcrawl
power system stability
power system control
power grids
power grid vulnerability analysis
AGC system
Metrics
Mathematical model
Generators
Gain control
cyberattack
cyber criminals
control engineering computing
composability
automatic generation control
biblio
Detecting and thwarting hardware trojan attacks in cyber-physical systems
Submitted by grigby1 on Mon, 11/13/2017 - 12:00pm
thwarting hardware trojan attacks
Resiliency
security
security measures
smart grid application
Software component
software security
software-only attack
supervisory module
third-party soft IP cores
Reliability
Trojan horses
trust
trust enhancements
trust metric
trust specifications
Trusted Computing
trusted platform modules
verification
Hardware
composability
counter-measure
cyber-physical system integrity
cyber-physical systems
design
Diagnostics
Embedded System
field programmable gate arrays
attack vector models
hardware component
hardware security platform
hardware-only attack
invasive software
IP networks
isolated security primitives
Measurement
pubcrawl
biblio
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
object-centric coding mechanism
track-and-trace
taxonomy
system architecture framework
supply chains
supply chain management
Supply Chain
security measures
security
RFID-enabled product supply chain visibility
radiofrequency identification
pubcrawl170112
production engineering computing
anti-counterfeiting
object-based event “pedigree”
object event visibility
event pedigree
event exception detection
EPC-based events
Engines
e-pedigree
dynamically updated e-pedigree
Databases
counterfeiting activities
counterfeiting
anticounterfeiting
biblio
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Data models
empirical study
HTML
input validation and sanitization
program analysis
security
security measures
Semisupervised learning
Servers
Software
Training
Vulnerability prediction
« first
‹ previous
1
2