Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat mitigation
biblio
Vulnerabilities and Security Threats for IoT in Transportation and Fleet Management
Submitted by grigby1 on Fri, 05/20/2022 - 3:46pm
Internet of Things
security
pubcrawl
Human behavior
resilience
Resiliency
privacy
Metrics
Intelligent Transportation Systems
Transportation
Automobiles Tracker
Fleet Management
GPS/GPRS
real-time
security threats
threat mitigation
biblio
Performance evaluation method of cyber attack behaviour forecasting based on mitigation
Submitted by grigby1 on Fri, 05/20/2022 - 3:46pm
Metrics
threat mitigation
TTPs
True Positive
cyber-attack behavior
MITRE ATT&ck
Accuracy
cyberattack
forecasting
pubcrawl
convergence
estimation
information and communication technology
performance evaluation
Software
Resiliency
resilience
Human behavior
biblio
Towards a Threat Model and Security Analysis of Video Conferencing Systems
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
privacy
threat mitigation
Video Conferencing
social factors
Pandemic
threat model
Metrics
real-time systems
Streaming media
tools
Analytical models
Resiliency
resilience
Human behavior
pubcrawl
cyber security
security
biblio
Using Counterfactual Regret Minimization and Monte Carlo Tree Search for Cybersecurity Threats
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
Nash Equilibrium
threat mitigation
MCTS
incomplete information games
extensive form games
counterfactual regret minimization
CFR
Sea measurements
codes
Minimization
Computer hacking
Monte Carlo methods
Metrics
Games
Resiliency
resilience
Human behavior
pubcrawl
Predictive models
biblio
Threat detection and mitigation with MonB5G components in the aLTEr scenario
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Metrics
automation
threat mitigation
biblio
A Localized Cyber Threat Mitigation Approach For Wide Area Control of FACTS
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
timing
threat mitigation
wide area control systems
modal analysis
inter-area oscillations
Flexible AC Transmission Systems (FACTS)
flexible AC transmission systems
damping
cyber threat mitigation
pubcrawl
Oscillators
Metrics
Smart Grids
control systems
Conferences
Resiliency
resilience
Human behavior
biblio
Automated Threat Analysis and Management in a Continuous Integration Pipeline
Submitted by grigby1 on Fri, 05/20/2022 - 3:44pm
Metrics
threat mitigation
Threat Modeling
threat management
threat analysis
codes
security by design
automation
Pipelines
security
privacy by design
privacy
Analytical models
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Cyber Threat Mitigation Approach For Wide Area Control of SVCs using Stability Monitoring
Submitted by grigby1 on Fri, 05/20/2022 - 3:44pm
cyber threat mitigation
threat mitigation
wide area control systems
Thermal stability
modal analysis
inter-area oscillations
Flexible AC Transmission Systems (FACTS)
flexible AC transmission systems
damping
Monitoring
Stability analysis
timing
Metrics
control systems
Resiliency
resilience
Human behavior
pubcrawl
biblio
Sybil Attack Simulation and Mitigation in UnetStack
Submitted by grigby1 on Wed, 03/23/2022 - 11:33am
Resiliency
Water pollution
UnetStack
Underwater acoustic sensor network(UASN)
sybil attacks
Sybil attack
security
Sea measurements
Routing
threat mitigation
resilience
pubcrawl
Protocols
Prediction algorithms
Oceans
Mitigation strategy
Metrics
composability
biblio
A Taxonomy of Insider Threat in Isolated (Air-Gapped) Computer Networks
Submitted by grigby1 on Mon, 12/20/2021 - 1:17pm
insider threat
taxonomy
social sciences
security
Resiliency
resilience
research and development
pubcrawl
Metrics
threat mitigation
Human behavior
Focusing
cyber security
computer networks
Computer crime
composability
air-gapped
Air gaps
1
2
3
4
5
6
7
next ›
last »