Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat mitigation
biblio
Recovery-based Model Predictive Control for Cascade Mitigation under Cyber-Physical Attacks
Submitted by aekwall on Mon, 11/08/2021 - 2:16pm
System recovery
cascading failure mitigation
Cyber-physical attack
Human behavior
Metrics
model predictive control
pubcrawl
Resiliency
threat mitigation
biblio
Threat Analysis of an Autonomous Vehicle Architecture
Submitted by aekwall on Mon, 11/08/2021 - 2:16pm
Autonomous Driving
threat mitigation
Security analysis
functional architecture
Electric potential
E/E architecture
cyber security
CVSS
autonomous vehicles
security
STRIDE
faces
Industries
Human behavior
Resiliency
Metrics
pubcrawl
biblio
Identification and Mitigation Tool For Cross-Site Request Forgery (CSRF)
Submitted by aekwall on Mon, 11/08/2021 - 2:16pm
information security
Organizations
tools
Conferences
pubcrawl
Metrics
Resiliency
Human behavior
Forgery
Cross-Site Request Forgery (CSRF)
vulnerability identification
Vulnerability Mitigation Introduction
Web application
threat mitigation
biblio
Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process
Submitted by aekwall on Mon, 11/08/2021 - 2:15pm
Task Analysis
visualization
tools
Analytical models
pubcrawl
Metrics
Resiliency
Human behavior
computer security
cyber security
Data visualization
visual analytics
threat intelligence
threat mitigation
biblio
A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems
Submitted by aekwall on Mon, 11/08/2021 - 2:15pm
Adversarial Machine Learning
threat mitigation
software quality
Security Requirements Engineering
Requirements Elicitation Using Threat Modeling
Reliability engineering
Model Inference and Perturbation and Evasion Attacks
Attack Libraries
STRIDE
security
Systematics
Human behavior
Resiliency
Metrics
pubcrawl
software reliability
Perturbation methods
Libraries
biblio
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
Submitted by aekwall on Mon, 11/08/2021 - 2:15pm
Botnet Attacks
threat mitigation
VAST
Threats Mitigation
Threats Identification
threat modelling
system analysis and design
STRIDE
Smart Home
Object recognition
security
botnet
denial-of-service attack
Smart homes
Human behavior
Resiliency
Metrics
pubcrawl
Analytical models
biblio
A Call-to-Action Campaign to Raise Awareness of Supply Chain Threats and Mitigation
Submitted by willirn1 on Fri, 10/22/2021 - 12:16pm
Press Release
Supply Chain
threat mitigation
biblio
Distributed Denial of Service Attack Mitigation Using High Availability Proxy and Network Load Balancing
Submitted by grigby1 on Tue, 09/07/2021 - 2:23pm
denial-of-service attack
Web servers
Time measurement
resilience
quality of service
pubcrawl
Load management
Linux
Internet security
internet
HAProxy
threat mitigation
ddos mitigation
DDOS attacks detection
DDoS attack mitigation
DDoS
Cybersecurity
composability
Human behavior
Metrics
Resiliency
biblio
DDoS Mitigation: A Measurement-Based Approach
Submitted by grigby1 on Tue, 09/07/2021 - 2:21pm
threat mitigation
Resiliency
Metrics
Human behavior
attacks
composability
DDoS
DDoS attack mitigation
DDOS attacks detection
Denial-of-Service
internet measurement
mitigation
pubcrawl
resilience
biblio
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
Submitted by grigby1 on Thu, 03/04/2021 - 1:56pm
proactive defense operations
defense
defense perspectives
increases security awareness
invasive software
knowledge-sharing platform
legacy security defense mechanisms
malware campaigns
open-source permissioned blockchain platform
Peer-to-peer computing
potential attacks
proactive defense
cyber-attacks
pubcrawl
resilience
SDN
SDN networks
secure distributed model
software defined networking
sophisticated threats
tamper-proof record-keeping
Zero day attacks
zero-day
Collaborative DDoS Mitigation
Resiliency
Metrics
Human behavior
blacklisting
blockchain
blockchain application
blockchain technology
collaboration
collaborative cyber attack defense
collaborative DDoS attack mitigation
threat mitigation
Collaborative Defense
composability
Computer crime
computer network management
computer network security
contracts
Cryptography
cyber threat intelligence
cyber threat intelligence plays
cyber threat intelligence sharing
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »