Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information resources
biblio
Simulation of Protected Industrial Control Systems Based on Reference Security Model using Weighted Oriented Graphs
Submitted by grigby1 on Fri, 07/24/2020 - 12:01pm
Mathematical model
weighted oriented graphs
system protection analysis
Software
Servers
security of data
security
reference security models
reference security model
pubcrawl
production engineering computing
open systems
modeling of protected systems
automated systems
integrated circuits
Information services
information resources
Industrial Control Systems
industrial control
graph theory
Data protection
Cyber Attacks
critical infrastructures
critical infrastructure facilities
Control Theory
control engineering computing
biblio
Architecture of the Honeypot System for Studying Targeted Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 3:38pm
Organizations
Task Analysis
targeted attacks
target attacks
Servers
security of data
Scalability
Resiliency
resilience
public domain software
pubcrawl
organized criminal groups
computer architecture
malware
Information systems
information security systems
information resources
Human Factors
Human behavior
honeypot system
honey pots
financial organizations
computer information
Computer crime
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 11:38am
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies
« first
‹ previous
1
2