Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber threats
biblio
A Review on The Concerns of Security Audit Using Machine Learning Techniques
Submitted by grigby1 on Fri, 01/13/2023 - 1:46pm
control systems
IT
Propulsion
Security Audits
Productivity
cyber threats
Costs
cyber-attacks
Resistance
pubcrawl
security audit
Information systems
Scalability
Hardware
Software
Resiliency
resilience
Human behavior
biblio
Named Data Networking's Intrinsic Cyber-Resilience for Vehicular CPS
Submitted by grigby1 on Wed, 04/20/2022 - 11:28am
actuators
computer architecture
CPS resilience
cps resiliency
cyber-physical systems
cyber threats
ITS
NDN
pubcrawl
resilience
Resiliency
Roads
security
sensors
vehicular CPS
biblio
An Integrated Web-Based Approach for Security Enhancement by Identification and Prevention of Scam Websites
Submitted by grigby1 on Mon, 12/20/2021 - 11:28am
cyber threats
Virus Total
security
Scam Website Analyser
Safe Browser
Resiliency
resilience
pubcrawl
Portals
Databases
API
cyber-crime
cyber-attacks
Compositionality
composability
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
biblio
Threats to Pharmaceutical Supply Chains
Submitted by willirn1 on Tue, 10/26/2021 - 6:48pm
C3E
cyber threats
malware
Pharmaceuticals
Ransomeware
supply chains
vaccine
biblio
NCSC SCRM Best Practices
Submitted by willirn1 on Tue, 10/26/2021 - 4:14pm
NCSC
SCRM
supply chains
Supply chain exploitation
cyber threats
malicious activity
economic espionage
structural integrity
critical infrastructure
R&D
biblio
Manufacturing and Production Sector
Submitted by willirn1 on Tue, 10/26/2021 - 4:09pm
manufacturing
Production
cyber threats
supply chains
C3E
physical threats
malicious human action
ransomware attacks
software supply chain
Industrial Control Systems
networks
biblio
Defending Against Software Supply Chain Attacks
Submitted by willirn1 on Fri, 10/22/2021 - 12:00pm
Supply Chain Attacks
cyber threats
software vendors
compromise resilience
biblio
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
risk management
miniature ICS
proactive security response
probabilistic multiattribute vulnerability criticality analysis model
production engineering computing
pubcrawl
quantitative evaluation
quantitative security metrics
resilience
Resiliency
Metrics
Scalability
Security Criticality Analysis
Security Impact Analysis
security of data
security risk assessment scheme
Vulnerability Analysis
vulnerability host components
vulnerability severities
vulnerability-based impact criticality estimation
Functional Dependency
Compositionality
control engineering computing
control uncertainties
Cyber Dependencies
cyber environments
cyber security risks
cyber threats
Cybersecurity
distributed system
attack probabilities
Human Factors
ICS networks
ICS security
impact estimation
industrial control
Industrial Control System (ICS)
Industrial Control Systems
MAVCA model
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
Modeling and Analysis Cyber Threats in Power Systems Using Architecture Analysis Design Language (AADL)
Submitted by aekwall on Mon, 11/16/2020 - 2:58pm
Power Grid
Resilient Security Architectures
switching attack
Power systems security
power system information models
Model-based analysis
FDI attack
false data injection attacks
cyber-physical modeling capabilities
cyber-physical model
cyber-grid components
Architecture Analysis & Design Language
AADL
specification languages
security of data
verification techniques
cyber threats
power systems
program verification
power grids
power system security
power engineering computing
Software Architecture
cyber-physical security
pubcrawl
Resiliency
cyber-physical systems
1
2
3
4
next ›
last »