Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability assessment
biblio
Cyber-Physical Vulnerability Assessment of P2P Energy Exchanges in Active Distribution Networks
Submitted by grigby1 on Fri, 06/09/2023 - 12:49pm
Internet of Things
Peer-to-peer computing
pubcrawl
resilience
Resiliency
vulnerability assessment
simulation
CPS
power systems
Systems operation
Voltage
Cyber-Physical Resilience
active distribution networks
Adverse Users
Peer-to-Peer Energy Exchanges
Unbalanced Distribution Networks
biblio
Intelligent Penetration and Attack Simulation System Based on Attack Chain
Submitted by grigby1 on Fri, 04/28/2023 - 2:53pm
Task Analysis
penetration simulation system
security assessment
computational intelligence
Penetration Testing
Market research
visualization
vulnerability assessment
Compositionality
Cryptography
network security
Decision Making
composability
Databases
pubcrawl
Artificial Intelligence
security
Predictive models
biblio
Method for Vulnerability Analysis of Communication Link in Electric Cyber Physical System
Submitted by grigby1 on Fri, 02/03/2023 - 2:42pm
vulnerability assessment
single commodity flow
latin hypercube sampling (LHS)
Hypercubes
electric cyber physical system (ECPS)
power grid vulnerability analysis
Wind power generation
Electrical Engineering
power transmission lines
pubcrawl
Switches
composability
Analytical models
Generators
Resiliency
resilience
Metrics
biblio
Windows 10 Operating System: Vulnerability Assessment and Exploitation
Submitted by grigby1 on Fri, 12/23/2022 - 10:53am
security
pubcrawl
Metrics
Resiliency
Software
Instruments
Vulnerability
composability
operating systems
Penetration Testing
testing
vulnerability assessment
Windows Operating System Security
cyber-attack
System performance
Windows 10
biblio
Vulnerability Analysis of Wireless LAN Networks using ISSAF WLAN Security Assessment Methodology: A Case Study of Restaurant in East Jakarta
Submitted by grigby1 on Fri, 11/18/2022 - 1:49pm
Cryptography
evil twin attack
Security by Default
WLAN
Informatics
Penetration Testing
Wireless fidelity
vulnerability assessment
Firewalls (computing)
Servers
authentication
Scalability
security
Software
Resiliency
resilience
pubcrawl
biblio
Vulnerability Assessment and Attack Simulation of Power IoT Based on the Attractiveness of Equipment Assets
Submitted by grigby1 on Fri, 07/29/2022 - 8:02am
tools
pubcrawl
resilience
Resiliency
Conferences
Software
Hardware
Scalability
Metrics
information management
vulnerability assessment
automation
power systems
power IoT
attack simulation
power grid vulnerability analysis
biblio
Automated Security Assessment for the Internet of Things
Submitted by grigby1 on Thu, 02/24/2022 - 1:51pm
graphical security model
Internet of Things
machine learning
Manuals
Measurement
Metrics
natural language processing
Predictive models
predictive security metrics
pubcrawl
security
smart buildings
vulnerability assessment
biblio
SAIF: Automated Asset Identification for Security Verification at the Register Transfer Level
Submitted by aekwall on Tue, 02/22/2022 - 1:16pm
Measurement and Metrics Testing
vulnerability assessment
security verification.
Security Metrics
security assets
Solid modeling
Very large scale integration
Registers
Metrics
pubcrawl
Analytical models
Hardware
Measurement
Benchmark testing
biblio
Vulnerability Assessment for ICS system Based on Zero-day Attack Graph
Submitted by grigby1 on Wed, 07/28/2021 - 7:46am
Metrics
zero-day
vulnerability assessment
unknown vulnerability
Security Metrics
security metric
security
risk management
pubcrawl
attack graph
Measurement
integrated circuits
ICs
critical infrastructure
Computing Theory
Buildings
automation
biblio
Assessing Information Risks When Using Web Applications Using Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 1:04pm
pubcrawl
Web application vulnerability scanner
Web application
vulnerability assessment
security of data
security
risk analysis
Resiliency
resilience
Cyber Physical System
Metrics
internet
information risk concepts
information risk assessment
Information risk
Fuzzy logic
data protection discipline
1
2
3
4
5
next ›
last »