Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability assessment
biblio
Vulnerability assessment and detection of Deepfake videos
Submitted by grigby1 on Fri, 01/15/2021 - 12:12pm
vulnerability assessment
VidTIMIT database
VGG
pre-trained generative adversarial network
Open Source Software
Facenet neural networks
face recognition systems
deepfake video detection
DeepFake
video signal processing
gan
vulnerability detection
learning (artificial intelligence)
face recognition
Metrics
public domain software
neural nets
Scalability
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
vulnerability assessment
command injection attacks
supervisory control and data acquisition (SCADA)
structuredquery language injection attacks
intrusion detection solutions
Industrial Internet of Things (IIoT)
Industrial Internet of Things
IIoT systems
cyber-vulnerability assessment
cyber attack
electromagnetic interference
Big Data Analytics
IDS
SQL
machine learning (ML)
cyber-attacks
Internet of Things
Metrics
Structured Query Language
Protocols
network security
composability
production engineering computing
Intrusion Detection
intrusion detection system
Resiliency
resilience
pubcrawl
data analysis
machine learning
security of data
learning (artificial intelligence)
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
feature extraction
Web application vulnerability assessment
vulnerability assessment
security of data
Resiliency
pubcrawl
machine learning algorithms
machine learning
logical Web pages
learning (artificial intelligence)
internet
hybrid model
Bayes methods
Entropy
Decision trees
Decision Tree
consumer relationship
composability
Classification algorithms
business process
business data processing
belief networks
Bayesian Belief Network (BBN)
Bayesian belief network
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
A Vulnerability Assessment Method of Cyber Physical Power System Considering Power-Grid Infrastructures Failure
Submitted by grigby1 on Fri, 04/24/2020 - 4:37pm
failure analysis
Power Grid Vulnerability Assessment
vulnerability assessment method
vulnerability assessment
single component function failure
power-grid infrastructures failure
power system reliability
power system faults
Power Grid Network
power components
multiple components synchronization function failure
local CPPS model
information components
functional characteristics
full probability evaluation formula
cyber-physical systems
cyber-physical power system
cyber physical power system
CPPS operation
cooperative attack
communication components
Bayesian network
probability
Metrics
power grids
composability
security
Resiliency
resilience
pubcrawl
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
Assessment of SCADA System Vulnerabilities
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
operating systems (computers)
vulnerability assessment
SCADA vulnerabilities
SCADA system vulnerabilities
SCADA critical vulnerabilities
SCADA attacks
publicly available vulnerabilities
NVD
national vulnerability database
legacy operating systems
domain-specific vulnerability scoring system
actuators
Compositionality
security of data
SCADA Systems Security
cyber-attacks
Databases
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
Software
security
Hardware
Monitoring
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 5:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
biblio
Network Theory Based Power Grid Criticality Assessment
Submitted by grigby1 on Tue, 11/19/2019 - 3:42pm
network theory
vulnerability assessment
Transmission line measurements
standard IEEE test cases
Resiliency
resilience
pubcrawl
power transmission lines
power grids
power grid vulnerability analysis
power grid vulnerability
power grid criticality assessment
power grid control center
power grid connectivity monitoring
network theory (graphs)
Australia
network flow problem
network flow
Metrics
maximum flow problem
linear programming problem
linear programming duality
Linear programming
Generators
flow network
energy management systems
Energy Management System
critical transmission lines identification
composability
blackout
« first
‹ previous
1
2
3
4
5
next ›
last »