Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
system architecture
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
metadata
valuable scientific data
Systems architecture
system architecture
Software Architecture
Software
scientific information systems
Scalability
Resiliency
resilience
pubcrawl
preservation metadata
PREMIS
object transformation
Metadata Discovery Problem
Chemicals
meta data
mapping rules
Grammar
format verification
format migration
e-science
digital signatures
digital signature
digital preservation
data intensive scientific discovery
data integrity
data fixity
data authenticity
Compositionality
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
system life cycle
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
functional-level security requirements
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
Software Architecture
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Safety
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
biblio
ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
pubcrawl
system architecture
subject matter experts
standards practices
simulation engine
security of data
security guidelines
Scalability
Resilience Metrics
resilience
R4 resilience framework
Qualitative Tool
qualitative simulation tool
Resilient Security Architectures
production engineering computing
Industrial Control Systems
industrial control
ICS-CRAT
cyber resilience metrics
cyber resilience assessment tool
cyber resilience
Critical Service Functionality
control engineering computing
Computer simulation
big data security metrics
Resiliency
biblio
Digital Ant Mechanism and Its Application in Network Security
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
mechanisms
tools
Task Analysis
system architecture
sensors
security
Resiliency
pubcrawl
particle swarm optimization
Network Security Architecture
network security
agents
distributed self-organization cyberspace defense paradigm
digital ants system
digital ants
digital ant technology
digital ant mechanism
decision-making
Decision Making
computer network security
Communication networks
biblio
System architecture for deep packet inspection in high-speed networks
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
PeerDirect
graphics processing units
Hardware
hardware tools
hardware-software solution
high-speed networks
Inspection
Mellanox
Napatech
Nvidia
graphics processing unit
pubcrawl
real-time data analysis
resilience
Resiliency
Scalability
software requirements
system architecture
Zero-copy
data communication
Central Processing Unit
computer architecture
computer network
computer network security
computing devices
CPU
CUDA
data analysis
bit rate 80.0 Gbit/s
data transmission networks
data volume real-time processing
deep packet inspection
DMA
DPDK
dpi
firewall
GPUDirect
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
Towards an Unified Security Testbed and Security Analytics Framework
Submitted by amyclay on Mon, 11/16/2015 - 6:04pm
Science of Security
log processing
monitoring architecture
NSA SoS Lablets Materials
Science of Security
system architecture
UIUC
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
file
Towards an Unified Security Testbed and Security Analytics Framework
Submitted by amyclay on Mon, 11/16/2015 - 6:04pm
Science of Security
log processing
monitoring architecture
system architecture
NSA SoS Lablets Materials
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
1
2
next ›
last »