Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attack
biblio
Load Redistribution Attacks in Multi-Terminal DC Grids
Submitted by grigby1 on Thu, 05/11/2023 - 3:48pm
False Data Injection
voltage-sourced converter
multi-terminal dc grid
Systems operation
Lead
Resiliency
command injection attacks
cyber-physical system
cyber-attack
Voltage control
Cyber-security
cyberattack
power grids
Vulnerability Analysis
Reliability
composability
optimization
resilience
Metrics
pubcrawl
biblio
Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems
Submitted by grigby1 on Fri, 02/17/2023 - 4:13pm
Production
risk assessment
automated manufacturing systems
SCADA Systems Security
Hazards
cyber-attack
SCADA
Compositionality
real-time systems
risk management
Industrial Control Systems
SCADA systems
process control
integrated circuits
Resiliency
resilience
pubcrawl
biblio
Windows 10 Operating System: Vulnerability Assessment and Exploitation
Submitted by grigby1 on Fri, 12/23/2022 - 10:53am
security
pubcrawl
Metrics
Resiliency
Software
Instruments
Vulnerability
composability
operating systems
Penetration Testing
testing
vulnerability assessment
Windows Operating System Security
cyber-attack
System performance
Windows 10
biblio
Convergence of Cloud and Fog Computing for Security Enhancement
Submitted by grigby1 on Fri, 09/16/2022 - 3:37pm
Fog computing
Security monitoring framework
cloud server
virtual machine
Costs
Resiliency
computing resources
cyber-attack
Virtual machining
encryption
edge computing
Scalability
resilience
pubcrawl
Servers
Monitoring
security
Cloud Computing
biblio
Implementation of Cyber-Physical Systems with Modbus Communication for Security Studies
Submitted by grigby1 on Wed, 07/13/2022 - 12:16pm
process control
software packages
security
Scalability
SCADA
Resiliency
resilience
real-time systems
pubcrawl
Protocols
Programmable logic devices
collaboration
policy governance
OpenPLC
Modbus protocol
Metrics
MATLAB/Simulink
Human behavior
cybersecurity education
cyber-physical systems
cyber-attack
composability
biblio
Organizational Security Policy and Management during Covid-19
Submitted by grigby1 on Mon, 04/18/2022 - 9:51am
business continuity
computer security
COVID-19
cyber-attack
Cybersecurity
information technology
Organizations
Pandemics
Policy
policy-based governance
pubcrawl
security policies
biblio
Complex Strategy against Supply Chain Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 11:35am
pubcrawl
zero trust
Zero day attacks
supply chains
Supply Chain
Software measurement
Software
security operation centre
Resiliency
resilience
army
Organizations
Metrics
History
defense
cyber-attack
Computer crime
composability
Communication Systems
communication and information systems protection
biblio
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-Based Smart Grid
Submitted by grigby1 on Thu, 12/02/2021 - 2:20pm
Phasor measurement units
Systems operation
Smart Grid Sensors
Smart Grid
security
resource management
Resiliency
resilience
pubcrawl
PMU
Compositionality
Observability
Measurement units
injection attack
iiot
Human Factors
Human behavior
data-integrity
data integrity
cyber-attack
biblio
CP-SAM: Cyber-Physical Security Assessment Metric for Monitoring Microgrid Resiliency
Submitted by grigby1 on Thu, 09/16/2021 - 10:50am
cyber-attack
cyber-physical security
cyber-physical systems
Decision Making
Generators
graph theory
Measurement
microgrid
Microgrids
Monitoring
pubcrawl
Redundancy
resilience
Resiliency
security
biblio
Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases
Submitted by grigby1 on Tue, 08/31/2021 - 10:06am
pubcrawl
TDE
Software
Servers
resource management
Resiliency
resilience
relational database security
Random access memory
composability
Metrics
metadata
Human behavior
encryption
DBA
Databases
cyber-attack
Cons of Encryption
1
2
3
4
next ›
last »