Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-attack
biblio
Cyber Security Knowledge Graph Based Cyber Attack Attribution Framework for Space-ground Integration Information Network
Submitted by aekwall on Mon, 03/04/2019 - 9:45am
internet
attribution
space-ground integration information network
pattern matching
network attacks
cyber security knowledge graph
cyber attack attribution
Correlation
computer security
tools
security of data
Metrics
graph theory
composability
pubcrawl
Human behavior
cyber-attack
Ontologies
human-in-the-loop security center paradigm
biblio
An overview of cyber-attack vectors on SCADA systems
Submitted by aekwall on Wed, 02/13/2019 - 11:00am
pubcrawl
transport protocols
TCP/IP based protocols
supervisory control and data acquisition systems
Software
security of data
security
Scalability
SCADA systems
SCADA
Resiliency
Attack vectors
Protocols
Monitoring
Industrial Control Systems
Human behavior
cyber-attack vectors
cyber-attack
critical infrastructures
critical infrastructure
Buffer overflows
biblio
Vulnerability analysis of power systems based on cyber-attack and defense models
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
Power system protection
Vulnerability Analysis
system operators
Substations
Smart Grid
security of data
Scalability
SCADA
RTUs
Resiliency
resilience
pubcrawl
power transmission lines
power systems
power system security
Adversary Models
power system faults
power engineering computing
Monitoring
Metrics
Load modeling
Human behavior
game-theoretic approach
game theory
defense models
defender modeling
cyber-attack
Cascading Failures
blackouts
Attacker Modeling
biblio
Diagnostics and Assessment of the Industrial Network Security Expert System
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
LPτ-sequence
Vulnerability
Software
security
Scalability
Resiliency
resilience
pubcrawl
nodal points
network security
Monte Carlo numerical method
Monte Carlo methods
Mathematical model
Markov processes
markov chain
manufacturing
Algorithm design and analysis
information security
Industrial Safety
industrial network virtual model
industrial network security expert system
Industrial engineering
Human behavior
expert systems
expert assessment
diagnostic system
diagnostic assessment
cyber-attacks sets
cyber-attacks classification
cyber-attack
computer network security
classification
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by grigby1 on Mon, 03/26/2018 - 11:58am
software programs
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
prevention techniques
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
Kali Linux
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
antivirus software
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing
biblio
A Markov Game Theoritic Approach for Power Grid Security
Submitted by grigby1 on Mon, 03/19/2018 - 12:55pm
Metrics
user authentication information steal
two-player zero-sum Markov game theoretic approach
security of data
Scalability
Resiliency
resilience
pubcrawl
power system security
power grids
Power Grid Security
power engineering computing
advanced persistent threat
Markov processes
Markov game
information and communication technology
Human behavior
graph theory
Games
game theory
cyber-attack
Companies
Analytical models
advanced persistent threats
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
Multi End-Hopping Modeling and Optimization Using Cooperative Game
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
MEH
computer network security
Control engineering
cooperative game
cyber-attack
DoS attack
game theory
hosts
information science
malicious scanning
Resiliency
moving target defense
MTD
multi end-hopping
Network reconnaissance
optimisation
optimization method
PCS
possible configurable space
pubcrawl
biblio
Holistic DDoS mitigation using NFV
Submitted by grigby1 on Tue, 01/16/2018 - 5:27pm
holistic DDoS attack mitigation
virtualisation
telecommunication traffic
security
Resiliency
pubcrawl
privacy
Organizations
NFV
networking service models
network function virtualization
Metrics
Human behavior
Cloud Computing
Hardware
edge computing
distributed denial-of-service
DDoS traffic
DDoS attack mitigation
DDoS
Data protection
cyber-attack
computer network security
Computer crime
composability
biblio
Cyber security threats \#x2014; Smart grid infrastructure
Submitted by grigby1 on Mon, 11/27/2017 - 11:25am
security of data
prosumer
Protocols
pubcrawl
R and D
Resiliency
risk evaluation process
SCADA
secure cyber infrastructure
power system security
smart devices
smart grid infrastructure
Smart Grids
smart meters
smart power grids
smart power system
Software
WANs
ICT
computer security
cyber infrastructure
cyber security
cyber security threats
cyber-attack
Demand response (DR)
denial-of-service (DoS)
electronic devices
composability
ICT driven power equipment massively layered structure
Metrics
new generation sensors
NIST
Peak Load Management (PLM)
power grid vulnerability analysis
power system framework
« first
‹ previous
1
2
3
4
next ›
last »