Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat
biblio
Towards Intrusion Response Intel
Submitted by grigby1 on Tue, 01/25/2022 - 4:55pm
network security
threat
Response
IRS
intrusion
Automated Secure Software Engineering
Knowledge engineering
Natural languages
Intel
tools
composability
NIST
Conferences
Resiliency
resilience
pubcrawl
Intrusion Detection
biblio
Supply Chain Compromise
Submitted by willirn1 on Tue, 10/26/2021 - 6:14pm
Supply Chain
Compromise
cyber
Cybersecurity
C3E
critical infrastructure
private sector
advanced persistent threat
software supply chain
authentication mechanisms
threat
biblio
Modeling the Structures of Threats to Information Security Risks based on a Fuzzy Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:29pm
resilience
threat
synthesis
structure
security
Scalability
risk management
Risk
Resiliency
Aggregates
pubcrawl
Probabilistic logic
Linguistics
Input variables
information security
Human behavior
fuzzy conclusion
expert systems
biblio
Hybrid Technique of Genetic Algorithm and Extended Diffie-Hellman Algorithm used for Intrusion Detection in Cloud
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
genetic algorithm
threat
security of data
Resiliency
resilience
pubcrawl
malicious insiders
Intrusion Detection
insecure APIs
information breaches
hybridization
genetic algorithms
API
Extension in Diffie-Hellman algorithm
extended Diffie-Hellman algorithm
Denial of Services (DOS)
data thrashing
data storage
Compositionality
cloud transmission
Cloud Computing
application programming interface
application program interfaces
APIs
biblio
Security Threats for Autonomous and Remotely Controlled Vehicles in Smart City
Submitted by grigby1 on Thu, 12/17/2020 - 1:55pm
policy-based governance
traffic engineering computing
threat
telerobotics
Smart City
smart cities
security of data
security graph
security context
security
robot operating systems
Resiliency
resilience
remotely operated vehicles
remotely controlled vehicles
pubcrawl
autonomous controlled vehicles
model
mobile robots
integrity property
integrity
Industrial Control Systems
industrial control
Human Factors
Human behavior
data integrity
cybersecurity threats
cyber
control system security
control engineering computing
AV system
autonomous vehicles
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
Phishing
virtual experiences
unsolicited e-mail
threats
threat mitigation
threat
security measures
security defense mechanisms
risk mitigation
Resiliency
resilience
pubcrawl
Attack vectors
Metrics
mass email infrastructures
machine learning
Human Factors
Human behavior
fraudulent content
fraud
email attacks
electronic mail service
Computer crime
biblio
A Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
Resiliency
quantum approaches
quantum computer
quantum computers
quantum computing
quantum computing security
Quantum mechanics
quantum physics
resilience
pubcrawl
risk assessment
Scalability
security
security problems
simultaneous operation
threat
wide solution space
high-resolution image
computational complexity
computer based solutions
Computers
Cryptography
cryptosystems
encryption
high complexity value
high performance
composability
information storage
internet
large-scale data processing
long processing times
Metrics
optimisation
optimization problems
biblio
A Decision Matrix Model to Identify and Evaluate APT Vulnerabilities at the User Plane
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
Mobile handsets
Workstations
user plane
threat vectors
threat attributes
threat
Spear Phishing
security
pubcrawl
privacy
Phishing
Organizations
organizational user
organizational information systems
multiple APT threat vector scenarios
advanced persistent threat vectors
Metrics
malware prevention
malicious APT vector
invasive software
genuine communication
fraudulent communication
Email
Electronic mail
cyber-security defensive mechanisms
Computer crime
APT vulnerabilities
APT threat vector
APT decision matrix model
APT
biblio
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN
Submitted by grigby1 on Wed, 01/16/2019 - 2:26pm
Internet of Things
pubcrawl
Resiliency
composability
6LoWPAN
adversary
attack
Fragmentation
security service
threat
« first
‹ previous
1
2
3
next ›
last »