Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat model
biblio
Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture
Submitted by grigby1 on Fri, 12/09/2022 - 6:16pm
microservices
Self-protection
Service Mesh
Microservice architectures
Autonomic Security
Observability
Assessment
distributed computing
threat model
computer architecture
Runtime
composability
Computational modeling
Resiliency
resilience
pubcrawl
security
biblio
Towards a Threat Model and Security Analysis of Video Conferencing Systems
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
privacy
threat mitigation
Video Conferencing
social factors
Pandemic
threat model
Metrics
real-time systems
Streaming media
tools
Analytical models
Resiliency
resilience
Human behavior
pubcrawl
cyber security
security
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
ROS
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
Reconnaissance
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
Analytical models
public domain software
pubcrawl
preliminary state
policy-based governance
operating systems (computers)
operating systems
offensive tool
modular two-pronged offensive tool
Human Factors
Human behavior
foundational knowledge
cybersecurity tool
Cybersecurity
control engineering computing
Biological system modeling
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
Security Analysis of Intelligent Transportation Systems Based on Simulation Data
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
threat model
resilience
road safety
road traffic
roadside infrastructure units
security
Security analysis
security model
security of data
pubcrawl
traffic control
traffic engineering computing
Transportation
transportation efficiency
transportation security
vehicle ad hoc networks
Veins
Information systems
Intelligent Data Security
Compositionality
Resiliency
Scalability
Analytical models
Buildings
composability
information security
Intelligent Data and Security
Intelligent Transportation Systems
ITS
ITS system
layered network security model
malicious node threat
Metrics
Networked Control Systems Security
biblio
New Attack Vectors for Building Automation and IoT
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
IoT
threat vectors
threat model
sensors
security of data
pubcrawl
privacy
new attack vectors
Metrics
Building automation
Internet of Things
Internet of Thing
encryption
data storage
cloud service
Cloud Computing
building management systems
building automation systems
biblio
A microgrid ontology for the analysis of cyber-physical security
Submitted by K_Hooper on Wed, 02/14/2018 - 12:00pm
cyber-physical systems
IEC 61850-7-420 DER extension
IEC 61850
Human behavior
fault state
Energy storage
electrical system
electrical substation automation
distributed power generation
distributed generation
distributed energy resource
DER unit controllers
DER-associated devices
IEC 61850 protocol suite
cyber-physical security evaluation
cyber-physical security
control loop
controllable loads
control directives
common information model
common data classes
capacity limits
asset-specific attributes
artificial intelligence security
ADVISE framework
pubcrawl
threat model
substation design
substation configuration
substation automation
ADversary View Security Evaluation framework
state-of-charge
adversary objectives
61850-7-420 DER object classes
Scalability
Resiliency
rated capacity
ramp rate
utility grid
power system security
Power system protection
power system applications
power engineering computing
ontologies (artificial intelligence)
object models
Microgrids
microgrid ontology
Metrics
message classes
IEC standards
biblio
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
smart phones
IoV systems
Metrics
microcontrollers
mobile computing
mobile infrastructures
pubcrawl
Resiliency
security
sensors
IoV environment
stored evidence
strong adversarial scenario
threat model
traffic engineering computing
Trust-IoV
trustworthy evidence
trustworthy forensic investigation framework
vehicular ad hoc networks
dynamic mobile network system
Aggregates
Bluetooth
Cloud Computing
clouds
complex network system
cyber physical systems
Digital Forensics
digital forensics investigations
distributed infrastructure
Adversarial Scenario
Forensics
Human behavior
Human Factors
information sharing
Internet of Things
Internet of Things (IoT)
Internet of Vehicles
Internet of Vehicles (IoV)
1
2
next ›
last »