Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat model
biblio
Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
intrusion prevention
Training
threat model
Threat Index
security threats
security of data
security issues
security
Resiliency
pubcrawl
Protocols
privacy
IoT-based CPS
IoT based CPHS
intrusion tolerance
Byzantine replication
Intrusion Detection
Internet of Things
Indexes
human participation
human involvement
human elements
holistic framework
cyber-physical systems
cyber-physical human systems
CPHS environment
composability
collaborative attacks
collaboration
biblio
Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
IoT infrastructures security
threat model
software fault tolerance
smart infrastructures
sensors
security of data
Scalability
risk management method
risk management framework
risk management
Resiliency
pubcrawl
mobile devices
mobile computing
Metrics
ABA methodology
IoT
intrusion tolerance
intrusion detection system
Intrusion Detection
Internet of Things
cybersecurity mechanism
cyber security
computer security
Computational modeling
Autonomic Security
Autonomic computing
Anomaly Behavior Analysis methodology
anomaly behavior analysis
biblio
TAON: An Ontology-based Approach to Mitigating Targeted Attacks
Submitted by grigby1 on Tue, 09/05/2017 - 1:20pm
advanced persistent threat
advanced persistent threats
behavioral data
collaboration
composability
Human behavior
Metrics
Ontology
pubcrawl
Resiliency
Scalability
targeted attacks
threat model
file
A Framework for Generation Replay and Analysis of Real-World Attack Variants
Submitted by awhitesell on Tue, 11/15/2016 - 5:37pm
Science of Security
cyber attack
Science of Security
threat model
Cyber Attacks
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
A Framework for Generation, Replay and Analysis of Real-World Attack Variants
Submitted by awhitesell on Tue, 11/15/2016 - 5:37pm
Science of Security
cyber attack
Science of Security
threat model
Cyber Attacks
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
« first
‹ previous
1
2