Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security countermeasures
biblio
A Security Reference Architecture for Blockchains
Submitted by aekwall on Mon, 09/28/2020 - 10:42am
ISO standards
threat-risk assessment
surveys and tutorials
security reference architecture
operational security issues
layered systems
ISO/IEC 15408
reference architecture
blockchain security
security countermeasures
consensus protocol
security of data
IEC standards
security vulnerabilities
risk management
blockchain
Cryptography
Peer-to-peer computing
Routing
pubcrawl
Resiliency
Scalability
biblio
Intrusion Detection For Controller Area Network Using Support Vector Machines
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
Internet of Things
Support vector machines
support vector machine based intrusion detection system
support vector machine
security countermeasures
Resiliency
pubcrawl
Protocols
process secure communication
parameter selection
machine learning
light-weight nature
Intrusion Detection
automobile communications
feature vector selection
feature extraction
ECU
delays
cyber-physical systems
controller area networks
controller area network security
controller area network
computer network security
communication standard
CAN protocol
automobiles
biblio
Network Layers Threats its Countermeasures in WSNs
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
security countermeasures
WSN
wormhole attack
wireless sensor networks
telecommunication security
telecommunication network reliability
Sybil attack
Sinkhole attack
selective forwarding attack
security requirements
security hazards
Blackhole attack
Scalability
Resiliency
resilience
reliable file exchange
pubcrawl
network layer threats
network layer intrusions
hello flood attack
dimensionally diffused nodes
Blackhole Attack And Hello Flood Attac
biblio
Analysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks
Submitted by grigby1 on Mon, 03/02/2020 - 12:37pm
resilience
vehicular ad hoc networks
vehicle connectivity
vehicle ad-hoc networks
VANET
V2V
unprecedented security concerns
telecommunication security
technological development
sybil nodes
sybil attacks
Sybil attack
security countermeasures
security
Resiliency
advanced attacks
replay attack
realistic attack scenarios
pubcrawl
OMNeT++ simulation environment
OMNET++
Metrics
inter-vehicular communication
Driver assistance systems
disruptive innovations
composability
common attacks
Autonomous Driving
automotive transportation
attacks
biblio
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance
Submitted by grigby1 on Tue, 01/21/2020 - 10:32am
mission impact graph
security of data
security countermeasures
Scalability
Resiliency
resilience
ranking algorithm
pubcrawl
policy-based governance
network attacks
collaboration
mission impact assessment
Mission Assurance
Metrics
Information Assurance
Human behavior
graph theory
cyber space threat
Cyber Attacks
composability
biblio
Area Constraint Aware Physical Unclonable Function for Intelligence Module
Submitted by grigby1 on Mon, 12/09/2019 - 1:01pm
Hardware
Table lookup
security of IoT device
security countermeasures
PUF performance evaluation
pubcrawl
physical unclonable functions
Physical Unclonable Function
NN
Neurons
neural network
IoT devices
intelligence module
Hardware Security
area constraint aware physical unclonable function
Hamming distance
field programmable gate arrays
edge computing
Cryptography
computational intelligence
Compositionality
composability
circuit area
authentication techniques
authentication
Artificial Neural Networks
artificial intelligence technology
area constraint aware PUF
biblio
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System
Submitted by aekwall on Mon, 03/25/2019 - 8:55am
SDN self-healing mechanisms
fault tolerance
Immune system
multiobjective optimization framework
network orchestration
networking paradigm
quality of service
Run Time
SDN controller
end-to-end packet delay
security cost
security countermeasures
self-healing cyber resilient framework
software defined networking-enabled energy delivery system
Sorting
system resilience
Virtualization
self-healing networks
Cyber Attacks
computer network security
authorisation
computer network management
software defined networking
pubcrawl
composability
optimisation
authentication
cyberattack
resilience
access control rules
automated network management
autonomous attack containment
computational complexity
configurable trust levels
delays
biblio
A Tiered Security Analysis of Industrial Control System Devices
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
Programmable Logic Controllers (PLCs)
vulnerabilities
tiered security analysis
threats
supervisory control and data acquisition (SCADA) systems
Software
security of data
security countermeasures
security
SCADA systems
Resiliency
resilience
pubcrawl
assets
production engineering computing
numerical control
Industrial Control Systems (ICSs)
Industrial Control system devices
industrial control
Industrial Communication
Human behavior
Hardware
Distributed Control Systems (DCSs)
computer security
computer architecture
Compositionality
biblio
"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)"
Submitted by abfox on Tue, 02/14/2017 - 10:51am
advanced persistent threats
APT
computer network security
cost-benefit analysis
invasive software
Investment
malware
malware attacks
Mathematical model
Measurement
Organizations
pubcrawl170101
return on response investment
risk management
RORI index
security countermeasures