Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious actors
biblio
Disrupting Exploitable Patterns in Software to Make Systems Safer
Submitted by willirn1 on Tue, 10/26/2021 - 5:34pm
Toolchains
emergent execution engineers
emergent behaviors
attackers
Cyber Attacks
malicious actors
Software
C3E
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 11:09am
distributed denial of service attacks
IoT botnet architectures
defense proposals
computationally limited devices
botnet
architecture
defense
Compositionality
Cybersecurity
Proposals
DDoS
Metrics
computer architecture
botnets
invasive software
malware
Computer crime
malicious actors
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Analyzing the Security of Bluetooth Low Energy
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
IoT
bluetooth security
Cyber Physical System
Ubertooth
malicious actors
bluetooth low energy
BLE devices
Bluetooth
Internet of Things devices
security standards
cyber physical systems
Software
sensitive information
encryption
Human behavior
resilience
Resiliency
composability
pubcrawl
standards
Hardware
Protocols
security of data
security
Internet of Things
biblio
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System
Submitted by aekwall on Mon, 02/10/2020 - 11:06am
pubcrawl
Intrusion Detection
learning (artificial intelligence)
library call lists
machine learning model
malicious activity
malicious actors
modern energy management systems
performance evaluation
power electronics
PowerWatch
Internet-connected resources
Resiliency
security of data
smart energy management system
Smart Grid
Smart Grid Sensors
Smart Grids
smart power grids
smart-grid
system call tracing
vital information
energy management
bogus sensor data
Compositionality
Computer crime
critical firmware
CSPoweR-Watch
CSPR
cyber-resilient residential power management system
cyber-secure power router
Cyber-security
EMS
Router Systems Security
energy management system (EMS)
energy management systems
energy resources
functional versions
global energy consumption
Hardware
Human Factors
Information analysis
internet
biblio
Truth-Aware Optimal Decision-Making Framework with Driver Preferences for V2V Communications
Submitted by grigby1 on Mon, 08/05/2019 - 10:36am
Trusted Computing
pubcrawl
reported road events
resilience
Resiliency
Roads
Safety
Scalability
sensors
trust-aware decision-making framework
policy-based governance
truth-aware optimal decision-making framework
utility maximization framework
V2V communications
vehicle-to-vehicle communications
vehicles
vehicular ad hoc networks
vehicular traffic stream
verifiable transmitter
false data
appropriate human preference factors
Bayes rule
collaboration
data trustworthiness
Decision Making
decision-making process
Dempster Shafer Theory
event belief
Accidents
false information
false trust
incorporate driver preferences
Intelligent Transportation System
Intelligent Transportation Systems
malicious actors
multiple-vehicle attack
optimal action
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 11:25am
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment