Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Application software
biblio
Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks
Submitted by grigby1 on Fri, 04/28/2023 - 3:01pm
complex networks
Complex Worm Networks
Colleges and Universities
Application software
policy governance
Resiliency
Buffer overflows
computer network security
computer theory
computer networks
Compositionality
collaboration
composability
Computational modeling
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
feature extraction
biblio
Resiliency and Antifragility in Modern Software Systems- A Concept Paper
Submitted by grigby1 on Tue, 01/25/2022 - 3:50pm
security
pubcrawl
resilience
Resiliency
Conferences
Computer crime
composability
Layout
Software systems
Market research
software system
Application software
Autonomic Security
beyond resilience
biblio
Application of Advanced Persistent Threat Actors` Techniques aor Evaluating Defensive Countermeasures
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
APT
systematic knowledge
MITRE ATT&ck
FSTEK TDB
evaluating defensive countermeasures
car
ATT&CK knowledge base
adversaries’ tactics and techniques
advanced persistent threat actors
information security system
Application software
Media
security of data
advanced persistent threat
knowledge based systems
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
information security threats
information security
biblio
Framework for Analyzing the Security of Robot Control Systems
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
pubcrawl
vulnerabilities
threats
security system
security of data
security
robots
robotized system
Robotic system
Robot sensing systems
robot operating systems
robot control systems
Resiliency
resilience
Application software
policy-based governance
operating systems
model
mobile robots
malware
Human Factors
Human behavior
group management system
framework
control engineering computing
attacks
attacker
biblio
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
pervasive augmented reality
virtual elements
ubiquitous computing
testing
security of data
security architecture
Scalability
resilience
pubcrawl
privacy architecture
privacy
pervasive large scale augmented reality games
pervasive computing
Application software
personal area networks
mobile computing
mobile augmented reality games
middleware architecture
middleware
Large-scale systems
information security
Human behavior
data privacy
computer games
computer architecture
augmented reality
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Secure Proof of Retrievability System in Cloud for Data Integrity
Submitted by grigby1 on Mon, 08/05/2019 - 10:30am
security model
Generators
integrity verification
Metrics
proof of retrievability
pubcrawl
resilience
Resiliency
retrievability system
file upload phase
security of data
Servers
SHA-S12
storage management
tag generation
third party auditor
Third Party Auditor (TPA)
AES encryption
encryption audits
encryption
Databases
data storage
data integrity
Cryptography
computational cost
Compositionality
Cloud storage (CST)
cloud service controller
Cloud Controller (CSC)
Cloud Computing
Cloud Auditing
Ciphers
Application software
biblio
A Method of Cyber Security Vulnerability Test for the DPPS and PMAS Test-Bed
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
operating nuclear plant control system
vulnerability scanning tool
Vulnerability
tools
threat vectors
test-bed
security of data
pubcrawl
privacy
PMAS test-bed
Plant Monitoring Annunciator System (PMAS)
Application software
Monitoring
Metrics
maintenance engineering
DPPS test-bed
Digital Plant Protection System (DPPS)
cyber security vulnerability test
cyber security evaluation process
cyber security
control systems
computer security
biblio
"Dynamic Remote Attestation Based on Concerns"
Submitted by grigby1 on Thu, 02/23/2017 - 11:20am
privacy
trusted root
Trusted Computing
tree data structures
storage applications
static measure
software metrics
Software measurement
software integrity metrics
Software Architecture
security
request service software module
Remote Attestation
pubcrawl
privacy protection
Application software
operating systems
Monitoring
Merkel hash tree
load module
integrity measurement architecture
efficiency improvement
dynamic remote attestation
dynamic credible monitoring module
Data protection
concerns
computing environments
challenger relationship analysis
attestation relationship analysis