Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat modelling
biblio
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
Submitted by aekwall on Mon, 11/08/2021 - 3:15pm
Botnet Attacks
threat mitigation
VAST
Threats Mitigation
Threats Identification
threat modelling
system analysis and design
STRIDE
Smart Home
Object recognition
security
botnet
denial-of-service attack
Smart homes
Human behavior
Resiliency
Metrics
pubcrawl
Analytical models
biblio
Toward a framework for assessing the cyber-worthiness of complex mission critical systems
Submitted by aekwall on Mon, 10/05/2020 - 11:46am
initial framework
threat models
threat modelling
threat actor
system safety engineering
SysML
strong level
security of data
security
risk management
Resiliency
resilience
pubcrawl
military systems
military computing
Large-scale systems
Accreditation
highly contested cyber environment
high level threat actors
embedded systems
cyber-worthiness
cyber-physical systems
cyber physical systems
cyber
CPS resilience
computer security
complex systems
complex mission critical systems
complex military systems
certification
assurance
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
IEC 60870-5-104 protocol
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
Petri nets
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
pubcrawl
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
cyberattack
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
biblio
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
DREAD risk assessment model
Security Policies Analysis
threat modelling
STRIDE threat modelling
STRIDE
Security Modelling
Secure by design
policy-based security modelling
policy-based security enforcement
policy update
OEMs
Guidelines
embedded security
embedded architectures
security of data
device life-cycle
connected vehicles
configurable policy engine
Biological system modeling
application threat analysis
Policy
risk management
policy-based governance
pubcrawl
embedded systems
Software
Hardware
Access Control
biblio
Privacy Threat Model in Lifelogging
Submitted by K_Hooper on Wed, 10/25/2017 - 11:55am
Human behavior
lifelogging
privacy
Privacy Policies
pubcrawl
Scalability
threat modelling
threats
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing