Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security attributes
biblio
Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function
Submitted by grigby1 on Fri, 04/22/2022 - 12:29pm
security
pubcrawl
Conferences
Mathematical model
5G mobile communication
Industries
composability
Metrics
Compositionality
resilience
Scalability
microservices
decomposition
5G NRF
security attributes
Service Decomposition Models
biblio
Early Combined Safety - Security Defense in Depth Assessment of Complex Systems
Submitted by grigby1 on Mon, 03/29/2021 - 12:27pm
Large-scale systems
Unified modeling language
traditional security research
tools
system engineer
system design life-cycle phases
security design weaknesses
security defenses
security attributes
security assessments
security
Scalability
Safety
Resiliency
resilience
pubcrawl
additional system complexity
interdisciplinary system dependencies
inter-system dependencies
Human behavior
expert systems
early conceptual design
early assessment
dependency model
defense in depth
critical infrastructures
concurrent safety
computer security
complex systems
complex system
complex critical infrastructures
combined Safety - Security Defense in Depth Assessment
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
architectural design
structural design
security architecture framework
security architecture
security architectural framework
secured information systems
ring-based nested network zones
Nested Zones
N-tier/shared nothing system architectures
defense-in-depth approach
defense in depth
data centers
critical infrastructure
Attack Hops
security of data
network architecture
Network Security Architecture
critical information infrastructure
Guidelines
security attributes
Information systems
Software Architecture
standards
pubcrawl
Resiliency
computer architecture
security
biblio
Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Block Cipher
Scalable Security
Weak keys
Ultra Gridsec
stream cipher algorithm
stream cipher
scalable symmetric key cryptographic scheme
peer-to-peer desktop grid framework
multithreading
grid computing security
cryptography security
block cipher encryption algorithm
Cryptography
security scheme
Instruction sets
Ciphers
security attributes
grid computing
Scalability
Throughput
performance evaluation
Peer-to-peer computing
pubcrawl
encryption
biblio
An Approach for Trustworthiness Benchmarking Using Software Metrics
Submitted by aekwall on Mon, 07/01/2019 - 9:12am
Security Metrics
trustworthiness benchmarking
trustworthiness assessment model
Trusted Computing
Software systems
software security experts
software quality
software metrics
security vulnerabilities
security of data
Measurement
security attributes
security
pubcrawl
Mozilla Firefox project
Metrics
Buildings
Benchmark testing
metrics testing
biblio
Evaluating the complexity and impacts of attacks on cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
estimation theory
time-to-shutdown
Sensor phenomena and characterization
security risks
security of data
security attributes
quantitative security evaluation
pubcrawl170108
pubcrawl170107
process control
probability
modeling
graph theory
actuators
cyber-to-physical attack
cyber-to-cyber attack
cyber-physical systems
cyber-physical system security
cross-domain attack
CPS
consequence estimation process
Computer crime
attack probability
attack graph
attack consequences