Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NIST
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
biblio
Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision
Submitted by grigby1 on Mon, 03/09/2020 - 1:58pm
security requirements failures
pubcrawl
reconfiguring system controls
resilience
Resiliency
Runtime
Scalability
security
security and privacy
security requirements
Privacy Threats
security threats
Smart Grid
Smart Grid Privacy
Smart Grids
smart grids adaptive security
smart grids privacy
smart power grids
software engineering
software engineering vision
Human Factors
automating prevention
collaboration
composability
computer architecture
data privacy
energy producers
engineering adaptive security
failure analysis
Human behavior
Adaptive software
Metrics
Monitoring
NIST
policy-based governance
power engineering computing
power system security
privacy
privacy requirements failures
biblio
Cipher Modification Against Steganalysis Based on NIST Tests
Submitted by grigby1 on Mon, 02/10/2020 - 10:42am
Image edge detection
testing
steganography detection
Steganography
steganalytic method
pubcrawl
privacy
NIST tests steganalysis
NIST
Metrics
Image Steganography
arithmetic codes
Image coding
encryption
encoding
edge detection
Cryptography
composability
Ciphers
cipher modification
arithmetic source compression coding
biblio
A Flexible and Compatible Model for Supporting Assurance Level through a Central Proxy
Submitted by grigby1 on Tue, 01/21/2020 - 10:32am
Level of Assurance
user credentials
Trusted Computing
service security
Scalability
Resiliency
resilience
remote identity providers
pubcrawl
policy-based governance
NIST
Metrics
message authentication
LoA
access control decisions
Information Assurance
Human behavior
FIM
federated identity management
composability
collaboration
central proxy
authorization
authorisation
authentication and authorization infrastructure
authentication
assurance level
assurance information
biblio
A Model-Based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable Networks
Submitted by grigby1 on Wed, 10/23/2019 - 11:36am
patch management
uncertainty
Security Risk Management
Security Risk Estimation
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Security Metrics
NIST
Monte Carlo simulation
Metrics
Measurement
Human Factors
Human behavior
estimation
computer science
Comparative security metric
biblio
Research Issues Based on Comparative Work Related to Data Security and Privacy Preservation in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 2:16pm
NIST
smart power grids
smart meters
Smart Grids
smart grid data communication
Smart Grid
secure data communication
pubcrawl
privacy preservation
privacy
power system security
power engineering computing
Smart Grid Privacy
Metrics
Human behavior
electric grids
Data Security
data privacy
data communication
cyber-threat
customer-safety
Cryptography
composability
authorisation
biblio
Deleted Data Attribution in Cloud Computing Platforms
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
human-in-the-loop security center paradigm
Cloud Computing
Human behavior
pubcrawl
composability
Metrics
metadata
attribution
cloud forensic
data acquisition
data deletion
digital forensic
Digital Forensics
file attribution
NIST
biblio
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
NIST post-quantum cryptography project submissions
validation tools
tools
taint analysis
static analysis
source code
quantum cryptography
pubcrawl
Proposals
program diagnostics
post-quantum cryptography algorithms
NIST post-quantum standardization project
cache storage
NIST
Metrics
leakage pattern detection
execution behavior
encryption
development cycle
dedicated vulnerability research tool
cryptographic algorithms
composability
cache-timing vulnerabilities
cache-timing attacks
biblio
Post-Quantum Algorithm of Asymmetric Encryption and Its Basic Properties
Submitted by grigby1 on Fri, 02/08/2019 - 3:21pm
Metrics
ring
Resiliency
resilience
quotient ring
quantum cryptography
quantum computing
Public key
post-quantum algorithm
polynomial
NTRU-like cryptosystem NTRU Prime IIT Ukraine
NIST
pubcrawl
Human behavior
field
end-to-end encryption type
encryption
encoding
cryptographic transformations
Computers
Compositionality
composability
basic properties
Asymmetric Encryption
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by grigby1 on Wed, 09/12/2018 - 10:13am
security management
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
Industrial Control Systems
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
Databases
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
control systems
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »