Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack vector
biblio
Analysis of the attack vectors used by threat actors during the pandemic
Submitted by grigby1 on Thu, 05/13/2021 - 11:21am
Incident Response
threat actor
security
Scalability
Resiliency
resilience
pubcrawl
Pandemics
Organizations
malware
information security
threat vectors
Human behavior
Cyber Kill Chain
COVID-19
computer security
business continuity
Attack vectors
attack vector
analysis
privacy
Measurement
biblio
Causal Chain of Time Delay Attack on Synchronous Generator Control
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
SCADA systems
physical power grid
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
robust control
modern power grids
Scalability
security
security of data
synchronous generator control
synchronous generators
Time delay
time delay attack
Time measurement
cyber-space leading
attack vector
Chained Attacks
communication technology
Cyber Attacks
cyber intrusion
cyber security
cyber-physical causal chain
cyber-physical systems
attack tree
Delay effects
delays
denial-of-service attack
frequency control
grid cyber security
grid frequency
grid response
load frequency control
biblio
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
attack vector
Cross Site Scripting
XSStudent
URL
universities
phishing attacks
instant access
direct access
Cross-site Scripting Attacks
controlled attack
Beef software
BeEF
Scalability
Educational institutions
JavaScript code
XSS
QR code
Java
internet
Computer crime
pubcrawl
Human behavior
Resiliency
biblio
Multi-Attacking Strategy on Smart Grid with Incomplete Network Information
Submitted by grigby1 on Fri, 08/28/2020 - 11:03am
Power measurement
Voltage measurement
telecommunication networks
state estimation
smart power grids
Smart Grid
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system operator
power system
attack vector
power engineering computing
Phasor measurement units
network information technology
multiattacking strategy
Multi-Attack
Load flow
injected false data attack
IEEE 14 bus system
Human behavior
cyber-attacks
Communication networks
Attack vectors
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
Taxonomy Analysis of Cloud Computing Vulnerabilities through Attack Vector, CVSS and Complexity Parameter
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
CVSS
unified taxonomy
taxonomy
security vulnerabilities
security risks
security of data
Scalability
Resiliency
resilience
pubcrawl
NVD
Human behavior
CVSS score
attack vector
comprehensive taxonomy
complexity parameter
cloud vulnerabilities
cloud specific vulnerabilities
cloud specific identified vulnerabilities
cloud enabled services
cloud computing vulnerabilities
cloud computing system
Cloud Computing
Attack vectors
Attack Vector (AV)
biblio
Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
Metrics
Windows Operating System Security
Windows operating system
Windows environment
Windows
USB flash drive devices
USB based Fork Bomb attack
USB attack
system buses
security of data
Resiliency
resilience
pubcrawl
primary storage devices
operating systems (computers)
Arduino Pro Microdevice
memory performance
media exchanges
fork bomb
flash memories
electronic data interchange
digital storage
device drivers
data storage
data exchange devices
Computer crime
composability
Attack vectors
attack vector
biblio
Detection of Phishing websites using Generative Adversarial Network
Submitted by grigby1 on Fri, 04/10/2020 - 11:37am
internal structure
Web sites
Uniform resource locators
Training
synthetic phishing features
security analytics
pubcrawl
phishing Websites
Phishing Detection
phishing datasets
Phishing
pattern classification
normal Websites
neural nets
meta data
low-risk rightreward nature
attack vector
Human Factors
Human behavior
hacking endeavour
Generators
generator network
generative adversarial networks
generative adversarial network
Gallium nitride
feature extraction
external metadata
discriminator network
Computer crime
Cloud Security
Big Data Analytics
biblio
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
programmable logic controller
Kernel
LED alert
light emitting diodes
Measurement
Metrics
operation technology
persistent threats
privacy
programmable controllers
invasive software
pubcrawl
real-time operation
Smart Systems
supply chain attack
supply chain security
supply chain threats
supply chains
threat vectors
Trojan horses
embedded systems
attack vector
computer security
Air gaps
CPU performance
cyber domain
Data Exfiltration
device tree
direct memory access
DMA transfer speed
anomaly detection techniques
Embedded Systems Security
firmware
firmware modification
firmware trojan
Hardware
industrial control
Industrial Control Systems
industrial domain
industrial Internet-of-Things
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 4:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
1
2
next ›
last »