Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security breach
biblio
A Comparative Study on security breach in Fog computing and its impact
Submitted by aekwall on Mon, 06/28/2021 - 12:35pm
edge computing
security breach
Scalability
Resiliency
pubcrawl
Privacy-preserving techniques
privacy issues
privacy
Fog Computing and Security
Fog computing
data privacy
computer architecture
Cloud vs Fog
Cloud Computing
challenges
Bandwidth
security
biblio
A Review of Various Attack Methods on Air-Gapped Systems
Submitted by grigby1 on Mon, 01/25/2021 - 11:28am
Fans
Universal Serial Bus
security breach
Resiliency
resilience
pubcrawl
Metrics
malware
Magnetoacoustic effects
Human Factors
Human behavior
Acoustics
exfiltrate
Electromagnetic radiation
data leak
covert channels
composability
Cameras
attack methods
air-gapped
Air gaps
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Submitted by aekwall on Mon, 10/05/2020 - 11:47am
embedded systems
technology manufacturers
serious embedded security challenges
Security Regulation
security of data
security methods
security foundation
security breach
Response
Recover
pubcrawl
next-generation critical infrastructure
microarchitectural characteristics
international security regulations
embedded technologies
Resilient Security Architectures
embedded security requirements
embedded security microarchitecture
embedded security domains
embedded architectures
Cyber-Physical Embedded System
Cyber Resilient Embedded System
cyber resilience
cyber physical systems
critical infrastructures
critical infrastructure
CPS resilience
business operations
Active Defence
Resiliency
biblio
Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
Resiliency
malware
medical computing
Medical Informatics
models
Neoplasms
patient distress
pattern classification
poisoning attacks
pubcrawl
resilience
malicious data
Scalability
security
security breach
security of data
systematic poisoning attacks
targeted errors
Theoretical
Training
training datasets
health care
Algorithms
application domains
arbitrary errors
biomedicine
computer security
critical decisions
Databases
Factual
false diagnosis prompt users
false positive classification
AI Poisoning
health-related applications
Healthcare
Human behavior
Humans
learning (artificial intelligence)
life-threatening consequences
machine learning
machine learning algorithms
machine-learning algorithms
biblio
Honeypot Utilization for Analyzing Cyber Attacks
Submitted by grigby1 on Fri, 09/15/2017 - 10:59am
Hacking
honey pots
Human behavior
information security
network attacks
pubcrawl
Resiliency
Scalability
security breach