Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Damage Assessment
biblio
Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
logic linguistic models
vital physical system
Ukrainian CEI
security of data
Safety
risk management
Resiliency
resilience capacities
resilience assurance
resilience
pubcrawl
multilevel fuzzy logic models
logic-linguistic models
Accidents
Linguistics
fuzzy set theory
fuzzy logic-based approach
Fuzzy logic
external hostile influences
Damage Assessment
cyber resilience
cyber incidents
critical infrastructures
critical energy infrastructure
Computer crime
CEI cyber resilience assessment
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
stochastic petri nets
Damage Assessment
transmission line protection systems
substation
power transmission protection
power system structure
power system components
Petrinet
nonintelligent attacks
intelligent attack
IEEE39 bus system
electrical network
cyber security risk assessment method
cyber physical performance
attacks
power supply
security of data
Cyber Physical System
smart power grid
power transmission lines
Stochastic processes
substation automation
cyber security
Petri nets
power system security
power engineering computing
probability
Cyber Attacks
smart power grids
Risk
pubcrawl
Resiliency
biblio
N-1 RTU Cyber-Physical Security Assessment Using State Estimation
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
state estimation
Damage Assessment
synthetic 200-bus system
power system devices
observability analysis
N-1 RTU cyber-physical security assessment
IEEE 14-bus system
EMS applications
electrical substations
Cyber-physical security assessment
cyber-physical impact
Remote Terminal Units
control center
state estimator
Denial-of-Service
security of data
substation automation
supervisory control and data acquisition system
private networks
SCADA system
power system control
power system state estimation
energy management systems
power system security
cyber-attacks
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
cyber-attack
biblio
A Study of Security Modeling Techniques for Smart Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
critical security systems
Damage Assessment
Threat Modeling
system services
Smartness
Smart Systems
Security Modeling Techniques
Security modeling
secure smart system development life cycle
fault trees
security of data
system resources
Unified modeling language
Stochastic processes
risk management
Analytical models
pubcrawl
Resiliency
Software
security
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
Europe
Damage Assessment
protection of critical infrastructure
intergovernmental national views
informational space
information environment
cyber environment
critical infrastructure security
common cyberspace
air gap
critical information infrastructure
security
National security
Cyberspace
computer security
pubcrawl
Resiliency
information security
critical infrastructures
critical infrastructure
security of data
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
automated damage assessment
Damage Assessment
sUAS
small unmanned aircraft systems
post-disaster response
optical radar
online mapping technique
natural disasters
lidar
Laser radar
Infrastructure Inspection
Homeland Security
Inspection
—sUAS
disasters
Aircraft
Bridges
National security
autonomous aerial vehicles
Three-dimensional displays
Cameras
pubcrawl
Resiliency
critical infrastructure
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 12:05pm
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
Security risk assessment of the PeopleBot mobile robot research platform
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
Resiliency
WiFi
ubiquitous computing
Service robots
security threats
security risk assessment
security of data
security access
security
robots
robotic systems
Robot sensing systems
risk management
collision avoidance
resilience
remote accessing
remote access service
pubcrawl
PeopleBot mobile robot research platform
mobile robots
mobile robot platform
internet
Ethernet
Damage Assessment
critical missions
control
biblio
Immunity assessment of a servomotor exposed to an intentional train of RF pulses
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
intentional interference
susceptibility
smart intentional electromagnetic interference
Servomotors
servomotor
robots
robotics
RF pulses
Resiliency
resilience
radio frequency pulses
Radio frequency
pubcrawl
Off-The-Shelf servomotor
intentional train
automated production lines
industrial process
Induction motors
immunity assessment
functional safety
EMC
Electromagnetics
electromagnetic interference
electromagnetic fields
electromagnetic field
electromagnetic compatibility
DC motors
Damage Assessment
cyber-attacks
biblio
Estimating Target Distribution in security assessment models
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
pubcrawl
Vulnerability
target distribution
Standards organizations
security of data
security monitoring system
security assessment
security
Resiliency
resilience
real-time systems
real-time system configuration
business data processing
Organizations
network security assessment models
Monitoring
information security
distributed processing
distributed computing
Databases
Damage Assessment
cyber-attacks
Computers
Computational modeling
« first
‹ previous
1
2
3
4
5
next ›
last »