Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CVE
biblio
Automatic labeling of the elements of a vulnerability report CVE with NLP
Submitted by grigby1 on Fri, 09/01/2023 - 1:49pm
Compositionality
Technological
security knowledge repository
CVE
Information Reuse
BERT
Transformers
data science
distortion
named entity recognition
machine learning
natural language processing
composability
Databases
Software
Resiliency
resilience
pubcrawl
security
biblio
A Comprehensive Analysis of NVD Concurrency Vulnerabilities
Submitted by grigby1 on Fri, 05/12/2023 - 9:26am
empirical study
software quality
security
Resiliency
resilience
programming
network security
Metrics
Market research
pubcrawl
Databases
CVE
Concurrent computing
Concurrency Vulnerability
Concurrency
composability
codes
biblio
Identification of Attack Paths Using Kill Chain and Attack Graphs
Submitted by grigby1 on Fri, 04/14/2023 - 3:04pm
cyberattack
CVE
asset management
Resiliency
Chained Attacks
Kill Chain
MITRE ATT&ck
STRIDE
threat identification
Organizations
Reconnaissance
attack graph
Force
Standards organizations
Scalability
Generators
resilience
pubcrawl
biblio
Research on Vulnerability Ontology Model
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
inference mechanisms
Information Reuse and Security
weakness class
vulnerability class
security vulnerability ontology model
public information systems
knowledge inference
information security public databases
Inference Rules
industry public standards
CWE
capec
CVE
Compositionality
security of data
Communication networks
Ontology
ontologies (artificial intelligence)
finance
Economics
Vulnerability
Databases
standards
pubcrawl
Resiliency
security
Ontologies
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
resilience
wireless network vulnerabilities
wireless LAN
wireless
Wi-Fi network
Vulnerability
transitions probabilities
telecommunication security
smart power grids
Smart Grid Sensors
smart grid comprehensive analysis
Smart Grid
security of data
security levels
Resiliency
Compositionality
pubcrawl
probability density
probability
power system security
network attacks
network administrators
Markov processes
Markov Chain model
markov chain
Human Factors
Human behavior
CVE
computer network security
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework