Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability assessments
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 12:04pm
automated vulnerability testing
vulnerability scans
vulnerability assessments
virtual environment
suboptimal decision making
individual attack paths
executable attack graphs
end-to-end process
cyber risk reduction
cyber risk assessments
cyber risk assessment uncertainty
cyber risk assessment process
cyber attack graphs
AVRA
computer network security
automated vulnerability and risk analysis
automatic test software
attack graphs
Predictive Metrics
security issues
risk analysis
Decision Making
reachability analysis
graph theory
composability
pubcrawl
Resiliency
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by el_wehby on Mon, 05/14/2018 - 3:07pm
physical power flow maximization
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
power system vulnerability evaluation
power system security
Polish system
Algorithm design and analysis
optimization
mixed-integer linear program
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
bi-level optimization problem
1449080
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by grigby1 on Mon, 11/27/2017 - 11:24am
Polish system
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
Resiliency
pubcrawl
power system vulnerability evaluation
power system security
power grid vulnerability analysis
Algorithm design and analysis
physical power flow maximization
optimization
mixed-integer linear program
Metrics
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
composability
bi-level optimization problem