Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack tree
biblio
Optimal Attack Chain Building Algorithm
Submitted by grigby1 on Fri, 04/14/2023 - 3:04pm
information security
risk management
pubcrawl
resilience
Scalability
Topology
Buildings
Reliability
risk assessment
attack tree
Time measurement
Chained Attacks
Resiliency
Biomedical measurement
Cyber security risk management
system topology modeling
biblio
RIoTS: Risk Analysis of IoT Supply Chain Threats
Submitted by grigby1 on Fri, 09/09/2022 - 2:56pm
Internet of Things
risk management
security
pubcrawl
Metrics
Ecosystems
information and communication technology
Reliability
attack tree
supply chains
Supply Chain
Birnbaum importance
Improvement potential
supply chain risk assessment
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 3:35pm
internet
trees (mathematics)
traditional network security
traditional intrusion detection systems
Resiliency
pubcrawl
Predictive models
LSTM & attack tree
LSTM
Logic gates
Intrusion Detection
attack tree
Information Reuse and Security
Industrial control system intrusion detection model
industrial control
IDS
ICs
Hidden Markov models
constructed attack tree model
computer network security
Computer hacking
Compositionality
biblio
Causal Chain of Time Delay Attack on Synchronous Generator Control
Submitted by grigby1 on Wed, 03/17/2021 - 11:41am
SCADA systems
physical power grid
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
robust control
modern power grids
Scalability
security
security of data
synchronous generator control
synchronous generators
Time delay
time delay attack
Time measurement
cyber-space leading
attack vector
Chained Attacks
communication technology
Cyber Attacks
cyber intrusion
cyber security
cyber-physical causal chain
cyber-physical systems
attack tree
Delay effects
delays
denial-of-service attack
frequency control
grid cyber security
grid frequency
grid response
load frequency control
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Submitted by grigby1 on Thu, 06/04/2020 - 10:47am
SPS threats
Safety
safety risk assessment
security
security risk assessment
Servers
social aspects of automation
Social Virtual Reality
Solid modeling
risk management
three-dimensional immersive computer experience
trees (mathematics)
user experience
virtual reality
virtual reality learning environment
VR technology
VRLE system
vSocial VRLE
immersive systems
attack tree
attack tree formalism
composability
computer based training
cyber physical systems
data privacy
educational user experience
Human Factors
adhoc attack tree
IoT Application Testbed
privacy
Privacy Control
privacy-preservation
pubcrawl
real-time systems
resilience
Resiliency
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 9:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
The APT Detection Method Based on Attack Tree for SDN
Submitted by grigby1 on Fri, 06/28/2019 - 9:42am
APT
attack tree
Correlation analysis
pubcrawl
resilience
Resiliency
Scalability
SDN
SDN security
biblio
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Submitted by grigby1 on Mon, 01/21/2019 - 11:31am
tree structure
private information
pubcrawl
Resiliency
security
Security analysis
security threat
smart cities
telecommunication security
privacy
trees (mathematics)
VANET
vehicle network
vehicles
vehicular ad hoc network
vehicular ad hoc networks
vehicular ad-hoc networks
Ad Hoc Network Security
open access environment
Metrics
Logic gates
integrity
information discreet
important security requirements
data privacy
confidentiality
confidential information
Conferences
Computers
Compositionality
Availability
attack-defense tree
attack tree
1
2
next ›
last »