Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat models
biblio
End User and Expert Perceptions of Threats and Potential Countermeasures
Submitted by grigby1 on Mon, 03/29/2021 - 1:13pm
mental models
usable security and privacy
trust-based defensive methods
threats countermeasures
threat models
technical countermeasures
security technology
security expert perceptions
security
Scalability
pubcrawl
privacy technology
privacy
potential countermeasures
Biological system modeling
large-scale adoption
Interviews
internet
inductive research approach
Human Factors
Guidelines
expert systems
expert perceptions
end user perceptions
data privacy
conducted semistructured interviews
computer network security
cognitive science
biblio
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security
Submitted by aekwall on Mon, 03/01/2021 - 4:59pm
security
gradient-based XAI
learning (artificial intelligence)
Metrics
ML models
Predictive models
privacy
pubcrawl
Resiliency
Robustness
Scalability
explainable artificial intelligence methods
security domain
security of data
security-relevant data-sets
threat models
white box
White Box Security
white box setting
xai
XAI methods
composability
adversarial attack
Analytical models
Artificial Intelligence
artificial intelligence security
binary output
black box attack
Black Box Attacks
black box encryption
black box settings
black-box models
predictive security metrics
computer security
cyber security
cybersecurity domain
data analysis
Data models
deep learning
domain experts
exact properties
explainable artificial intelligence
biblio
Toward a framework for assessing the cyber-worthiness of complex mission critical systems
Submitted by aekwall on Mon, 10/05/2020 - 11:46am
initial framework
threat models
threat modelling
threat actor
system safety engineering
SysML
strong level
security of data
security
risk management
Resiliency
resilience
pubcrawl
military systems
military computing
Large-scale systems
Accreditation
highly contested cyber environment
high level threat actors
embedded systems
cyber-worthiness
cyber-physical systems
cyber physical systems
cyber
CPS resilience
computer security
complex systems
complex mission critical systems
complex military systems
certification
assurance
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
Study of hardware trojans based security vulnerabilities in cyber physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
SCADA systems
IC industry
integrated circuits
invasive software
malicious modifications
Metrics
pubcrawl
reliable functionality
resilience
Resiliency
hardware-in-the-loop based simulation platform
secure functionality
security
Security Awareness
security vulnerabilities
simulations
software peripherals
threat models
Trojan horses
CPS modeling
closed-loop systems
completely virtual simulation platform
complex computing environment
composability
Computational modeling
computing chip
computing hardware design
computing platform
closed loop systems
critical CPS application
cyber physical systems
cyber-physical systems
gas pipeline based SCADA system
Hardware
hardware internals
Hardware Trojans
hardware-in-the loop simulation
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 11:20am
BayesTrust
Web page ranking algorithms
vehicular ad hoc network
VehicleRank
untrusted nodes
threat models
social trust relationship
random topology
pagerank
local trust relationships
local trust information
IWOT-V
implicit Web of trust
global trust relationships
explicit link structure
cooperative intelligent transport system
telecommunication security
web of trust
Intelligent Transportation Systems
Web pages
trust model
telecommunication network topology
mobile ad hoc networks
Topology
VANET
Computational modeling
Social network services
Peer-to-peer computing
vehicular ad hoc networks
composability
pubcrawl
Resiliency
biblio
Hardware-Assisted Security in Electronic Control Units: Secure Automotive Communications by Utilizing One-Time-Programmable Network on Chip and Firewalls
Submitted by grigby1 on Fri, 05/15/2020 - 12:30pm
secure execution environments
Firewalls (computing)
Hardware
hardware firewalling
hardware-assisted security
network-on-chip
off-chip networking techniques
on-chip network physical isolation
one-time-programmable network
Secure Automotive Communications
firewalls
smart automotive technologies
software-dominated enhancements
system-level countermeasures
system-on-chip
system-wide cryptographic techniques
threat models
Trusted Electronic Control Units
vehicle-to-vehicle communications
automotive controller area network-bus communications
network on chip security
Scalability
Resiliency
resilience
Metrics
advanced driver assistance systems
authentication
automotive communications
pubcrawl
automotive electronics
Automotive engineering
controller area networks
cyber-enabled automotive system
data privacy
driver information systems
electronic control units
enjoyable driving
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control