Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Complex Network Cybersecurity Monitoring Method
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
resource management
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Task Analysis
system monitoring
special-purpose devices
security sensor
security of data
resource allocation
limited resource allocation
cybersecurity monitoring
complex networks
complex network unit cybersecurity
complex network cybersecurity monitoring
complex network
Bipartite graph
computer security
Scalability
Monitoring
sensors
biblio
Powering Hands-on Cybersecurity Practices with Cloud Computing
Submitted by grigby1 on Wed, 03/18/2020 - 11:50am
Metrics
web services
virtualisation
Virtual machine monitors
tools
specific virtual computing service provider
security of data
Science of Security
Scalability
Resiliency
resilience
pubcrawl
private OpenStack cloud
powering hands-on cybersecurity practices
Policy-Governed Secure Collaboration
multiple clouds
Chameleon cloud
Human behavior
hands-on lab
hands-on cybersecurity practice
educational courses
education
cybersecurity education
computer security
computer science education
composability
Communication networks
collaboration
cloud-based platform named EZSetup
cloud-agnostic
Cloud Computing
biblio
Principles of Physical and Information Model Integration for Cybersecurity Provision to a Nuclear Power Plant
Submitted by grigby1 on Wed, 03/18/2020 - 11:50am
pubcrawl
Metrics
modelling
nuclear engineering computing
nuclear power plant
nuclear power stations
Numerical models
physical models
Policy-Governed Secure Collaboration
Mathematical model
resilience
Resiliency
risk management
Scalability
Science of Security
security of data
simulations
cybersecurity provision
collaboration
complex technical objects
composability
Computational modeling
computer security
cyber threats
Cybersecurity
cybersecurity problems
Adaptation models
cybersecurity risk assessment
Data models
Human behavior
hybrid model
information model integration
information properties
instrumentation and control system
biblio
Smart Grid Cyber Security and Substation Network Security
Submitted by grigby1 on Mon, 03/09/2020 - 2:56pm
Smart Grid Cyber Security
NIST interoperability framework process
personnel training
policy-based governance
power system security
power system simulation
pubcrawl
resilience
Resiliency
Scalability
security architecture
Metrics
Smart Grid Privacy
smart grid-related data privacy
Smart Grids
smart power grids
standards
substation network security
substation protection
Substations
ZigBee Smart Energy
Data Minimization
Advanced Metering Infrastructure (AMI)
Advanced Security Acceleration Project for the Smart Grid
Automated Data Exchange (ADE)
collaboration
composability
computer security
consumer privacy
consumer privacy audits
cyber security controls
cyber vulnerability assessments
(ASP-SG)
data privacy
Data Security
Demand Response and Smart Grid Coalition (DRSG)
electric power infrastructure
Home Area Network (HAN)
Human behavior
Human Factors
IP Security (IPSec)
Law
biblio
AvTA Based Assessment of Dependability Considering Recovery After Failures and Attacks on Vulnerabilities
Submitted by grigby1 on Mon, 03/02/2020 - 1:34pm
Software
OR gates
probabilities
probability
pubcrawl
Reliability
resilience
Resiliency
security of data
maintenance engineering
software failures
software fault tolerance
software reliability
SREs
successful recovery events
System recovery
trees (mathematics)
failure analysis
Attack Tree Analysis
availability tree analysis
AvTA models
Building automation system
computer security
criticality oriented analysis
cyber security subtrees
dependability assessment
ATA technique
FMEA
FMECA
Hardware
ICS recovery
IMECA
instrumentation and control system
instrumentation and control systems
biblio
Secure Staging System for Highly Confidential Data Built on Reconfigurable Computing Platform
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
lower-than-IP-layer partitioning mechanisms
computer center
container
Dentistry
dynamic reconfigurability
Dynamic scheduling
Ethernet
field trial system
high performance data analytics
highly confidential data
common vulnerability scoring system evaluation
PCI Express
Provisioning Partitioning
reconfigurable computing platform
secure data
secure staging system
Security Scheduling
software defined
Ubiquitous Computing Security
computer security
computer network security
Cloud Computing
Scalability
Software
Resiliency
pubcrawl
Metrics
resource allocation
security of data
data analysis
Containers
OpenFlow
Human Factors
Reconfigurability
High performance computing
hospitals
reconfigurable architectures
biblio
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
programmable logic controller
Kernel
LED alert
light emitting diodes
Measurement
Metrics
operation technology
persistent threats
privacy
programmable controllers
invasive software
pubcrawl
real-time operation
Smart Systems
supply chain attack
supply chain security
supply chain threats
supply chains
threat vectors
Trojan horses
embedded systems
attack vector
computer security
Air gaps
CPU performance
cyber domain
Data Exfiltration
device tree
direct memory access
DMA transfer speed
anomaly detection techniques
Embedded Systems Security
firmware
firmware modification
firmware trojan
Hardware
industrial control
Industrial Control Systems
industrial domain
industrial Internet-of-Things
biblio
CFI: Control Flow Integrity or Control Flow Interruption?
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
return oriented programming
malicious code injection
modern Code Reuse Attacks
Monitoring
object-oriented programming
Payloads
programming
pubcrawl
Resiliency
Libraries
return-oriented programming
Runtime
runtime attacks
runtime memory vulnerabilities
Scalability
security of data
target system
rop attacks
Jump-Oriented Programming
interrupt requests
Human Factors
famous attack paradigms
execution flow
data flow analysis
data execution prevention
corrupt code pointers
control-flow integrity
Control Flow Integrity
computer security
composability
CFI-based defenses
CFI solutions
C++ languages
biblio
Construction of Cyber Range Network Security Indication System Based on Deep Learning
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
machine learning
Viruses (medical)
situational awareness
Resiliency
resilience
relevant network security situation assessment algorithms
quantitative evaluation
qualitative evaluation
pubcrawl
neural network
network security
Metrics
advanced artificial intelligence deep learning technology
learning (artificial intelligence)
Indication System
deep learning
Cyberspace
cyber range network security indication system
cyber range
computer security
computer network security
composability
Artificial Intelligence
biblio
Privacy and Security of Connected Vehicles in Intelligent Transportation System
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
Intelligent Transportation System
sensory data
security scalability
Scalability
Roads
road vehicles
road traffic control
road side unit
pubcrawl
privacy issues
privacy
permutation
mobile computing
Compositionality
intelligent transportation
group members
group leader
encryption
data streams
Data Security
data privacy
data confidentiality
Cryptography
connected vehicles
computer security
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »