Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mitigation strategies
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 9:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
A virtual laboratory approach for risk assessment of aerospace electronics trust techniques
Submitted by grigby1 on Mon, 12/03/2018 - 12:51pm
supply chain management
pubcrawl
Reliability
resilience
Resiliency
risk management
Scalability
semiconductor technologies
space vehicle electronics
procurement path
supply chain risk
supply chain risk assessment
supply chains
testing
trusted procurement options
US Department of Defense
virtual instrumentation
virtual laboratory approach
faulty component risk
aerospace electronic component risk assessment methodology
aerospace electronics trust techniques
aerospace testing
component criticality risk tolerance
component testing
Consumer electronics
counterfeit mitigation calculations
counterfeit risk
actionable decision data
Logistics
Metrics
microelectronics trust assurance
mitigation strategies
nontrusted procurement options
optimal test
part reliability
Procurement
biblio
Heuristics-based approach for identifying critical N \#x2014; k contingencies in power systems
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
Power system protection
system operators
system failure
standards
standard IEEE-14 bus system
Security Heuristics
Scalability
Resiliency
Resilience.
reliable operation
pubcrawl
Prediction algorithms
power system transient stability
power system stability
power system security
power system reliability
Algorithm design and analysis
power system identification
power system faults
possible critical N - k contingencies
N—k contingency analysis
multiple critical N-k contingencies
mitigation strategies
IEEE-57 bus system
IEEE-39 bus system
Heuristic algorithms
electrical power systems
dangerous contingency
critical contingencies
Cascading Failures
blackouts
biblio
Discovering and Mitigating New Attack Paths Using Graphical Security Models
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
resilience
zero-day vulnerabilities
Virtual private networks
UV-RAM
Universal Serial Bus
unified vulnerability risk analysis module
system components
Servers
security of data
Security analysis
security
risk analysis
Resiliency
Analytical models
pubcrawl
new attack path mitigation
new attack path discovery
network hardening
modern networked systems
mitigation strategies
Metrics
graphical security models
Databases
composability
attack graphs