Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Network Information Security Pipeline Based on Grey Relational Cluster and Neural Networks
Submitted by grigby1 on Mon, 01/10/2022 - 12:31pm
information science
Resiliency
resilience
pubcrawl
policy-based governance
Pipelines
Neural networks
Metrics
machine learning
Intrusion Detection
information security
Neural Network Security
information entropy
Grey Relational Cluster
Data mining
cyber physical systems
Computational modeling
Complexity theory
collaboration
Artificial Neural Networks
artificial neural network
biblio
The Zero Trust Security Platform for Data Trusteeship
Submitted by grigby1 on Tue, 12/21/2021 - 3:20pm
Indexes
zero trust
trusted platform modules
sensitivity analysis
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Peer-to-peer computing
information security
Acoustic Fingerprints
Human Factors
Human behavior
encryption
Computers
collaboration
Cloud Computing
ciphertext index
Ciphers
attribute-based encryption
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
Protocols
Zero day attacks
tools
℡NET
SSH
Safety
risk management
Resiliency
resilience
pubcrawl
composability
Particle measurements
Metrics
IP networks
information security
honeypot
defense
cyber attack
Cowrie
biblio
Communication and Information Security Assessment of a Digital Substation
Submitted by grigby1 on Mon, 11/29/2021 - 2:10pm
Manufacturing Message Specifications (MMS)
System recovery
Substations
substation automation
standards
Sampled Value (SV)
Resiliency
resilience
pubcrawl
communication security
Internet of Things
information security
IEC standards
IEC 62351
IEC 61850
Generic Object-Oriented Substation Events (GOOSE)
cyber security
Communications technology
biblio
Identification and Mitigation Tool For Cross-Site Request Forgery (CSRF)
Submitted by aekwall on Mon, 11/08/2021 - 3:16pm
information security
Organizations
tools
Conferences
pubcrawl
Metrics
Resiliency
Human behavior
Forgery
Cross-Site Request Forgery (CSRF)
vulnerability identification
Vulnerability Mitigation Introduction
Web application
threat mitigation
biblio
A TPCM-Based Trusted PXE Boot Method For Servers
Submitted by grigby1 on Mon, 11/08/2021 - 1:44pm
resilience
trusted startup
trusted platform modules
Trusted Platform Module
trusted platform control module
Trusted Computing
standards
Servers
security
Resiliency
pubcrawl
Publishing
Microprogramming
Linux
level measurement
information security
cyber physical systems
cyber physical security
composability
biblio
Security Analysis of Wireless Sensor Networks Using SIEM and Multi-Agent Approach
Submitted by grigby1 on Mon, 11/08/2021 - 1:33pm
multi-agent approach
artificial immune system
Artificial Intelligence
authentication
composability
Correlation
Human behavior
information security
Metrics
wireless sensor networks
pubcrawl
resilience
Resiliency
security
sensor security
Servers
SIEM
Wireless Sensor Network
biblio
Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium
Submitted by willirn1 on Tue, 10/26/2021 - 10:53am
3D printing
additive manufacturing
cyber-physical systems
Cybersecurity
Direct Digital Manufacturing
Industrial Control Systems
information security
biblio
Criticality Analysis Process Model: Prioritizing Systems and Components
Submitted by willirn1 on Tue, 10/26/2021 - 10:42am
Baseline criticality
criticality
criticality analysis
critical components
critical programs
critical systems
information security
prioritizing components
prioritizing programs
prioritizing systems
prioritization
privacy
biblio
Towards an Approach of Risk Analysis in Access Control
Submitted by grigby1 on Tue, 10/12/2021 - 4:22pm
Access Control
Cloud Computing
Human behavior
information security
Measurement
Medical services
Metrics
privacy
Privacy Policies
probability
pubcrawl
risk analysis
Scalability
security
taxonomy
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »