Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversary model
biblio
Cyber-Resilience Evaluation of Cyber-Physical Systems
Submitted by grigby1 on Tue, 05/25/2021 - 2:50pm
Measurement
sensors
Sensor Systems
Resiliency
resilience
pubcrawl
process control
networked control systems
Metrics
actuator saturation
Mathematical model
Cyber-Resilience
cyber-physical security
cyber physical systems
critical infrastructures
CPS resilience
adversary model
actuators
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
A Vehicle Trajectory Adversary Model Based on VLPR Data
Submitted by aekwall on Mon, 08/03/2020 - 9:38am
traffic engineering computing
qualified identifier attributes
Resiliency
road average speed
road traffic
road vehicles
Roads
Scalability
target trajectory
pubcrawl
Trajectory
trajectory linking
vehicle information
vehicle license plate recognition data
vehicle suspicion list
vehicle trajectory adversary model
VLPR system
image recognition
Adversary Modeling
Adversary Models
closest time method
Data models
data privacy
desensitized VLPR data
Foshan City VLPR data
Human behavior
adversary model
ITS
Licenses
Metrics
privacy
privacy attacking method
privacy disclosure
privacy protection
biblio
A multi-modelling based approach to assessing the security of smart buildings
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
methodology
ubiquitous computing
system components
smart buildings
simulations
security of data
Resiliency
resilience
pubcrawl
physical attacks
multimodelling based approach
multimodel methodology
Metrics
Access Control
man-in-the-middle attacks
INTO-CPS tool chain
home automation
Fans
fan coil unit
cyber-physical systems
critical services
CPS modeling
composability
co-simulation
building management systems
adversary model
biblio
Universally Composable RFID Mutual Authentication
Submitted by grigby1 on Wed, 05/30/2018 - 2:55pm
security notion
public key update protocols
radiofrequency identification
readers corruptions
Resiliency
RFID Authentication
RFID mutual authentication protocols
RFID tags
Scalability
public key infrastructure
tags corruptions
trusted certificates
trusted cryptographic protocols
trusted third parties
universal composability
universally composable framework
zero-knowledge privacy model
adversary model
public key encryption
public key cryptography
Public key
pubcrawl
Protocols
privacy
PKI Trust Models
Metrics
message authentication code
Human Factors
Human behavior
Cryptographic Protocols
cryptographic protocol
authentication
arbitrary environment