Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security requirement
biblio
Automatic Security Inspection Framework for Trustworthy Supply Chain
Submitted by grigby1 on Wed, 08/03/2022 - 4:13pm
security
pubcrawl
composability
trustworthiness
software engineering
Technological innovation
security requirement
supply chains
usability
Inspection
Supply Chain
Conformance Validation
Security Inspection
biblio
Ontology-Driven Security Requirements Recommendation for APT Attack
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Advanced Persistent Threat (APT)
system domain knowledge
security requirement
ontology-driven security requirements recommendation
ontology knowledge base
Ontology
knowledge base
general security knowledge ontology
domain-specific knowledge ontology
APT ontology
advanced persistent threat
recommender systems
cyber threats
Human Factors
APT attack
ontologies (artificial intelligence)
pubcrawl
Resiliency
Scalability
security of data
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality