Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructure
biblio
Analytical Framework for National Cyber-Security and Corresponding Critical Infrastructure: A Pragmatistic Approach
Submitted by grigby1 on Thu, 09/16/2021 - 3:59pm
Analytical models
Compositionality
computational intelligence
Computational modeling
computer security
critical infrastructure
Metrics
national cyber-security
national cyber-security profiling
national threat modelling
pubcrawl
resilience
Resiliency
scientific computing
Scientific Computing Security
biblio
Vulnerability Assessment for ICS system Based on Zero-day Attack Graph
Submitted by grigby1 on Wed, 07/28/2021 - 8:46am
Metrics
zero-day
vulnerability assessment
unknown vulnerability
Security Metrics
security metric
security
risk management
pubcrawl
attack graph
Measurement
integrated circuits
ICs
critical infrastructure
Computing Theory
Buildings
automation
biblio
Cyber-Physical Architecture for Automated Responses (CyPhAAR) Using SDN in Adversarial OT Environments
Submitted by aekwall on Thu, 06/24/2021 - 11:54am
cyberattack
automated response
critical infrastructure
Resiliency
pubcrawl
composability
Automated Response Actions
Intrusion Detection
control systems
resilience
Microgrids
Aerospace electronics
Software Defined Networks
cyber feedback
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
A Stochastic Assessment of Attacks based on Continuous-Time Markov Chains
Submitted by grigby1 on Wed, 03/17/2021 - 12:40pm
probability
trees (mathematics)
Transient analysis
Time measurement
stochastic propagation times
Stochastic processes
stochastic methodology
stochastic assessment
Statistical performance evaluation
sequential attack
security of data
Scalability
Resiliency
resilience
pubcrawl
attack propagation
Petri nets
performance evaluation
Markov processes
individual attack occurrence probabilities
cyber-physical systems
Cyber-physical attack
critical infrastructures
critical infrastructure
continuous-time Markov chains
Conferences
concurrent attack
Chained Attacks
basic attack tree
attack trees
biblio
The Modbus Protocol Vulnerability Test in Industrial Control Systems
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
command injection attacks
composability
critical infrastructure
industrial control
Industrial Control System (ICS)
integrated circuits
Metrics
Modbus protocol
performance evaluation
Protocols
pubcrawl
resilience
Resiliency
security
Security test
virtual environments
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
Restricting Data Flows to Secure Against Remote Attack
Submitted by grigby1 on Mon, 01/25/2021 - 11:29am
network security
unidirectional security
Software Defined Node
software defined networking
security of data
security
SDN techniques
SDN
Resiliency
resilience
remote attacks
pubcrawl
one-way networks
one-way flows
Air gaps
Metrics
IT industry
Interiority
IEEE compliant PMU data streams
Human Factors
Human behavior
highly secure systems
fully securing networks
data flows
Data Diode
critical infrastructure
composability
air-gapped networks
biblio
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices
Submitted by grigby1 on Tue, 12/01/2020 - 4:35pm
Internet-scale insecurities
unsolicited IoT devices
unsolicited Internet-scale IoT devices
Smart homes
smart home appliances
Scalability
Resiliency
resilience
pubcrawl
Policy Based Governance
Metrics
IoT paradigm
IoT malicious raw data
IoT cyber security situational awareness
Internet-wide scanning
internet-scale unsolicited IoT devices inference
collaboration
Internet-scale Computing Security
Internet of Things
internet of malicious things
Internet frontier
Internet background radiation traffic
internet
Human Factors
Human behavior
Home appliances
electric industrial facilities
critical infrastructures
critical infrastructure
computer security
computer network security
composability
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »