Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructures
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
Europe
Damage Assessment
protection of critical infrastructure
intergovernmental national views
informational space
information environment
cyber environment
critical infrastructure security
common cyberspace
air gap
critical information infrastructure
security
National security
Cyberspace
computer security
pubcrawl
Resiliency
information security
critical infrastructures
critical infrastructure
security of data
biblio
Network Coding for Critical Infrastructure Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
Predictive Metrics
store-and-forward paradigm
programmable networks
programmable data-planes
P4 ecosystem
linear network coding
linear NC functions
intermediate network
Critical Infrastructure Networks
atomic coding primitives
network topology
cyber physical systems
linear codes
network coding
encoding
telecommunication security
Payloads
software defined networking
telecommunication network topology
computer network
computer networks
delays
resilience
Decoding
composability
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
biblio
Real-Time SCADA Attack Detection by Means of Formal Methods
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
critical machines
Chemicals
programmable controllers
programmable logic controller
Clocks
formal methods
chemical manufacturing plants
chemical substances
control smart grid
Compositionality
real-time SCADA attack detection
SCADA control systems
SCADA water distribution system
timed automata
timed automaton
timed temporal logic
water supply
security
Semantics
SCADA Systems Security
automata theory
automata
Safety
Temporal Logic
model checking
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
critical infrastructures
critical infrastructure
security of data
biblio
Ship-to-Grid Integration: Environmental Mitigation and Critical Infrastructure Resilience
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
reverse cold ironing
marine power systems
Metrics
natural disasters
offshore installations
pollutant mitigation
Port of Kyllini
pubcrawl
resilience
Resiliency
Logistics
ship-to-grid
ship-to-grid integration
ship-to-shore interconnection
ships
Smart Grids
smart power grids
Technological innovation
threat mitigation
United States
Europe
alternative maritime power
architecture
Buildings
cold ironing
critical infrastructure resilience
critical infrastructures
diesel engines
disasters
environmental pollutants mitigation
air pollution control
European Union
Greece
grid-to-ship
GridLAB-D
GridLAB-D software
Human behavior
Human Factors
humanitarian relief
biblio
Early Hybrid Safety and Security Risk Assessment Based on Interdisciplinary Dependency Models
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
security risks
risk analysis
risk management
Safety
safety assessment
security
security assessment
security design weaknesses
security risk assessment
Resiliency
security weaknesses
social reasons
Software
system complexity
system operation
tools
Unified modeling language
complex critical infrastructures
resilience
pubcrawl
policy-based governance
modeling
Model driven engineering
Metrics
interdisciplinary interactions
interdisciplinary dependency models
hybrid safety
Human behavior
fault trees
environmental reasons
economic reasons
Design Process
critical infrastructures
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
biblio
Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
security goals
power engineering computing
power system security
privacy
pubcrawl
RAMI 4.0
Reference Model of I Information Assurance and Security
risk analysis
RMIAS
Scalability
Metrics
security of data
security-by-design
Smart Grid evolution
smart grid security
Smart Grids
smart power grids
sophisticated engineering practices
standards
surplus energy
distributed energy resources
Resiliency
adequate security countermeasures
architecture
architecture-based approach
computer architecture
computer security
control infrastructure
critical infrastructure
critical infrastructures
Resilient Security Architectures
distributed power generation
distributed system
distribution system operators
Energy Distribution Grids
Enterprise Architecture
Europe
grid gatekeepers
methodology
biblio
A Symptomatic Framework to Predict the Risk of Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Insider Threat Scoring Engine (ITSE)
collaboration
Critical assets
critical infrastructure
critical infrastructure organisation
critical infrastructures
Engines
Human behavior
information security
information security threats
insider threat
insider threat events
insider threat framework for Namibia critical infrastructure organization
tools
Interviews
ITFNACIO
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security of data
symptomatic analysis
Symptomatic Analysis (SA)
symptomatic insider threat risk assessment framework
biblio
Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
natural gas technology
while broad scenarios
smart port
smart offshore oil
smart airport
security threats
security of data
security issues
security
sea ports
Scalability
Resiliency
pubcrawl
oil technology
offshore installations
Airports
multiaccess edge computing paradigms
IoT devices
Internet of Things
general security requirements
gas extraction field
Fog Computing and Security
Fog computing
FMEC solutions
edge computing
critical infrastructures
communication technologies
Cloud Computing
CI
biblio
Deterring Strategic Cyberattack
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
collateral damage control
nuclear regime
nuclear deterrence versus cyber deterrence
nuclear deterrence
legal norm
international agreement
government policies
cyberwar
cyberattack deterrence
cyber-dependent infrastructure
Critical Infrastructure Protection
comprehensive defense
security of data
Deterrence
Cyberspace
resilience
cyberattack
privacy
pubcrawl
Human behavior
critical infrastructures
cyber security
Scalability
Computer crime
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »