Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructures
biblio
An overview of cyber-attack vectors on SCADA systems
Submitted by aekwall on Wed, 02/13/2019 - 12:00pm
pubcrawl
transport protocols
TCP/IP based protocols
supervisory control and data acquisition systems
Software
security of data
security
Scalability
SCADA systems
SCADA
Resiliency
Attack vectors
Protocols
Monitoring
Industrial Control Systems
Human behavior
cyber-attack vectors
cyber-attack
critical infrastructures
critical infrastructure
Buffer overflows
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
Internet of Things
Transportation
security of data
security economics
security
resilient IIoT systems
Resiliency
resilience
Redundancy
pubcrawl
production engineering computing
Metrics
Investment
actuator security
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
Human behavior
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
composability
actuators
biblio
Toward a Sensor Trustworthiness Measure for Grid-Connected IoT-Enabled Smart Cities
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
situational awareness
pubcrawl
resilience
Resiliency
security
Security Metrics
security of data
sensor trustworthiness measure
sensor verification
power systems
smart cities
Smart Grid Sensors
Smart Grids
smart power grids
Trusted Computing
trustworthy power generation
wireless sensor networks
Human behavior
bulk power systems
Compositionality
critical infrastructures
cyber physical systems
cyber-physical modeling
cyber-physical systems
grid-connected IoT-enabled smart cities
Hardware
Analytical models
Human Factors
Internet of Things
large-scale critical infrastructure systems security
malevolent IoT devices
Perturbation methods
power engineering computing
power system security
biblio
Domain-Specific Requirements Elicitation for Socio- Technical System-of-Systems
Submitted by Katie Dey on Sun, 09/30/2018 - 11:32am
domain specific characteristics
RAM
EAM
Requirements
interoperability
system of systems
e-Navigation
energy domain
MAF
SGAM
interoperability perspectives
architecture management approaches
critical infrastructures
domain-specific aspects
standardized elicitation
system architectures
system-of-system engineering efforts
maritime domain
complex infrastructures
socio- technical system-of-systems
domain-specific requirements elicitation
smart power grids
power engineering computing
open systems
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
security management
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
Industrial Control Systems
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
Databases
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
control systems
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
biblio
Run-Time Attack Detection in Cryptographic APIs
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
proof-of-concept log analysis tool
Wrapping
tools
standards
sensitive cryptographic keys
security of data
security API
run-time attack detection
Resiliency
resilience
pubcrawl
Proposals
APIs
PKCS\#11
Monitoring
key-management attacks
key security
financial infrastructures
Cryptography
cryptographic services
cryptographic API
critical infrastructures
Compositionality
application program interfaces
biblio
A Factored MDP Approach to Optimal Mechanism Design for Resilient Large-Scale Interdependent Critical Infrastructures
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Linear programming
state spaces
security enhancement
Scalability
Resiliency
resilience
pubcrawl
power system security
power system reliability
power grids
optimal resiliency mechanism design
network theory (graphs)
network resilience
Metrics
Markov processes
Markov Decision Processes
action spaces
large-scale interdependent system
large-scale interdependent critical infrastructures
Human Factors
Human behavior
factored MDP approach
decision theory
cyber-physical dependencies
Cyber Dependencies
critical infrastructures
Control Theory
Compositionality
Cascading Failures
approximation theory
approximate linear programming
biblio
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
SCADA network cyber-attacks
machine learning
Metrics
production engineering computing
pubcrawl
Resiliency
risk assessment
risk management
SCADA network
Logic gates
SCADA security risk assessment
SCADA systems
SCADA Systems Security
Scalability
security
security risk level
supervisory control and data acquisition
Damage Assessment
learning (artificial intelligence)
industrial systems
industrial facilities
incremental learning
Human behavior
cyber-security risk assessment model
Cyber-security
critical infrastructures
computer network security
Communications technology
belief networks
Bayesian network
Bayes methods
artificial intelligence security
Adaptation models
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
Lateral Thinking for Trustworthy Apps
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
pubcrawl
Trustworthy Systems
trustworthy apps
Trusted Computing
trusted component ecosystem
Substrates
security technologies
security of data
Secure System Design
Resiliency
composability
lateral thinking
Kernel
Isolation technology
Hardware
cyber physical systems
Cryptography
critical infrastructures
critical infrastructure
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »