Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructures
biblio
Trustworthy design architecture: Cyber-physical system
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
security patch updates
integrated circuits
physical characteristics
physical component
physically verifiable whitelists
pubcrawl
Resiliency
Resilient Security Architectures
Security Operations Center
Industries
Software
system dependencies
TDA
Trustworthy design architecture
Trustworthy Systems
unclonable digital identity
unique system engineering technique
whitelisted system
cyber identities
authentication
computer architecture
Computer crime
conceptual system engineering framework
conventional cyber defenses
costly functional impact tests
CPS
critical infrastructures
Cyber Dependencies
cyber risks
cyber-physical systems
cyber-physical traits
defense
digital characteristics
digital commands
digitally unclonable function
biblio
Threat awareness for critical infrastructures resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
Context
critical infrastructure resilience
critical infrastructures
Data protection
Europe
European utility company
integrated circuits
Market research
pubcrawl
public utilities
resilience
utility network protection
Resilient Security Architectures
security
Security Awareness
security of data
security risk
Smart Grids
social engineering
Software Architecture
threat awareness
threat awareness architecture
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
smart grid communications
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
port mutation
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
end-to-end IP-Hopping technique
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
attack complexity
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree
biblio
Autonomic computing meets SCADA security
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
architecture
Autonomic computing
Autonomic Security
computer architecture
computer security
critical infrastructures
Cyber Attacks
Handheld computers
machine learning
Metrics
pubcrawl
Resiliency
SCADA Security
SCADA systems
Scalability
Transportation
biblio
Cyber security risk management for health-based critical infrastructures
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
Metrics
Systems
security of data
security
secure recovery
Scientific Computing Security
risk management
Resiliency
recovery
pubcrawl
PhD project
Ontologies
modeling
Biological system modeling
Medical services
health-based critical infrastructures
health care critical infrastructures
health care
Health
cyber-physical systems
cyber-physical security
cyber-physical
critical infrastructures
computer security
Compositionality
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
biblio
The Honey Community: Use of Combined Organizational Data for Community Protection
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
Honey Pot
would-be attackers
US military infrastructure
US CYBERCOM
United States
security of data
security
pubcrawl170114
Ports (Computers)
organisational aspects
multiorganization concept
Monitoring
honeypots
honeynets
Cities and towns
honey net
honey community
Government
geographic boundary
fictitious community
DHS
Cyberdefense
cyber frontier
critical infrastructures
critical cyber infrastructure
community protection
Communities
combined organizational data
biblio
Impact analysis of transport capacity and food safety in Bogota
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
fruits
vehicle dynamics
vegetables
transport infrastructure
transport capacity
System Dynamics
supply chains
Supply Chain
pubcrawl170112
Production
meat
groceries
Bogota
food supply chain
food security impact
food safety policies
food safety
food
dairy
customer services
customer service improvement
critical infrastructures
Cities and towns
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »