Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructures
biblio
Current efforts in ports and supply chains risk assessment
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
pubcrawl170112
supply chains
supply chain risk assessment
supply chain partners
Supply Chain
standards
security of data
security
sea ports
risk management
risk assessment
CII
Ports (Computers)
port service risk assessment
physical /cyber security
maritime supply chain processes
Marine vehicles
marine engineering
goods dispatch data processing
critical infrastructures
critical information infrastructures
complex interrelated ICT systems
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
biblio
Identifying digital threats in a hacker web forum
Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
Discussion forums
Social network services
sentiment analysis tool
sentiment analysis
query processing
pubcrawl170109
parts of speech tagger
natural language processing
malicious hackers
internet
HTML
Hacking
hacker Web forum
hacker language analysis
discussion posts
automated analysis tools
digital threat identification
Databases
data systems
data querying
Data mining
cyber-attacks
customized Web-crawler
critical infrastructures
critical infrastructure
critical computer networks
Computer hacking
Computer crime
communication platform
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
biblio
"WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns"
Submitted by abfox on Tue, 02/14/2017 - 1:37pm
Markov Models
WAP
Topology
system survivability
Survivability
Steady-state
soft impacts
security community
security
scanning nodes
rejuvenation
quarantine
pubcrawl170101
probability
network topology
Mathematical model
advanced persistent threat
malware infections
malware
invasive software
infection probability
four-node topology
false positives
false negatives
early malware detection
critical infrastructures
critical infrastructure sectors
Critical Infrastructure Protection
coordinated massive malware campaign assessment
contagion probability
Analytical models
advanced persistent threats
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
biblio
Big data analysis system concept for detecting unknown attacks
Submitted by BrandonB on Wed, 05/06/2015 - 10:41am
future attack detection
unknown attack detection
state agencies
service destruction
security systems
security
prevention system
personal information leakage
pattern matching methods
Monitoring
large-scale system attacks
Intrusion Detection
information management
information extraction
hacking attacks
advanced persistent threat detection
detection rate
defence technologies
Data storage systems
Data models
Data mining
data handling
cyber-attacks
critical infrastructures
Computer crime
Big Data analysis techniques
Big Data analysis system
Big Data
APT detection
Alarm systems
biblio
Unified multi-critical infrastructure communication architecture
Submitted by BrandonB on Tue, 05/05/2015 - 12:38pm
Interdependency
unified multicritical infrastructure communication architecture
Subscriptions
situational awareness
security
quality of service
Publish/Subscribe
private sector
Monitoring
interdependent infrastructure nodes
communication model
information sharing
information network
information management
government sector
Data models
critical infrastructures
critical infrastructure
computer network reliability
biblio
Monitoring Security Compliance of Critical Processes
Submitted by BrandonB on Tue, 05/05/2015 - 10:20am
predictive security analysis
security policies
security monitoring
security modeling and simulation
security information and event management
security compliance
security
Runtime
process-aware information systems
process specifications
process behavior model
process behavior analysis
automata
Predictive models
power system security
operational formal models
Monitoring
model-based support
hydroelectric power stations
hydroelectric power plant
critical processes
critical infrastructures
Computational modeling
Business
biblio
Risk analysis of GPS-dependent critical infrastructure system of systems
Submitted by BrandonB on Fri, 05/01/2015 - 7:44am
phasor measurement
US electric grid
US Department of Homeland Security
systems engineering
system of systems
sos
SmartGrid initiative
SmartGrid
smart power grids
risk management
risk analysis methodology
risk analysis
PMU
Phasor measurement units
Clocks
modeling
GPS-dependent critical infrastructure system
GPS-dependent CI sectors
GPS timing
GPS
Global Positioning System
electricity-dependent critical infrastructure sectors
electricity subsector
electricity
electric phasor measurement units
Department of Energy
critical infrastructures
critical infrastructure
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »