Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
file
Cyber-Physical System Security for Advanced Manufacturing
Submitted by el_wehby on Mon, 09/05/2016 - 2:57pm
CPS Domains
Critical Manufacturing Sector
Critical Infrastructure
Manufacturing
CPS Security
optimization
security
2015 CPS PI MTG Videos, Posters, and Abstracts
profile
Sangyoon Min
Agriculture
Architectures
CPS Domains
Architectures
Consumer
Composition
Design Automation Tools
Communication
Concurrency and Timing
Embedded Software
Defense
Control
Platforms
Systems Engineering
Modeling
Energy
Wireless Sensing and Actuation
Critical Infrastructure
Real-Time Coordination
Health Care
Resilient Systems
Science of System Integration
Manufacturing
Science of Security
Robotics
Transportation
Simulation
Validation and Verification
CPS Technologies
Education
Foundations
Science Policy
Research Program Overview
Software Sefety
security
dependable systems
software engineenring
IEC 61508
ISO 26262
file
p126-zielinska.pdf
Submitted by drwright on Fri, 07/01/2016 - 12:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
biblio
The Persuasive Phish: Examining the Social Psychological Principles Hidden in Phishing Emails
Submitted by drwright on Fri, 07/01/2016 - 12:34pm
Email
persuasion
Phishing
security
social engineering
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
Warning of Phishing Attacks, Supporting Human Information Processing, Identifying Phishin Deception Indicators, and Reducing Vulnerability
file
Model Based Approach for Assuring Safety of Human-CPS Interactions?
Submitted by Insup Lee on Mon, 05/16/2016 - 11:47am. Contributors:
Lu Feng
Oleg Sokolsky
Modeling
Foundations
CPS Safety
human in the loop
security
University of Pennsylvania
2016
Academia
Presentation
Presentations
profile
Mehran Alidoost Nia
Secure Control Systems
Communication
Real-time Systems
Energy
Modeling
Science of Security
communications and networking
cyber-physical systems
Energy Efficiency
green computing
security
biblio
Enhancing security of Hadoop in a public cloud
Submitted by drwright on Wed, 05/04/2016 - 8:07am
internal cloud attacks
Vulnerability and Resilience Prediction Models
Virtual machine monitors
SEHadoop
security enhancement
security
resilience
public cloud
parallel processing
overloaded authentication key
least access privilege
lack of fine-grained access control
Access Control
Hadoop security mechanism
fine-grained access control
Data processing
data access
Containers
compromise resilience
Cloud Computing
authorisation
authentication key
authentication
project
CPS: Synergy: Collaborative Research: Cyber-Physical Approaches to Advanced Manufacturing Security
Submitted by jules on Mon, 04/25/2016 - 5:30pm
Project Details
Institution(s):
Vanderbilt University
Sponsor Award URL:
http://www.nsf.gov/awardsearch/showAward?AWD_ID=1446304&HistoricalAwards=false
CPS Domains
Critical Manufacturing Sector
Critical Infrastructure
Manufacturing
optimization
security
project
Synergy: Collaborative: Security and Privacy-Aware Cyber-Physical Systems
Submitted by kgshin@eecs.umich... on Mon, 04/25/2016 - 1:10pm
Project Details
Institution(s):
University of Michigan Ann Arbor
Sponsor Award URL:
http://www.nsf.gov/awardsearch/showAward?AWD_ID=1505785&HistoricalAwards=false
CPS Domains
Automotive
Control
Wireless Sensing and Actuation
Health Care
Transportation
CPS Technologies
Education
Foundations
CPS Privacy
Internet of Things (IoT)
security
biblio
Mining Software Component Interactions to Detect Security Threats at the Architectural Level
Submitted by Jamie Presken on Mon, 04/25/2016 - 11:07am
Apr'16
CMU
Data mining
security
Software Architecture
CMU
Apr'16
« first
‹ previous
…
411
412
413
414
415
416
417
418
419
…
next ›
last »