Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Motif-Based Analysis of Power Grid Robustness under Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 11:29am
network motifs
Topology
tools
subgraphs
Robustness
Resiliency
resilience
pubcrawl
power systems
power system networks
Power system dynamics
power system classification
power grids
power grid vulnerability analysis
power grid system
node degree distribution
building blocks
motifs
Motif-based analysis
Metrics
Measurement
local topological properties
local network structure
local dynamics
global network topology
fragility analysis
Europe
Compositionality
composability
complex networks
complex network
biblio
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
security
least privilege tailored configurations
multiple web browsers
online front-ends
Organizations
Phishing
Plugin-based attacks
pubcrawl
Resiliency
Scalability
Secure Configuration
least privilege browser hardening
Security by Default
security of data
Servers
tools
un-trusted sites
Vegetation
web browser hardening
Web browsers
Web sites
Windows-based enterprise
enforced configuration
Browsers
business data processing
classic client desktop infrastructure
Computers
critical enterprise sites
critical trusted websites
cyber-compromise
Cybersecurity
data breaches
default configurations
attack avenues
enterprise-level hardening
enterprise-wide strategy
Google Chrome
Hardening
high-granularity tailored configurations
internet
Internet Explorer
JavaScript attacks
least privilege
biblio
Assessing Software Supply Chain Risk Using Public Data
Submitted by grigby1 on Tue, 05/01/2018 - 10:35am
software supply chain risk assessment
Robustness
safety-critical software
Scalability
secure networking library
security
security of data
sigmoid cumulative vulnerability discovery function
Software
risk management
software vulnerability discovery
supply chain management
supply chain risk
supply chain security
supply chains
temporary plateau feature
tools
vulnerability discovery
open source project
AML
commercial government organizations
cumulative vulnerability discovery plot
cybersecurity risk
Databases
Human behavior
national vulnerability database
NVD
Alhazmi-Malaiya Logistic model
open version control data
OpenSSL
Predictive models
pubcrawl
public data
resilience
Resiliency
biblio
A Method of Cyber Security Vulnerability Test for the DPPS and PMAS Test-Bed
Submitted by grigby1 on Wed, 04/11/2018 - 1:49pm
operating nuclear plant control system
vulnerability scanning tool
Vulnerability
tools
threat vectors
test-bed
security of data
pubcrawl
privacy
PMAS test-bed
Plant Monitoring Annunciator System (PMAS)
Application software
Monitoring
Metrics
maintenance engineering
DPPS test-bed
Digital Plant Protection System (DPPS)
cyber security vulnerability test
cyber security evaluation process
cyber security
control systems
computer security
biblio
MalFire: Malware firewall for malicious content detection and protection
Submitted by K_Hooper on Wed, 04/04/2018 - 9:00am
malicious content protection
Web servers
vulnerability detection
user data security
user data privacy
tools
sensitive information
security
Resiliency
pubcrawl
privacy
online portion
Metrics
malware injection
malware firewall
malware
ad blocking tool
malicious content detection
MalFire
IP networks
invasive software
internet
Human behavior
firewalls
data privacy
Content Injection
contemporary threats
Compositionality
Companies
adware injection
adware content
Adware
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing
Submitted by K_Hooper on Wed, 04/04/2018 - 8:58am
program testing
vulnerability detection tools
vulnerability detection
tools
test case generation
Symbolic Execution
Software Vulnerability
software tools
semisymbolic fuzz testing
Resiliency
pubcrawl
Prototypes
Binary Analysis
path explosion
Metrics
low frequency input
Human behavior
hard-to-reach vulnerabilities
fuzzy set theory
Fuzz Testing
fuzzing
Explosions
Computer bugs
Compositionality
biblio
Vulnerability detection with deep learning
Submitted by K_Hooper on Wed, 04/04/2018 - 8:58am
Compositionality
convolution
convolution neural network
deep learning
Human behavior
long short term memory
machine learning
Metrics
Neural networks
pubcrawl
Resiliency
Software
Task Analysis
tools
Training
vulnerability detection
biblio
Cyber-attack detection in the networked control system with faulty plant
Submitted by K_Hooper on Wed, 04/04/2018 - 8:52am
networked control systems
Underwater vehicles
Underwater Networks
Trajectory
tools
standards
security
Scalability
ROV
Resiliency
remotely operated underwater vehicle
pubcrawl
predictive control
Adaptation models
Networked Control System
Metrics
mathematical framework
intelligent generalized predictive controller
intelligent control
IGPC
faulty plant
fault-tolerant ability
fault tolerant control
fault accommodation technique
cyber-attack detection
autonomous underwater vehicles
biblio
Security Analysis of Bluetooth Low Energy Based Smart Wristbands
Submitted by grigby1 on Mon, 04/02/2018 - 11:54am
replay attacks
wearables security
Wearable devices
wearable computers
Trade agreements
tools
smart wristbands
smart wristband
smart watch
security of data
security
Scalability
Resiliency
resilience
Android software application
pubcrawl
privacy
mobile computing
man-in-the-middle attacks
Human behavior
Heart rate
Denial of Service attacks
brute-force attacks
bluetooth low energy
Bluetooth
Biomedical monitoring
batteries
« first
‹ previous
…
51
52
53
54
55
56
57
58
59
…
next ›
last »