Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vulnerability
biblio
Analysis of Cyber-Physical Security in Electric Smart Grid : Survey and challenges
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
cyber-physical system
power engineering computing
Smart Grids
Human Factors
attack motivation
CPS
Meters
security model
ICT
Smart Grid
communication system
defence
electric smart grid
information and communication technology
privacy issue
security concern
CPS Privacy
Monitoring
cyber physical systems
smart power grids
privacy
cyber-physical security
Reliability
Vulnerability
pubcrawl
Human behavior
cyber-physical systems
SCADA systems
SCADA
security
privacy concerns
data privacy
architecture
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Ontology
Vulnerability
security risk model
security of data
security
pubcrawl
power terminal device
power system stability
power system security
power IoT terminal device
power grids
power engineering computing
operating systems
ontology-based knowledge representation method
ontology based security risk model
APT attack
ontologies (artificial intelligence)
Ontologies
networked power terminal equipment oriented cyberspace security
network attack
Knowledge representation
IoT based technology
Internet of Things
Hardware
electric power IoT
Cryptography
computational intelligence
Compositionality
composability
APT security attack
biblio
Protecting Data in Android External Data Storage
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
storage management
android encryption
secure Android data storage
proactive-control
Permission
malicious malware
external-storage
Android external storage vulnerability
Android external data storage
Metrics
Memory
Android (operating system)
Monitoring
smart phones
Vulnerability
Data protection
Computer hacking
pubcrawl
Human behavior
Resiliency
mobile computing
invasive software
encryption
Scalability
biblio
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
patch management
Vulnerability
tools
Standards organizations
security-related configuration settings
security of data
security content automation protocol
security configurations monitoring
security baseline
security automation
SCAP
Resiliency
pubcrawl
policy compliance
Apple iOS
Organizations
organization
Monitoring
Metrics
iOS Security
iOS (operating system)
information security management tasks
Human Factors
Compositionality
Compliance
automation
automated security configuration checklist
Apple iOS device configuration
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
Critical Aspects Pertaining Security of IoT Application Level Software Systems
Submitted by aekwall on Mon, 06/01/2020 - 10:47am
middleware security
Vulnerability
standards
Software systems
software security
security of data
security
Resiliency
resilience
pubcrawl
Protocols
privacy issues
policy-based governance
application level software systems
middleware
IoT devices
IoT
Internet of Things security
Internet of Things
Insecure Software/Firmware
insecure software
Insecure Interfaces
data privacy
Constrained Application Protocol
composability
CoAP
biblio
A New Metric to Quantify the Vulnerability of Power Grids
Submitted by grigby1 on Fri, 04/24/2020 - 4:38pm
Matrices
DC load flow
electrical equations
grid geometry
Hybrid topological model
IEEE 118-bus system
industrial software
load distribution
load-flow equations
blackout
Network capacity reserve metric
power blackouts
power generators
power systems
topological indicators
vulnerability lines
Power Grid Vulnerability Assessment
pubcrawl
Load flow
Cascading Failures
network theory (graphs)
complex network theory
power system reliability
failure analysis
Measurement
Metrics
power grids
composability
Vulnerability
Mathematical model
Generators
Resiliency
resilience
biblio
From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures
Submitted by grigby1 on Fri, 04/17/2020 - 11:29am
microsoft windows
Windows Operating System Security
vulnerability statistics
vulnerability databases
Vulnerability
security
Resiliency
resilience
pubcrawl
operating systems (OSs)
intrusion tolerance
Metrics
forever-day vulnerabilities
diversity
Days-of-grey-risk
Databases
Computer hacking
computer architecture
composability
biblio
A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Linear systems
zero vulnerability encrypted password
Vulnerability
security
Router Systems Security
router mechanism
Resiliency
resilience
pubcrawl
process control
Metrics
Mathematical model
Aerodynamics
internet
high-level security
encryption
Cryptography
convergence
control systems
computer network security
authorisation
authentication
Approximation error
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »