Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
corporate network
biblio
The Cyber Attack on the Corporate Network Models Theoretical Aspects
Submitted by aekwall on Mon, 01/10/2022 - 12:49pm
attack implementation
attack graphs
weighted graph
network vulnerability
mathematical model parameters
Graphics
graph model of information attack
Filtering
cyber attack
corporate network
Cartesian product
Mathematical model
attack consequences assessment
Web servers
Predictive Metrics
cyberattack
Semantics
composability
Resiliency
pubcrawl
Protocols
biblio
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line
Submitted by aekwall on Mon, 01/25/2021 - 12:59pm
password
High-speed
corporate network
Asymmetric Encryption
elliptic curve
Ciphers
PLC
Elliptic curves
Public key
Servers
Metrics
Cryptography
composability
pubcrawl
Human behavior
Resiliency
Protocols
encryption
biblio
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features
Submitted by aekwall on Mon, 10/12/2020 - 11:46am
collective attack behavior
Human Behavior and Cybersecurity
unique attack models
intrusion alerts
ground truth data
empirical cyberattack models
empirical attack models
dynamic generation
dynamic Bayesian approach
Dynamic attack models
critical cyber incidents
critical activities
corporate network
competition data
cyberattack
2017 National Collegiate Penetration
automated system
Aggregates
belief networks
Indexes
Analytical models
Cybersecurity
pubcrawl
Human behavior
feature extraction
Bayes methods
IP networks
security of data
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread