Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
impact
biblio
Metrics for Assessing Security of System-on-Chip
Submitted by grigby1 on Thu, 01/05/2023 - 5:39pm
pubcrawl
Metrics
Hardware
Benchmark testing
side-channel attacks
Measurement
Vulnerability
Systematics
supply chains
SoC
threat
mathematical models
impact
supply chain risk assessment
biblio
Understanding the impact of cyber-physical correlation on security analysis of Cyber-Physical Systems
Submitted by grigby1 on Thu, 10/20/2022 - 3:37pm
Physical layer
interdependence
impact
Stochastic game
Costs
Resiliency
Stochastic Computing Security
q-learning
cyber-physical system
pubcrawl
simulation
Games
Security analysis
Stochastic processes
Scalability
Correlation
resilience
biblio
Impact of Blockchain Delay on Grid-Tied Solar Inverter Performance
Submitted by grigby1 on Fri, 08/26/2022 - 1:21pm
Complexity theory
grid-tied inverter
impact
blockchains
Control Theory
delay
Human Factors
optimal control
Reactive power
Inverters
blockchain
control systems
real-time systems
delays
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Pragmatic Analysis of Pre- and Post-Quantum Cyber Security Scenarios
Submitted by grigby1 on Thu, 07/14/2022 - 3:42pm
Pragmatics
quantum computing security
technologies
quantum
problems
Oppel-2
Oppel-1
impact
cyber
Cryptic
information security
Market research
Resistance
Qubit
quantum computing
Computer crime
Cryptography
Scalability
security
pubcrawl
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
Metrics
Vulnerability
SIEM logs
security of data
Security Metrics
security assessment
security
Risk
pubcrawl
network flow
Network
Attack Circuit
IoT network security
IoT device security
Internet of Things
impact
graph theory
Exploitability
Computing Theory
attack graphs
attack graph
biblio
Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
neural network
wavelet transforms
wavelet transform
unauthorized external influences
signal processing security
security of data
security management process
Resiliency
pubcrawl
privacy
Neural networks
Dynamical Systems
neural nets
Metrics
mathematical modeling
information system
impact
dynamic analysis
conflict
composability
adaptive response unit
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks