Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Assessment
biblio
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 10:52am
information technology network
Scalability
risk quantification
Resiliency
resilience
pubcrawl
production engineering computing
Production
operational technology systems
maintenance engineering
maintenance
Local area networks
Intrusion Detection Systems
Intrusion Detection
integrated circuits
anomaly-based intrusion detection configurations
Industrial Control Systems
industrial control
ICS Anomaly Detection
ICs
Government
full-scale ICS test bed
Ethernet based interconnections
Electronic mail
cost reduction
control engineering computing
computer network security
Assessment
anomaly-based network IDS settings
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 11:30am
secure code
web applications
Web application
vulnerabilities
trustworthiness assessment
trustworthiness
software security
software quality
security vulnerabilities
security perspective
security of data
Assessment
quality model
pubcrawl
internet
input validation practices
input validation coding practices
feasible security practices results
composability
coding practices
assessment techniques
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by aekwall on Mon, 07/01/2019 - 9:12am
CVSS-metric
vulnerability Similarity Measure
vulnerabilities
VSM
VACC
threats
Security Metrics
pubcrawl
Protocols
probability
network security tools
Network
Monitoring
Metrics
Measurement
analysis
CVSS metric-based VACC
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
computer-based networks
computer security
computer science
computer networks
computer network threats
computer network security vulnerabilities
computer network security
common vulnerability scoring system metric-based technique
CNSVT
classification
Assessment
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 9:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
biblio
The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 11:48am
Elliptic curves
Supercomputers
RSA algorithm
Resistance
Resiliency
resilience
pubcrawl
Metrics
method
Human behavior
GOST R 34.10-2001 algorithm
encryption
Algorithm design and analysis
durability
Cryptography
cryptographic strength
computer technology
Compositionality
Clustering algorithms
asymmetric encryption algorithms
asymmetric encryption algorithm
Asymmetric Encryption
Assessment
biblio
Designing agility and resilience into embedded systems
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
computer security
high level system properties
Global Positioning System
embedded systems
design for cyber security
cyber-physical systems
cyber security
cyber resilience
CPS
Measurement
best-practice security policies
autonomous aerial vehicles
attacker
attack surface
Assessment
ARES methodology
analytic process guides system developers
adversarial actors
resilience
UAS
Systems architecture
systems analysis
system analysis and design
security of data
RF environment
Resilient Security Architectures
Resiliency
unmanned aerial systems
remotely located communicating devices
pubcrawl
mission success
mission objectives
mission assurance a challenging problem
Mission Assurance
Metrics
metric set
profile
Hamed Okhravi
Resilient Systems
Science of Security
Simulation
Validation and Verification
Assessment
Hypothesis testing
Science of Security
Security Evaluation
Systems Security
Massachusetts
« first
‹ previous
1
2