Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerability mining
biblio
Research on Security Vulnerability Mining Technology for Terminals of Electric Power Internet of Things
Submitted by grigby1 on Fri, 02/03/2023 - 3:41pm
fuzzing
power
IoT terminal
firmware security
power grid vulnerability analysis
mechatronics
power systems
vulnerability mining
Fuzz Testing
Internet of Things
static analysis
composability
process control
Resiliency
resilience
Metrics
pubcrawl
security
biblio
An Android Application Vulnerability Mining Method Based On Static and Dynamic Analysis
Submitted by aekwall on Fri, 08/12/2022 - 4:08pm
security
tools
feature extraction
Resiliency
Human behavior
Data mining
static analysis
pubcrawl
dynamic analysis
Android app
Androids
Humanoid robots
vulnerability mining
composabiity
biblio
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
Protocols
learning (artificial intelligence)
Local area networks
modern industrial control systems
Policy Based Governance
policy-based governance
privacy
protocol frame structures
protocol frames
protocol verification
Industrial Safety
pubcrawl
security
security checks
security vulnerabilities
self learning
SeqFuzzer
stateful protocols
target protocol
vulnerability mining
deep learning perspective
composability
Compositionality
computer architecture
computer network security
Control Automation Technology devices
Data models
Decoding
deep learning
deep learning model
collaboration
EtherCAT
Fuzz Testing
fuzzing
fuzzing framework
industrial communication processes
industrial communication protocols
industrial network
industrial protocol fuzzing framework
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
biblio
Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
program testing
vulnerability mining
test efficiency
taint analysis technology
taint analysis
Software
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
component
Microprogramming
integrated circuits
Industrial Control Systems
industrial control system device firmware vulnerability mining technology
industrial control system
industrial control
Hardware
fuzzing test
firmware
device firmware
Data mining