Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
modeling
biblio
Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks
Submitted by grigby1 on Mon, 04/03/2017 - 10:31am
Big Data
big data security
big data security metrics
Cyber-security
Experimentation
Metrics
modeling
moving target defenses
pubcrawl
Quantification
Security Metrics
Virtualization
biblio
Multi-representational Security Analysis
Submitted by grigby1 on Mon, 03/20/2017 - 9:46am
composability
Composition
modeling
pubcrawl
representation
security
verification
biblio
Global adversarial capability modeling
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Evaluating the complexity and impacts of attacks on cyber-physical systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
estimation theory
time-to-shutdown
Sensor phenomena and characterization
security risks
security of data
security attributes
quantitative security evaluation
pubcrawl170108
pubcrawl170107
process control
probability
modeling
graph theory
actuators
cyber-to-physical attack
cyber-to-cyber attack
cyber-physical systems
cyber-physical system security
cross-domain attack
CPS
consequence estimation process
Computer crime
attack probability
attack graph
attack consequences
biblio
Exploring the Effects of Different Text Stimuli on Typing Behavior
Submitted by stamant on Wed, 06/29/2016 - 1:14pm
Modeling
CPS Technologies
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
modeling
biblio
Using model checking for Trivial File Transfer Protocol validation
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
Protocols
validation
UDP
trivial file transfer protocol
transport protocols
TFTP protocol
TFTP
SPIN
Software verification
software engineering
exhaustive state space search
protocol design
formal verification
Internet user datagram protocol
model based checking tool
modeling
Promela
authentication
concurrency defect detection
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 12:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Soft systems methodology in net-centric cyber defence system development
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
modeling
system dynamics model
System Dynamics
system behaviour
SSM
soft systems methodology
sociotechnical systems
situational awareness
security of data
SA
net-centric information system
net-centric hypothesis
net-centric cyber defence system development
net-centric approach
Net-Centric
collaboration
interdependent dynamic relationships
information value
Information systems
information sharing community
information security
information reach
information environment
human activity system
Distributed Information Systems
data sources
complexity
Communities
command and control
collaborative communities
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Analysis of Reliability and Resilience for Smart Grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:50am
Power system protection
smart power grids
Smart Grids
Smart Grid
resilience analysis
resilience
reliability analysis
Reliability
power system reliability
accidental failures
power system faults
modeling
Measurement
malicious attacks
cyber-physical
cyber infrastructure
Cascading Failures
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »