Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
modeling
biblio
Risk analysis of GPS-dependent critical infrastructure system of systems
Submitted by BrandonB on Fri, 05/01/2015 - 7:44am
phasor measurement
US electric grid
US Department of Homeland Security
systems engineering
system of systems
sos
SmartGrid initiative
SmartGrid
smart power grids
risk management
risk analysis methodology
risk analysis
PMU
Phasor measurement units
Clocks
modeling
GPS-dependent critical infrastructure system
GPS-dependent CI sectors
GPS timing
GPS
Global Positioning System
electricity-dependent critical infrastructure sectors
electricity subsector
electricity
electric phasor measurement units
Department of Energy
critical infrastructures
critical infrastructure
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Thu, 04/30/2015 - 12:59pm
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
file
The CPS Challenge – Linking Physicality and Computation_White Paper.pdf
Submitted by Site Manager on Wed, 04/22/2015 - 5:31pm. Contributor:
Joseph Sifakis
CPS Domains
Modeling
Foundations
Computation
modeling
CPS Week 2015
2015
Academia
Position Paper
Publications
April 13 2015
file
The CPS Challenge - Linking Physicality and Computation.pdf
Submitted by Site Manager on Wed, 04/22/2015 - 5:24pm. Contributor:
Joseph Sifakis
CPS Domains
Modeling
Foundations
Computation
framework
modeling
physicality
CPS Week 2015
2015
Academia
Presentation
April 13 2015
profile
Gautam Biswas
CPS Domains
Aerospace
Automotive
Transportation Systems Sector
Energy Efficient Buildings
Consumer
Avionics
Space Systems
Defense
Control
Energy
Modeling
Critical Infrastructure
Transportation
Simulation
CPS Technologies
Education
Aircraft
Data Driven Analytics
Diagnostics
fault tolerance
modeling
NextGen
Prognostics
simulation
spacecraft
Tennessee
biblio
Personalized Password Guessing: A New Security Threat
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Foundations
ACM CCS
cyber security
foundations
Graphical Model
guessing
Human and Societal Aspects of Security and Privacy
modeling
password
personalized
Science of Security
suggestion
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
Data Driven Security Models and Analysis
biblio
Preemptive Intrusion Detection
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 6:31pm
Systems Engineering
Modeling
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
credential stealing attack
cyber security
cyber-system
factor graph
foundations
Graphical Model
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
modeling
Science of Security
security incident
systems engineering
tagging
timeliness
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
Data Driven Security Models and Analysis
biblio
Examining Reliability of Wireless Multihop Network Routing with Linear Systems
Submitted by rudra on Wed, 09/17/2014 - 6:31pm
Control
Modeling
Wireless Sensing and Actuation
CPS Technologies
Foundations
control
CPS Technologies
foundations
Information Flow Control
modeling
multihop networks
Reliability
stochastic dynamic systems
Systems Security
wireless sensing and actuation
Information Flow Control
Systems Security
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »