Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacker model
biblio
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
Scalability
middleware
Network reconnaissance
open systems
Peer-to-peer computing
permission attestation
Predictive Metrics
Protocols
pubcrawl
realtime peer-to-peer protocol
Resiliency
leaked context
scalable middleware
scalable verification
secure DDS systems
Secure DDS v
security
Security by Default
security model
Service Plugin Interface architecture
vulnerability excavation
default plugin specifications
authenticated encryption
authorisation
capability lists
Compositionality
crypto handshake
Cryptography
data bus
data centric access control
Data Distribution Service
attacker model
digital signatures
distributed networked systems
electronic data interchange
formal verification
Industrial IoT
initial ratification
internet
interoperable data exchange
IoT protocol
file
Determining-Tolerable-Attack-Surfaces-that-Preserves-Safety-of-Cyber-Physical-Systems.pdf
Submitted by Heather Lucas on Wed, 01/29/2020 - 6:10pm
Safety
tracking
timed automata
software fault tolerance
Servers
Security analysis
security
Safety-Critical Systems
safety-critical software
safety analysis
attacker model
railway signaling system
Rail transportation
parameterizable state automaton templates
formal verification
cyber-physical systems
cyber-physical system safety
cyber-physical system
Communication system signaling
automata
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
Submitted by Heather Lucas on Wed, 01/29/2020 - 6:10pm
Rail transportation
timed automata
attacker model
safety analysis
cyber-physical system
tracking
Communication system signaling
security
automata
Servers
cyber-physical systems
Safety
parameterizable state automaton templates
cyber-physical system safety
railway signaling system
Security analysis
Safety-Critical Systems
software fault tolerance
safety-critical software
formal verification
Human Behavior
Policy-Governed Secure Collaboration
Resilient Architectures
UIUC
Monitoring, Fusion, and Response for Cyber Resilience