Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack scenario
biblio
Modeling of Security Risk for Industrial Cyber-Physics System under Cyber-Attacks
Submitted by grigby1 on Mon, 12/20/2021 - 2:39pm
Kalman filters
security risk level model
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
Mathematical model
adaptive control
industrial cyber-physical system
cyber-physical systems
cyber-attacks
Conferences
attack scenario
attack resource
Analytical models
adaptive filtering
biblio
Using Attack Pattern for Cyber Attack Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
cyber attribution problem
pubcrawl
Metrics
information system
individual organization
Human behavior
data integrity
data confidentiality
data availability
attack pattern
Cyber Attribution
cyber attack initiator identification
cyber attack
computer network security
composability
attribution
attack scenario
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
Risk and avoidance strategy for blocking mechanism of SDN-based security service
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
Monitoring
Switches
software-defined network
software defined networking
Security Risk Management
security
SDN-based Security Services
SDN-based security service
SDN security
SDN attack
Scalability
risk management
risk analysis
Resiliency
pubcrawl
Protocols
Dynamic Networks and Security
Metrics
malicious host
IP networks
IP forging
IEC standards
forged packets
forged IP address
dynamic network technology
data planes
cost-effective risk avoidance strategy
computer network security
blocking mechanism
attack scenario
composability