Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threats
biblio
Circumstantial Discussion on Security and Privacy Protection using Cloud Computing Technology
Submitted by grigby1 on Thu, 07/20/2023 - 4:17pm
encryption
Cloud Computing
security
pubcrawl
Human behavior
resilience
Scalability
privacy
Computers
blockchain
cloud computing security
expert systems
threats
Resiliency
blockchains
encryption systems
biblio
A Meta-Analysis of Efficient Countermeasures for Data Security
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
Training data
encryption audits
sensitive data
security risks
data attacks
threats
Resiliency
Data protection
renewable energy sources
feature extraction
Compositionality
Data Security
security vulnerabilities
Companies
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
A Survey on Byzantine Attack using Secure Cooperative Spectrum Sensing in Cognitive Radio Sensor Network
Submitted by aekwall on Fri, 04/28/2023 - 9:40am
security
sensors
Task Analysis
Reliability
pubcrawl
threats
Resiliency
byzantine attack
cognitive radio
cognitive radio sensor networks
Cooperative
primary users
radio spectrum management
secondary users
spectrum sensing
Cognitive Radio Security
biblio
Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices
Submitted by grigby1 on Fri, 02/17/2023 - 5:40pm
Safety
vulnerabilities
Virtual private networks
threats
supply chains
Standards organizations
software reliability
software assurance
Software
security
Scalability
Information Assurance
Resiliency
resilience
pubcrawl
privacy
Operating-Systems
legislation
integrity
Information-Assurance
Hack
attack
biblio
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Submitted by grigby1 on Fri, 02/17/2023 - 5:10pm
secure system
SoC
isolated domains
arm
policy governance
sandboxing
Embedded System
threats
embedded systems
Robustness
computer architecture
side-channel attacks
composability
system-on-chip
Safety
security
Hardware
pubcrawl
collaboration
biblio
Encryption Algorithms based on Security in IoT (Internet of Things)
Submitted by aekwall on Thu, 07/14/2022 - 4:18pm
Smart homes
threats
Light Weight
key
Algorithm
QR codes
smart cities
Memory management
cyber-physical systems
Signal processing algorithms
Ciphers
Resiliency
pubcrawl
Wireless communication
wireless sensor networks
IoT
Cryptography
biblio
Security architecture for UAV
Submitted by aekwall on Mon, 12/20/2021 - 12:19pm
Neural networks
wireless
Wi-Fi
vulnerabilities
threats
statistical analysis
security
Resiliency
pubcrawl
Ad Hoc Network Security
Metrics
Law
cyber-physical systems
computer architecture
Compositionality
attacks
ad-hoc systems
Ad hoc networks
biblio
Security of Smart Grid Management of Smart Meter Protection
Submitted by grigby1 on Tue, 11/30/2021 - 3:02pm
Radio frequency
vulnerabilities
threats
smart meters
smart grid security
Smart Grids
Smart Grid
Scalability
Resiliency
resilience
attacks
pubcrawl
Metrics
Meters
Government
Fire
distributed algorithm
Cyber-security
computer security
Companies
biblio
Reducing Threats to Key U.S. Supply Chains
Submitted by willirn1 on Fri, 10/22/2021 - 4:41pm
supply chain management
C3E
threats
Supply Chain
Risk
counterintelligence
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
1
2
3
next ›
last »