Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threats
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
A Tiered Security Analysis of Industrial Control System Devices
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
Programmable Logic Controllers (PLCs)
vulnerabilities
tiered security analysis
threats
supervisory control and data acquisition (SCADA) systems
Software
security of data
security countermeasures
security
SCADA systems
Resiliency
resilience
pubcrawl
assets
production engineering computing
numerical control
Industrial Control Systems (ICSs)
Industrial Control system devices
industrial control
Industrial Communication
Human behavior
Hardware
Distributed Control Systems (DCSs)
computer security
computer architecture
Compositionality
biblio
A theoretical review of social media usage by cyber-criminals
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
online social networking sites
tools
threats
stalking
spam
social networking (online)
social media usage
social media
Social Engineering Attacks
Scalability
Resiliency
resilience
pubcrawl
Phishing
click-jacking prevention
malware
invasive software
identity theft
Human Factors
human factor
Human behavior
Facebook
Electronic mail
cybercriminal
cyber-criminals
Cross Site Scripting (XSS)
Cross Site Scripting
Computer crime
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
Submitted by grigby1 on Mon, 11/20/2017 - 11:04am
Metrics
vulnerabilities
video surveillance systems
video surveillance
threats
survey
shodan
security
Resiliency
pubcrawl
novel covert channels
novel attacks
Mitigations
attacks
IPcam
IoT
Internet of Things
insecurity
insecam
Human Factors
Human behavior
embedded systems
embedded devices
defenses
covert channels
CCTV
biblio
Privacy Threat Model in Lifelogging
Submitted by K_Hooper on Wed, 10/25/2017 - 10:55am
Human behavior
lifelogging
privacy
Privacy Policies
pubcrawl
Scalability
threat modelling
threats
biblio
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
hacker Web
Web sites
vulnerabilities
threats
threat identification
Servers
pubcrawl170109
online hacker communities
machine learning methodology
learning (artificial intelligence)
IRC channels
information retrieval techniques
information retrieval
carding shops
Hacker IRC
hacker forums
Cybersecurity
cybercriminals
cyber threat detection
cyber security
cyber defenses
Credit cards
Computer hacking
Computer crime
Communities
biblio
Threats in end to end commercial deployments of Wireless Sensor Networks and their cross layer solution
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
security goals
WSNSP
wireless sensor networks
wireless sensor network service providers
Wireless Sensor Network
web services
Web servers
threats
telecommunication security
standard security documents
sensor web portals
sensor portal
attacks
security attacks
security
Portals
Mobile communication
end to end commercial deployments
Department of Homeland Security
Department of Defense
cross layer solution
cross layer security solution
commercial
Availability
biblio
Social Engineering in Social Networking Sites: The Art of Impersonation
Submitted by BrandonB on Thu, 04/30/2015 - 12:50pm
social engineering victimization
physical crime
Receivers
security
sexual abuse
SNS
social aspects of automation
social engineering
social engineering traps
Phishing
social engineeringtactics
social networking (online)
Social networking sites
source credibility
threats
Trust management
user susceptibility
attacker
Organizations
large information base
Interviews
information security management
impersonation
identity theft
human behaviors complexity
grounded theory method
fraudulent people
fraud
financial abuse
Facebook
encoding
deceptive people
Computer crime
file
Session V: Cyber-Physical Security and Privacy - Breakout Session I: Trustworthiness
Submitted by Marco Gruteser on Wed, 01/29/2014 - 4:48pm. Contributors:
Marco Gruteser
Sriram Chellappan
CPS Domains
Automotive
Certification
Testing
Transportation
Validation and Verification
CPS Technologies
Foundations
challenges
privacy
security
threats
Transportation
trustworthiness
Breakout Session 1
Breakout Session 1
2014 National Workshop on Transportation CPS
2014
Academia
« first
‹ previous
1
2
3