Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vulnerability Analysis
biblio
Load Redistribution Attacks in Multi-Terminal DC Grids
Submitted by grigby1 on Thu, 05/11/2023 - 4:48pm
False Data Injection
voltage-sourced converter
multi-terminal dc grid
Systems operation
Lead
Resiliency
command injection attacks
cyber-physical system
cyber-attack
Voltage control
Cyber-security
cyberattack
power grids
Vulnerability Analysis
Reliability
composability
optimization
resilience
Metrics
pubcrawl
biblio
Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology
Submitted by grigby1 on Fri, 03/03/2023 - 9:23am
Compositionality
Shodan Eye
Linux Operating System Security
Vulnerability Analysis
Kali Linux
Reconnaissance
Software algorithms
operating systems
resilience
Organizations
Linux
network security
composability
Industries
privacy
Resiliency
Metrics
pubcrawl
biblio
Research on Nondestructive Vulnerability Detection Technology of Power Industrial Control System
Submitted by grigby1 on Fri, 02/03/2023 - 3:40pm
Metrics
Vulnerability Analysis
static analysis
Resiliency
resilience
pubcrawl
power industry control system
Power industry
power grid vulnerability analysis
non-destructive detection
Industrial Control Systems
mechatronics
Inspection
industrial control simulation
industrial control
control systems
composability
Analytical models
industrial control system
biblio
Power Grid Nodal Vulnerability Analysis Combining Topology and State Information
Submitted by grigby1 on Fri, 07/29/2022 - 9:03am
Power system protection
power grid vulnerability analysis
power gird
cascading failure model
system integration
simulation
vulnerability index
power grids
Vulnerability Analysis
pubcrawl
Metrics
Topology
Scalability
Analytical models
Correlation
Resiliency
resilience
biblio
Reinforcement Learning Based Vulnerability Analysis of Data Injection Attack for Smart Grids
Submitted by grigby1 on Fri, 07/29/2022 - 9:02am
pubcrawl
resilience
Resiliency
Scalability
estimation
Benchmark testing
Metrics
Smart Grid
Vulnerability Analysis
Power measurement
Reinforcement learning
Meters
simulation
measurement uncertainty
data injection attacks
power grid vulnerability analysis
biblio
Vulnerability Analysis of High-Performance Transmission and Bearer Network of 5G Smart Grid Based on Complex Network
Submitted by grigby1 on Fri, 07/29/2022 - 8:59am
Smart Grids
power grid vulnerability analysis
5G
Clustering algorithms
simulation
Vulnerability Analysis
Metrics
complex networks
complex network
pubcrawl
Smart Grid
5G mobile communication
Scalability
Analytical models
Conferences
Resiliency
resilience
biblio
5G Core Security in Edge Networks: A Vulnerability Assessment Approach
Submitted by grigby1 on Mon, 04/18/2022 - 11:38am
5G attack graphs
5G attack vector
5G Edge security
5G mobile communication
5G security testbed
Computers
Economics
pubcrawl
Scalability
security
security scalability
Vulnerability Analysis
biblio
Secure Codecity with Evolution: Visualizing Security Vulnerability Evolution of Software Systems
Submitted by aekwall on Tue, 05/18/2021 - 3:20pm
visualization
Vulnerability Evolution
Re-engineering
3D software visualization
3D graphics
Vulnerability Analysis
Human-computer interaction
Three-dimensional displays
Compositionality
Buildings
security
Urban areas
usability
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
Task Analysis
biblio
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
risk management
miniature ICS
proactive security response
probabilistic multiattribute vulnerability criticality analysis model
production engineering computing
pubcrawl
quantitative evaluation
quantitative security metrics
resilience
Resiliency
Metrics
Scalability
Security Criticality Analysis
Security Impact Analysis
security of data
security risk assessment scheme
Vulnerability Analysis
vulnerability host components
vulnerability severities
vulnerability-based impact criticality estimation
Functional Dependency
Compositionality
control engineering computing
control uncertainties
Cyber Dependencies
cyber environments
cyber security risks
cyber threats
Cybersecurity
distributed system
attack probabilities
Human Factors
ICS networks
ICS security
impact estimation
industrial control
Industrial Control System (ICS)
Industrial Control Systems
MAVCA model
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
1
2
3
4
next ›
last »