Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vulnerability Analysis
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 1:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
Submitted by grigby1 on Fri, 09/18/2020 - 1:15pm
pre-silicon security assessment
design stage
formal verification methods
hardware designer
hardware overhead
hardware system
hardware vulnerabilities
language based framework
language-based approach
language-based hardware security verification
malicious logic detection
potential security vulnerabilities
design mistakes
promising solution
QIF model
QIF-Verilog
quantified information flow model
quantitative information-flow
security rules
verification process
Verilog type systems
vulnerable logic detection
compiler security
integrated circuit testing
Hardware design languages
Cryptography
security solutions
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Hardware
Integrated circuit modeling
hardware description languages
Scalability
Registers
integrated circuit design
formal verification
Measurement
Compositionality
uncertainty
Vulnerability Analysis
electronic engineering computing
data flow
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Big Data Security Issues and Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
Computer crime
natural language processing technology
DNS
cyber security issues
big data security issues
advanced persistent threat detection
Phishing
Information Assurance
data privacy
natural language processing
cyber-attacks
spam detection
Vulnerability Analysis
advanced persistent threat
pubcrawl
Human behavior
Resiliency
information security
cyber security
security
malware
Conferences
Organizations
Big Data
Scalability
biblio
A dynamic defense-attack game scheme with incomplete information for vulnerability analysis in a cyber-physical power infrastructure
Submitted by grigby1 on Fri, 04/24/2020 - 3:38pm
pubcrawl
resilience
Resiliency
composability
Metrics
cyber-physical power systems
GAME THEORY CYBER-PHYSICAL ATTACKS
particle swarm optimization
Vulnerability Analysis
Power Grid Vulnerability Assessment
biblio
Vulnerability Analysis of Smart Grid under Community Attack Style
Submitted by grigby1 on Fri, 04/24/2020 - 3:37pm
Community theory
Power Grid Vulnerability Assessment
Vulnerability Analysis
Power system protection
power system faults
power lines
Power Grid
Power cables
MLRM
minimum load reduction model
linear programming problem
Linear programming
information network
England 39 nodes system
cyber network
controllable power nodes
pubcrawl
community attack style
cascading failure process
cascading failure
failure analysis
Metrics
network topology
power system control
Smart Grids
Load modeling
composability
smart power grids
Smart Grid
Generators
Resiliency
resilience
file
Support for Security and Safety of Programmable IoT Systems
Submitted by Atul Prakash on Fri, 04/10/2020 - 9:19am. Contributors:
Atul Prakash
Darko Marinov
Physical perturbation attacks
adversarial testing
Vulnerability Analysis
secure ML
permission models
Lightning Talks
1646305
1646392
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
A Hybrid Alarm Management Strategy in Signature-Based Intrusion Detection Systems
Submitted by grigby1 on Thu, 03/12/2020 - 11:01am
hybrid alarm management strategy
Vulnerability Analysis
similarity-based correlation
signature-based intrusion detection systems
Signature-based IDS
sensors
Scalability
Resiliency
resilience
Prelude SIEM
Minimization
Measurement
IP networks
intrusion detection system
Intrusion Detection
signature based defense
HP Arsight priority formula
false alarm reduction
false alarm minimization
event normalizer
dynamic network context information
digital signatures
Databases
cybersecurity defense strategy
Correlation
Alarm systems
alarm prioritization
alarm correlation techniques
pubcrawl
biblio
An Auditing Framework for Vulnerability Analysis of IoT System
Submitted by aekwall on Mon, 03/09/2020 - 10:06am
IoT device
Security Audits
security frameworks
resource constraint nature
open-source tools
open-source framework
communication vulnerabilities
auditing framework
auditing
virtual world
framework
IoT system
physical world
IoT
Scalability
Internet-of-Things
firmware
public domain software
Vulnerability Analysis
pubcrawl
Human behavior
Resiliency
security
Internet of Things
security of data
« first
‹ previous
1
2
3
4
next ›
last »