Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
ROS
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
Reconnaissance
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
Analytical models
public domain software
pubcrawl
preliminary state
policy-based governance
operating systems (computers)
operating systems
offensive tool
modular two-pronged offensive tool
Human Factors
Human behavior
foundational knowledge
cybersecurity tool
Cybersecurity
control engineering computing
Biological system modeling
biblio
Operational Data Based Intrusion Detection System for Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 1:06pm
remote monitoring
Monitoring
Operational Data
operational data based intrusion detection system
pervasive control
policy-based governance
power engineering computing
power generation
power system security
privacy
Protocols
pubcrawl
Metrics
resilience
Resiliency
Scalability
security challenges
security of data
Smart Grid
smart grid consumer privacy
smart meters
smart power grids
smart technologies
utility companies
electrical grid
anomaly-based IDS
collaboration
complex data representation
composability
Computer crime
cyberattacks
Cybersecurity
cyberthreats
deep learning
distributed generation
distributed power generation
Anomaly Detection
electricity
energy consumers
Human behavior
industrial control
Industrial Control Systems
information and communication technology
Internet of Things
intrusion detection system
IoT
learning (artificial intelligence)
machine learning
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 1:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
biblio
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
Internet-of-Battlefield Things security
Topology
Scalability
Sawtooth
pubcrawl
Protocols
permissioned blockchain
network topology
network configuration
mission oriented tasks
military technology
military computing
IoBT environment
iobt
Internet-of-Things solutions
Ad hoc networks
Internet of Things
Human Factors
ergonomics
distributed ledger
Distributed databases
data communication
Cybersecurity
Cryptography
centralized communication technology
blockchain-integrated IoBT platform
blockchain usability
blockchain
Bandwidth
biblio
Application of Trust Assessment Techniques to IoBT Systems
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
machine learning systems
Trusted Computing
trust assessment techniques
trust
smart cities
sensors
security of data
Scalability
resilience
pubcrawl
Provenance
next-generation artificial intelligence
Monitoring
military sensing assets
military operations
military computing
computer security
learning (artificial intelligence)
IoT technology
IoT assets
IoBT systems
IoBT operational environments
iobt
Internet of Things
Internet of Battlefield Things paradigm
Internet of battlefield things
internet
Human Factors
diverse asset ownership
cybersecurity techniques
Cybersecurity
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
system life cycle
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
functional-level security requirements
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
Software Architecture
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Safety
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
biblio
Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
cyber resilient designs
Resilient Security Architectures
Resiliency
structured system engineering methodology
resilience requirements
Model-based Systems Engineering
mitigate cyber risk
MBSE tools
MBSE
inter-element relationships
graph analytics
graph analytic methods
graph analytic assisted model
engineering cyber resilient systems
design lifecycle
decision analysis methods
security of data
complex models
centralized MBSE database
cyber resilience
resilience
systems engineering
Risk
computer security
risk management
Analytical models
Cybersecurity
tools
graph theory
pubcrawl
Big Data
biblio
Concept Inventories in Cybersecurity Education: An Example from Secure Programming
Submitted by grigby1 on Wed, 11/04/2020 - 1:01pm
Force
tools
testing
security of data
secure programming concept inventory
secure programming
pubcrawl
Programming profession
programming
privacy
computer science education
education
Delphi study
Cybersecurity Education Curriculum 2017 guidelines
cybersecurity education
Cybersecurity
cyber physical systems
concept inventory
computer security
biblio
Cybersecurity education and training in hospitals: Proactive resilience educational framework (Prosilience EF)
Submitted by grigby1 on Wed, 11/04/2020 - 12:59pm
healthcare settings
training development
Training
security of data
security framework
resilience
pubcrawl
Prosilience EF
proactive resilience educational framework
privacy
multilateral educational training scheme
information technology
information security processes
Human Errors
hospitals
holistic cyber resilience
computer security
health care
Electronic healthcare
eHealth
educational training schemes
data protection procedures
cybersecurity training providers
cybersecurity training
cybersecurity threats
cybersecurity education
Cybersecurity
cyber-attacks
cyber resilience level measuring
cyber physical systems
critical infrastructures
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »