Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Intrusion Detection in the RPL-connected 6LoWPAN Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
6LoWPAN
collaboration
composability
cyber security
ETX
IDS
Internet of Things
Intrusion Detection
IPv6
ipv6 security
Metrics
pubcrawl
Resiliency
RPL
biblio
An interactive, extensible environment for power system simulation on the PMU time frame with a cyber security application
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
Phasor measurement units
visualization
smart grid technology
smart grid security
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system simulation
Power system dynamics
power system control
power grid simulation
PMUs
PMU time frame
c37.118
phasor measurement
Metrics
Mathematical model
Load modeling
interactive environment
interactive control action
interactive control
Generators
extensible environment
Data visualization
data visualisation
cyber security application
cyber security
Computational modeling
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication
biblio
A Near Real Time SMS Grey Traffic Detection
Submitted by grigby1 on Thu, 02/15/2018 - 11:39am
cyber security
Vulnerability
resilience
privacy
machine learning
Artificial Intelligence
pubcrawl
Resiliency
Human behavior
Scalability
human factor
Human Factors
mobile network fraud
mobile network security
AI
biblio
Substation Monitoring to Enhance Situational Awareness \#x2014; Challenges and Opportunities
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
power system reliability
tools
system operator
suitable attack response
Substations
substation monitoring
sophisticated cyber attacks
Software
situational awareness
security of data
Resiliency
Reliability
recovery functions
pubcrawl
Protocols
power system security
composability
power grids
Power Grid
power engineering computing
Monitoring tools
monitoring substations
Monitoring
Metrics
malicious cyber activity
grid reliability
grid operators
grid operation
expert systems
energy management
cyber security
biblio
Anomaly Detection on Bipartite Graphs for Cyber Situational Awareness and Threat Detection
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Anomaly Detection
Bipartite graph
composability
cyber security
Force
graph analytics
IP networks
Layout
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Servers
situational awareness
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
…
next ›
last »