Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safety
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 12:17pm
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
biblio
Cyber Security Strategy for Nuclear Power Plant through Vital Digital Assets
Submitted by aekwall on Mon, 09/14/2020 - 12:33pm
cyber attack
Vital digital asset
total digital assets
Security Control
nuclear power stations
nuclear power plants
nuclear power plant Instrumentation
nuclear power plant
nuclear engineering computing
Inductors
emergency preparedness functions
digital systems
cyber security strategy
critical digital assets
Safety
computational intelligence
power generation reliability
Compositionality
power generation
computer security
cyber-attacks
standards
Accidents
composability
pubcrawl
Cryptography
security of data
biblio
Composing system integrity using I/O automata
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
closure properties
BIOS Security
vending machine
valid states
transition control
taxonomy
system integrity
invalid starts
invalid initial states
integrity definitions
input output automata
I/O automata
externally-controlled transitions
customer environment
computer viruses
security
Automatic control
automata theory
automata
system design
Safety
Human Factors
resilience
Resiliency
Metrics
pubcrawl
data integrity
Scalability
control systems
security of data
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
biblio
Intrusion-Tolerant Autonomous Driving
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
Sophisticated Attacks
intrusion tolerance
well equipped adversarial teams
real time systems
predictable hardware
killer application
intrusion-tolerant autonomous driving
intrusion-tolerant architecture
intrusion tolerant design
highly skilled equipped adversarial teams
fault-and-intrusion tolerance toolboxes
fault and intrusion tolerance
complex software
real-time systems
automobiles
Autonomous Driving
distributed systems
fault tolerant computing
composability
pubcrawl
Resiliency
computer architecture
Kernel
Task Analysis
traffic engineering computing
security of data
Safety
autonomous vehicles
biblio
Towards Real-Time-Aware Intrusion Tolerance
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
cyber-physical realtime systems
control engineering computing
intrusion tolerance
cyber physical systems
ISO 26262
safety systems
assisted/autonomous driving
automotive use-cases
cyber-physical real-time systems
authentication
EN IEC 62061
EN ISO 13849
functional safety regulations
real-time-aware intrusion tolerance
real-time-aware intrusion-tolerant architectures
safety requirements
security holes
security
Attack vectors
mobile robots
composability
pubcrawl
Resiliency
cyber-physical systems
real-time systems
Protocols
traffic engineering computing
security of data
Safety
road vehicles
road safety
Automotive engineering
automobiles
biblio
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
Mathematical model
traditional network active security threat model
security
Safety
pubcrawl
process control
offensive differential game
network security threat
network security target
network attack and defense
network active security threat process
attack defense differential equation
Information systems
Games
Differential Games
Differential game
differential equations
defensive differential game
defense differential game theory
Control Theory
computer network security
Communication networks
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »