Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security models
biblio
IoT Security: Review and Future Directions for Protection Models
Submitted by grigby1 on Thu, 08/12/2021 - 4:21pm
IoT security
security models
IoT security standards
IoT Security Models
Formal Security Models
formal specifications
Reliability
composability
standards
Internet of Things
Biological system modeling
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
Adaptation models
biblio
Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models through a Stacked Ensemble of Metamodels
Submitted by willirn1 on Thu, 10/22/2020 - 11:02am
Monitoring, Fusion, and Response for Cyber Resilience
surrogate models
sensitivity analysis
security models
Metrics
metamodels
KU
Human behavior
emulators
reliability models
optimization
Uncertainty Quantification
Human Behavior
Metrics
KU
Monitoring, Fusion, and Response for Cyber Resilience
2020: October
biblio
Security Chaos Engineering for Cloud Services: Work In Progress
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cloud computing security
traditional security paradigms
security chaos engineering
Resilient Architectures
nonsecurity failures
Human Errors
CloudStrike
Cloud-Security
cloud security system
intrusion tolerance
security models
security risk assessment
cloud infrastructure
Intrusion Detection
chaos
software fault tolerance
Fault tolerant systems
cloud services
security breaches
fault tolerance
testing
composability
pubcrawl
Resiliency
Cloud Computing
security of data
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
Countermeasureing Zero Day Attacks: Asset-Based Approach
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Predictive Metrics
zero-day attack detection
Zero Day Attacks and Defense
zero day attack countermeasureing
system calls
security of data
security models
security life cycle
security domain
security
Resiliency
pubcrawl
Zero day attacks
operating systems
Monitoring
Metrics
malware
Games
defense mechanisms
Databases
composability
Companies
asset-based approach
defense
biblio
Victim Communication Stack (VCS): A Flexible Model to Select the Human Attack Vector
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
composability
Cross Layer Security
Human Attack Vector
Human Layer
pubcrawl
Resiliency
security
security models
social engineering
biblio
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust
Submitted by BrandonB on Thu, 04/30/2015 - 1:35pm
information flow security
Trusted Computing
trust state manipulation
Stuxnet attacks
Stuxnet
Software
security of data
security models
security
nondeducibility
multiple security domains nondeducibility
MSDND
Monitoring
modal model
modal frames
Analytical models
information flow disruption attacks
implicit trust
human operators
event system analysis
electronic monitors
doxastic logic
cyber-physical systems
cyber security
Cyber Physical System
CPS
Cost accounting
cognition
Bismuth
belief manipulation
biblio
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Quantitative Verification
Systems Engineering
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
CPS Technologies
Cyber Epidemic Dynamics
Cybersecurity dynamics
epidemic threshold
foundations
modeling
moving target defense
moving-target defense
Quantitative Verification
Science of Security
security models
systems engineering
Systems Security
validation and verification
ACM CCS
Moving-Target Defense
Systems Security