Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerabilities
biblio
Security architecture for UAV
Submitted by aekwall on Mon, 12/20/2021 - 12:19pm
Neural networks
wireless
Wi-Fi
vulnerabilities
threats
statistical analysis
security
Resiliency
pubcrawl
Ad Hoc Network Security
Metrics
Law
cyber-physical systems
computer architecture
Compositionality
attacks
ad-hoc systems
Ad hoc networks
biblio
Security of Smart Grid Management of Smart Meter Protection
Submitted by grigby1 on Tue, 11/30/2021 - 3:02pm
Radio frequency
vulnerabilities
threats
smart meters
smart grid security
Smart Grids
Smart Grid
Scalability
Resiliency
resilience
attacks
pubcrawl
Metrics
Meters
Government
Fire
distributed algorithm
Cyber-security
computer security
Companies
biblio
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types
Submitted by grigby1 on Wed, 07/28/2021 - 8:47am
Compounds
Computing Theory
data structures
Databases
Measurement
Metrics
pubcrawl
security
Security Metrics
Software
software flaws
taxonomy
vulnerabilities
biblio
Detecting Security Vulnerabilities in Website using Python
Submitted by aekwall on Thu, 06/24/2021 - 11:55am
Conferences
security
Resiliency
pubcrawl
composability
tools
vulnerabilities
Python
Automated Response Actions
information technology
Payloads
Communication Systems
Cross Site Scripting
OWASP
biblio
Study of Security Flaws in the Linux Kernel by Fuzzing
Submitted by aekwall on Thu, 06/24/2021 - 11:54am
Kernel
vulnerabilities
use-after-free
tools
Syzkaller
stack overflow
security threats
security
Protocols
Linux Operating System Security
Linux
Operating systems security
Industrial engineering
fuzzing
composability
Automated Response Actions
pubcrawl
Metrics
composabilty
resilience
Resiliency
biblio
Avoidance of Replay attack in CAN protocol using Authenticated Encryption
Submitted by grigby1 on Tue, 06/01/2021 - 2:51pm
Protocols
vulnerabilities
Tiny Encryption Algorithm (TEA)
timestamp
standards
spoofing attacks
sensors
Secure Hash Algorithm (SHA)
Resiliency
resilience
replay attacks
pubcrawl
advanced encryption standard (AES)
privacy
Message Authentication Algorithm (MAC)
message authentication
encryption
Cryptography
Counter
confinement
composability
CAN protocol
authentication
authenticated encryption
biblio
Object-oriented software metrics in software code vulnerability analysis
Submitted by grigby1 on Tue, 04/27/2021 - 4:01pm
object oriented security
Resiliency
composability
Metrics
pubcrawl
code evaluation
Measurement
OWASP
security
Security Metrics
software security
vulnerabilities
biblio
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
security
Software
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
vulnerabilities
Topology
Scalability
Software algorithms
Systematics
security risk assessment
attack graphs
belief networks
Bayesian networks
Probabilistic Graphical Models
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
resilience
malware campaigns
memory size 4.0 TByte
MikroTik
MikroTik devices
MikroTik devices landscape
MikroTik routers
pubcrawl
realistic honeypots
low-cost routers
Resiliency
RouterOS
Scalability
security
telecommunication network routing
time 45.0 d
vulnerabilities
Honey Pot
Computer crime
computer network security
core network infrastructure
core networks
core routers
DDoS Attacks
easy-to-deploy MikroTik honeypot
hacker attacks
automated attack classification
honey pots
honey-pot
Human behavior
Human Factors
internet
Internet exchanges
invasive software
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »