Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerabilities
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
CVSS-metric
vulnerability Similarity Measure
vulnerabilities
VSM
VACC
threats
Security Metrics
pubcrawl
Protocols
probability
network security tools
Network
Monitoring
Metrics
Measurement
analysis
CVSS metric-based VACC
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
computer-based networks
computer security
computer science
computer networks
computer network threats
computer network security vulnerabilities
computer network security
common vulnerability scoring system metric-based technique
CNSVT
classification
Assessment
biblio
Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
Submitted by grigby1 on Mon, 02/25/2019 - 3:21pm
Indexes
wireless access points
vulnerabilities
Smart Sensor
Smart Grid Sensors
Smart Grid
smart cities
Servers
Sensor Systems
security of data
Resiliency
pubcrawl
process algorithm
physical object
local real-time control activities
Intelligent sensors
Cloud Computing
Humidity
Human Factors
Human behavior
enterprise command
Data collection
cyber-physical systems
cyber security threats
cyber security
cyber physical sensors system security
cyber physical SENSOR Systems
Cryptography
CPSS threats
control center
computing platform
composability
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
human misbehavior
vulnerabilities
software defects
security pitfalls
security
Scalability
pubcrawl
privacy
PoW blockchain systems
PoW
PoS blockchain systems
PoS
nonfinancial applications
mathematical basis
bitcoin
Human Factors
Hacking
Governance
financial data processing
expert systems
electronic money
ecosystem issues
Cryptography
contracts
Companies
blockchain technology
blockchain
Bitcoin exchanges
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
security management
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
Industrial Control Systems
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
Databases
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
control systems
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
biblio
A Tiered Security Analysis of Industrial Control System Devices
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
Programmable Logic Controllers (PLCs)
vulnerabilities
tiered security analysis
threats
supervisory control and data acquisition (SCADA) systems
Software
security of data
security countermeasures
security
SCADA systems
Resiliency
resilience
pubcrawl
assets
production engineering computing
numerical control
Industrial Control Systems (ICSs)
Industrial Control system devices
industrial control
Industrial Communication
Human behavior
Hardware
Distributed Control Systems (DCSs)
computer security
computer architecture
Compositionality
biblio
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
attacker capabilities
composability
Metrics
pubcrawl
Resiliency
Sybil attack
sybil attacks
Threat Modeling
vulnerabilities
biblio
A hybrid model for anomaly-based intrusion detection in SCADA networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
learning (artificial intelligence)
Zero-day attacks
vulnerability detection
vulnerabilities
supervisory control and data acquisition systems
security of data
SCADA systems
SCADA networks
robust hybrid model
Resiliency
pubcrawl
Protocols
Metrics
machine learning approach
machine learning
anomaly-based Intrusion Detection Systems
Intrusion Detection
industrial control system dataset
industrial control system
industrial control
Human behavior
feature selection model
Feature Selection
feature extraction
fabrication
Distributed Analytics and Security Institute Mississippi State University Starkville
Cybersecurity
Computational modeling
Compositionality
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »