Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
Behavior Modeling for Cybersecurity
Submitted by grigby1 on Tue, 03/30/2021 - 12:03pm
behavior modeling
cyber security incidents
Cybersecurity
faulty code
Human behavior
human behaviors
human behaviour modeling
Human Factors
Personnel
pubcrawl
scanning devices
security
security of data
soft factors
software developers
system administrators
biblio
Relating Factors of Tertiary Institution Students’ Cybersecurity Behavior
Submitted by grigby1 on Tue, 03/30/2021 - 12:03pm
Internet skills
validated cybersecurity factors
tertiary institutions students
tertiary institution students
SPSS version 25
security self-efficacy
security of data
security
response efficacy
pubcrawl
perceived vulnerability
perceived severity
perceived benefits
perceived barriers
peer behavior
computer skills
Internet exposure
internet
Human Factors
Human behavior
further education
cybersecurity training
cybersecurity issues
cybersecurity behaviors of tertiary institution students
cybersecurity behaviors
cybersecurity behavioral factors
Cybersecurity
cues to action
Correlation analysis
biblio
Tracing and detection of ICS Anomalies Based on Causality Mutations
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
Entropy
traceability of anomaly
security of data
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
Microwave integrated circuits
information entropy
industrial control system
industrial control physics
industrial control
ICS Anomaly Detection
ICS anomalies
Anomaly Detection
Data mining
Correlation
control engineering computing
comparison algorithm
causality mutations
causality modeling
causality mining algorithm
causal network
causal modeling algorithm
causal anomaly detection
anomaly source traceable
anomaly node
anomaly location strategy
anomaly detection algorithm
biblio
Assessing Information Risks When Using Web Applications Using Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
pubcrawl
Web application vulnerability scanner
Web application
vulnerability assessment
security of data
security
risk analysis
Resiliency
resilience
Cyber Physical System
Metrics
internet
information risk concepts
information risk assessment
Information risk
Fuzzy logic
data protection discipline
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
Toward a Network Intrusion Detection System for Geographic Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
network intrusion detection system
knowledge based systems
knowledge bases
known computer attack detection
MAS
Multi Agent System
multi-agent systems
multiagent paradigm
multiagent systems
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
time detection
unknown computer attack detection
distribution
autonomous agents
autonomy
Big Data
Big networks
DIDS
distributed file system
distributed intrusion detection system
distributed processing
Anomaly Detection
expert systems
geographic data security
geographic information systems
Geographical System
GIS.
Human behavior
IDS
biblio
A STPA-Sec Case Study: Eliciting Early Security Requirements for a Small Unmanned Aerial System
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
system life cycle
Scalability
security
security of data
small unmanned aerial system
Stakeholders
STPA-Sec
STPA-Sec case study
subject matter experts
system architecture
safety-critical software
system-theoretic process analysis approach
systems engineering
Systems engineering and theory
systems security analysis
systems security engineering
top down system security requirements analysis approach
UAS operators
United States Air Force Academy Systems Engineering cadets
functional-level security requirements
resilience
architectural-level security specification criteria
autonomous aerial vehicles
computer security
control engineering computing
Cybersecurity
design-level engineering considerations
early security requirements
expert systems
Control Theory
Hazards
Human behavior
notional SUAS system case study
pubcrawl
requirements analysis
Resiliency
resiliency requirements
safety requirements
biblio
Expert System for Assessing the Efficiency of Information Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
information security efficiency assessment
technical measures
security of data
security
resilience
pubcrawl
protected information
personal data
Organizations
organizational measures
organizational and administrative documents
Monitoring
IP networks
informed decisions
information system
Security Audits
information security audit
information security
information protection system
expert systems
expert system
expert assessment method
Data protection
coefficient of significance
authorities
auditing
audit information security
Scalability
Resiliency
Human behavior
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Dynamic Information Flow Tracking for Embedded Binaries using SystemC-based Virtual Prototypes
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
Metrics
virtual prototyping
vehicle dynamics
SystemC-based virtual prototypes
security vulnerabilities
security related exploits
security policies
security of data
security
Resiliency
resilience
pubcrawl
Prototypes
accurate DIFT
existing DIFT approaches
Engines
embedded systems
embedded binaries
early DIFT
Dynamic Information Flow Tracking
DIFT engine
Data models
data flow analysis
composability
C++ languages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »