Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security requirements
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
biblio
A Hypergraph-Based Key Management Scheme for Smart Charging Networking
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
key management scheme SCHKM
two-subnetwork model
telecommunication network management
smart charging network
Smart Charging
security requirements
security of data
SCHKM scheme
Scalability
Resiliency
resilience
pubcrawl
Metrics
Key storage
Cryptography
key management
key generation cost
hypergraph-based key management scheme
hypergraph theory
hypergraph structure
Human Factors
Human behavior
graph theory
electric vehicle users
electric vehicle charging
data security requirements
Data Security
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains
Submitted by grigby1 on Tue, 11/26/2019 - 3:42pm
application domains
Human behavior
human factor
Human Factors
Internet of Things
IoT-HarPSecA
Metrics
Pervasive Computing Security
pubcrawl
resilience
Resiliency
Scalability
security
security framework
security requirements
biblio
SARA: Security Automotive Risk Analysis Method
Submitted by grigby1 on Thu, 09/05/2019 - 11:27am
automotive security
composability
Control Theory
pubcrawl
resilience
Resiliency
risk assessment
security
security requirements
threat analysis
biblio
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
Submitted by grigby1 on Mon, 06/17/2019 - 11:51am
expert systems
privacy
decision patterns
Games
Human Factors
Metrics
pubcrawl
resilience
Scalability
security decisions
security requirements
Security Risk Management
biblio
A Multi-Layered Approach to Securing Enterprise Applications by Using TLS, Two-Factor Authentication and Single Sign-On
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
Mobile Internet applications
two-factor authentication
two factor authentication
single sign-on capability
single sign-on authentication
Security Token
security requirements
security of data
security
pubcrawl
password
OTP mechanism
one-time passwords
One-Time Password (OTP)
MultiLayered Framework
multilayered approach
application data
mobile computing
IP networks
Internet attackers
internet
Information Security concept
information protection
information and communication technology
Human Factors
Human behavior
enterprise applications
Dogs
Computer crime
authentication application
authentication
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
biblio
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
side channel attacks
network channel attacks
network traffic
openstack
physical machine
privacy
pubcrawl
Resiliency
security
security requirements
Network Channel Attack
Switches
TAP impersonation
Virtual machine monitors
virtual machines
virtualisation
virtualization privacy
virtualization services
VM-to-VM interference
internal cloud virtual network
Cloud Computing
cloud platform
co-located VMs
co-resident VMs
composability
computer network security
cross-Virtual machine network channel attack
data privacy
Human behavior
Bridges
internal virtual network
IP networks
logical resource isolation
malicious VM
Metrics
mirroring
Monitoring
multitenant virtualized cloud environments
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
security management
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
Industrial Control Systems
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
Databases
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
control systems
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
« first
‹ previous
1
2
3
4
5
next ›
last »