Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security requirements
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
From Secure Business Process Modeling to Design-Level Security Verification
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
socio-technical systems
pubcrawl
resilience
Resiliency
SecBPMN2
security
security engineering framework
security of data
security requirements
procedural system descriptions
Stakeholders
system design
system developers
Systems architecture
UML
UMLsec policies
Unified modeling language
Air gaps
organizational aspects
organisational aspects
modeling
Model transformation
Metrics
Human Factors
Human behavior
formal verification
Formal Specification
design-level security verification
composability
business process modeling security
business data processing
BPMN
air traffic management system
biblio
Towards a secure smart grid storage communications gateway
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
internetworking
telecommunication security
standards
smart power grids
Smart Grids
Smart Grid Privacy
security requirements
secure smart energy communications devices
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy issues
machine-to-machine communication
Logic gates
authentication
ICT system
Human Factors
Human behavior
HORIZON 2020 project STORY
hands-on configuration advice
Energy storage
Energy Efficiency
electric storage technologies
data storage
cyber-physical systems
cyber security measures
Cryptography
communications gateway
communication line security
backend M2M communications protocols
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Reinforcing Security Requirements with Multifactor Quality Measurement
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
security requirements
quantitative statistical analysis
requirements analysts
requirements elicitation
requirements engineering
resilience
Resiliency
scenarios
security of data
security quality ratings
qualitative analysis
security requirements elicitation
security requirements reinforcement
software quality
Stakeholders
statistical analysis
user study
vignettes
weak security constraints
minimal analyst expertise
authentication
Context
Databases
elicited expert preferences
Formal Specification
Human behavior
human factor
Human Factors
Metrics
Analytical models
MQM
multifactor authentication
Multifactor Quality measurement
Multifactor Quality Method
natural language scenarios
Natural languages
operating systems
pubcrawl
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
safety requirements
Unified modeling language
standards
software assurance
security-critical systems
security requirements
security of data
security management
Security Assurance
security
Scalability
Safety-Critical Systems
safety-critical software
certification
Safety management
safety assurance
Safety
requirements engineering
pubcrawl
integrated computational-physical capabilities
formal verification
documentation
cyber-physical systems
Context modeling
composability
compliance assurance
biblio
A Risk Assessment Framework for Automotive Embedded Systems
Submitted by grigby1 on Tue, 09/26/2017 - 12:39pm
automotive security
Human behavior
pubcrawl
Resiliency
risk assessment
Scalability
Security Audits
security requirements
threat analysis
biblio
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
partial attestation
Virtualization
Trusted Computing
Software measurement
security requirements
security
Seals
Resiliency
pubcrawl
privacy-preserving remote attestations
attestation
Metrics
Kernel
data privacy
cost-effective remote attestations
Cloud Computing
chain of trust
attestation protocol
attestation costs
file
Hibshi_Improving_Security_TB.pdf
Submitted by Jamie Presken on Thu, 12/08/2016 - 8:20am
CMU
Fuzzy logic
Jan'17
recommender system
scenarios
security requirements
type-2
uncertainty
user study
vignettes
« first
‹ previous
1
2
3
4
5
next ›
last »