Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber-security
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 12:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Trust in Cyber Security Recommendations
Submitted by aekwall on Mon, 03/23/2020 - 12:31pm
cyber security knowledge permeation
trust scores
trust measures
recommending agent
private contexts
personal recommendations
personal magazine recommendations
manufacturer information
institutional recommendations
human factor research
expert recommendations
expert magazine recommendations
cyber security tool
cyber security recommendations
Cyber-security
-user-characteristics
-security-recommendations
-organizational-security
-human-modeling
recommender systems
Human Factors
social media
social networking (online)
pubcrawl
Resiliency
Trusted Computing
Scalability
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 9:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System
Submitted by aekwall on Mon, 02/10/2020 - 11:06am
pubcrawl
Intrusion Detection
learning (artificial intelligence)
library call lists
machine learning model
malicious activity
malicious actors
modern energy management systems
performance evaluation
power electronics
PowerWatch
Internet-connected resources
Resiliency
security of data
smart energy management system
Smart Grid
Smart Grid Sensors
Smart Grids
smart power grids
smart-grid
system call tracing
vital information
energy management
bogus sensor data
Compositionality
Computer crime
critical firmware
CSPoweR-Watch
CSPR
cyber-resilient residential power management system
cyber-secure power router
Cyber-security
EMS
Router Systems Security
energy management system (EMS)
energy management systems
energy resources
functional versions
global energy consumption
Hardware
Human Factors
Information analysis
internet
biblio
Machine Learning Based Insider Threat Modelling and Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
machine learning
user-centered machine learning
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
multiple data granularity levels
Metrics
malicious insider attacks
machine learning algorithms
Cyber-security
Logistics
learning (artificial intelligence)
insider threat modelling
insider threat detection system
insider threat
insider scenario specific results
Human behavior
feature extraction
Data collection
damaging threats
collaboration
biblio
The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by grigby1 on Wed, 10/23/2019 - 11:36am
Risk-Metric
national CERT
original TTC
practical cyber security risk estimation
pubcrawl
resilience
Resiliency
risk management
Risk-Estimation
Metrics
Scalability
security of data
Security Risk Estimation
Security-Metric
Threat Landscape
time-to-compromise metric
vulnerability database
β-distribution
estimation
complex systems
Complexity theory
computer science
continuous attacker skill
CVSS vectors
cyber threat intelligence
Cyber-security
cybersecurity metrics
complex system modeling
Human behavior
Human Factors
individual systems
IT-security
Large-scale systems
mathematical shortcomings
Measurement
methodological shortcomings
biblio
Advanced Petya Ransomware and Mitigation Strategies
Submitted by aekwall on Mon, 10/07/2019 - 10:43am
encryption
Resiliency
ransomware attack
Ransomware
pubcrawl
Petya ransomware
Organizations
Mitigations
Metrics
invasive software
heavy ransom
encryption codes
Advance Petya ransomware
Electronic mail
Cyber-security
cyber-attack
cyber world
cyber threats
cyber era
Cryptography
Computer crime
composability
anti-virus detection
biblio
Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
Submitted by Katie Dey on Mon, 09/09/2019 - 9:39pm
Articles of Interest
behavioral simulations
C3E 2019
cognitive modeling
Cognitive Security
Cyber-security
embedded cognition
Human Factors
model tracing
network simulations
training effectiveness
Cognitive Security
Articles of Interest
C3E 2019
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 10:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)
biblio
The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by aekwall on Mon, 07/01/2019 - 9:12am
methodological shortcomings
β-distribution
vulnerability database
time-to-compromise metric
Threat Landscape
Security-Metric
security of data
Security Metrics
Risk-Metric
Risk-Estimation
risk management
pubcrawl
practical cyber security risk estimation
original TTC
national CERT
Metrics
complex system modeling
Measurement
mathematical shortcomings
Large-scale systems
IT-security
individual systems
estimation
cybersecurity metrics
Cyber-security
cyber threat intelligence
CVSS vectors
continuous attacker skill
computer science
Complexity theory
complex systems
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »