Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
system security
biblio
A Scaffolding Design Framework for Developing Secure Interoperability Components in Digital Manufacturing Platforms
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
program logic controllers
virtual open operating system
vf-OS security command centre
vf-OS IO toolkit generator
vf-OS IO components
system security
System Interoperability
software tools
software scaffolding
software applications
security of data
secure interoperability components
Scalability
scaffolding design framework
pubcrawl
programmable controllers
code generation technique
platform security
platform integration automation
operating systems (computers)
open systems
legacy file formats
i/o systems security
i-o systems security
human computer interaction
Fi-Ware
enterprise resource planning systems
enterprise resource planning
Digital manufacturing platforms
Cybersecurity
cyber-physical systems
Connected Smart Factories
biblio
Biometric Authentication Security System Using Human DNA
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
biometric encryption
System authentication
human DNA based security systems
Human DNA
human biometric characteristics
cryptosystem technique
Cryptography System
biometric authentication security system
biometric features
DNA
Cryptography
system security
resilience
biometrics (access control)
Scalability
message authentication
Resiliency
Metrics
pubcrawl
biblio
Identification of Critical-Attacks Set in an Attack-Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
Industrial Control Systems
water treatment cyber-physical system
water treatment
system-level security property
system vulnerabilities
strongly-connected-components
security administrators
SCC
Min Label-Cut
critical-attacks set
complex attacks scenarios
attack-paths
attack-graph
advanced multifaceted attacks
attack graphs
attack scenarios
security of data
attack graph
Predictive Metrics
security measurements
control engineering computing
industrial control
system security
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
security
Internet of Things
biblio
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
connected car systems
automotive electronics
controller area networks
automotive cybersecurity tests
automotive engineers
automotive field
automotive security tooling
black-box fuzz testing
CAN fuzz testing example
fuzzing
controller area network fuzz testing
cybersecurity testing
dynamic security test
dynamic software testing
Fuzz Testing
laboratory vehicle
SAE J3061
secure-by-design
pubcrawl
security of data
Internet of Things
security
Protocols
Software
embedded systems
cyber-physical systems
Resiliency
Automotive engineering
program testing
system security
program debugging
Prototypes
controller area network
black-box testing
controller area network security
automobiles
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Security Network On-Chip for Mitigating Side-Channel Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:08am
multiple countermeasures
compromised device
contemporary hardware threats
design complexity
electromagnetic analysis attacks
electromagnetic interference
hardware security threats
high-confidence security network on-chip
individual threats
machine learning security IC
malicious physical interference
modern ICs
attack-specific countermeasures
on-chip distribution networks
On-chip power delivery
on-chip voltage variations
operating device-under-attack
robust confidence security network on-chip
security networks
Side-channel attack
side-channel attack mitigation
strict performance requirements
trained ML ICs
network on chip security
timing
Scalability
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
machine learning
physical interaction
system-on-chip
system security
sensors
Attack detection
security of data
Hardware Security
side-channel attacks
integrated circuit design
data analysis
malicious activity
integrated circuits
network-on-chip
active attack
advance invasive attacks
advance noninvasive attacks
advanced technology nodes
biblio
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
Software
Scalability
security breaches
Security Evaluation
security of data
security patch
security patch management
security threats
Servers
push-type patch management
software assurance
software vulnerabilities
stochastic reward net
system security
virtual machine
virtual machine based intrusion tolerant system
virtual machines
VM-based intrusion-tolerant system
intrusion tolerance
attack behavior
composability
composite stochastic reward net model
Computational modeling
computer security
computer systems
defense behaviors
interval availability
Resiliency
malicious attack
Markov processes
Markov regenerative process
periodic vulnerability checking strategy
phase expansion
point-wise availability
pubcrawl
pull-type patch management
biblio
Research on Block Chain Network Intrusion Detection System
Submitted by grigby1 on Tue, 01/21/2020 - 11:20am
intrusion tolerance
WLAN
Wireless communication
system security
Resiliency
resilience
pubcrawl
network intrusion detection
network intrusion
Monitoring
Metrics
Block Chain
Intrusion Detection Systems
Intrusion Detection
detection system
computer network security
composability
Communication system security
blockchain
block chain network intrusion security
block chain network intrusion privacy
block chain network intrusion detection system
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 10:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
« first
‹ previous
1
2
3
4
5
next ›
last »