Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
ISO standards
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
Analytical models
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
ECC-based version
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
neural style transfer
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
symbol manipulation
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
Safety
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Software Architecture
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
functional-level security requirements
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
system life cycle
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
biblio
LeMTrac: Legislative Management and Tracking System
Submitted by grigby1 on Fri, 10/16/2020 - 10:23am
and Tracking System
collaboration
Cybersecurity
E-Governance
E-Government
Electronic government
government data processing
government services
ICT
information and communication technology
information and communications technology
ISO 9126 Software quality metric Usability
ISO standards
legislation
legislative management
LeMTrac
local government
Local Government Unit
Measurement
Municipal Local Government Units
Philippines municipalities
policy-based governance
Princeton Project Management Methodology
project management
pubcrawl
quantitative research design
resilience
Resiliency
Sangguniang Bayan offce
software metrics
software quality
tracking system
transparent government
biblio
A Security Reference Architecture for Blockchains
Submitted by aekwall on Mon, 09/28/2020 - 10:42am
security of data
Scalability
Resiliency
pubcrawl
Routing
Peer-to-peer computing
Cryptography
blockchain
risk management
security vulnerabilities
IEC standards
ISO standards
consensus protocol
security countermeasures
blockchain security
reference architecture
ISO/IEC 15408
layered systems
operational security issues
security reference architecture
surveys and tutorials
threat-risk assessment
biblio
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems
Submitted by grigby1 on Fri, 05/08/2020 - 1:20pm
architecture
Business
complexity
composability
computer architecture
design features
ERAMIS methodology
IEC standards
Internet of Things
IoT
IoT systems
IoT-enabled applications
ISO standards
methodology
Metrics
object oriented security
object-oriented programming
operational security services
pubcrawl
reference architecture-based methodology
resilience
Resiliency
security
security of data
Security Properties
Software Architecture
biblio
Alternatives to Fault Injections for Early Safety/Security Evaluations
Submitted by aekwall on Mon, 03/09/2020 - 10:17am
Safety
security of data
Scalability
Hardware
Software
embedded systems
SoC
system-on-chip
Time measurement
Resiliency
pubcrawl
Metrics
Reliability
cost reduction
ISO standards
safety-critical software
Human Factors
CPS
Circuit faults
hardware-software codesign
cyber physical systems
dependability analysis
fault injections
functional safety standards
HW-SW systems
intertwined hardware
ISO 26262
market pressure
radiation testing
RTL fault injection campaigns
system dependability constraints
Security Risk Estimation
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Windows Operating System Security
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
automated IT audit
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
ISO/IEC 27002:2013
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
Scalability
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
biblio
The Actual Problems of IT-Security Process Assurance
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
asset
business process
Companies
company business processes
IEC standards
information management
Integrated Management System
integrated management systems
ISO standards
IT-security management system
IT-security process assurance
organisational aspects
Production
pubcrawl
resilience
Resiliency
risk management
security
security of data
Standard
System recovery
Vulnerability
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
Adaptation models
Anomaly Detection
anomaly/intrusion detection
Bayes methods
Bayesian Blocks
binned RFID command counts
Computational modeling
graph theory
Human behavior
Human Factors
IEC standards
IoT
ISO standards
Knuth's Rule
modeling algorithms
modeling technique
NFC
piecewise graphs
pubcrawl
radiofrequency identification
resilience
Resiliency
RFID
RFID security
RFID traces
RFID traffic models
RFID traffic patterns
RFIDs
telecommunication security
telecommunication traffic
traffic characterization
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 9:05am
Assessment
Assessment Dimension
assessment dimensions
coverage
Heuristics
high-coverage assessment designs
IEC standards
information security
ISO standards
Ontologies
Ontology
Proposals
pubcrawl
resilience
Resiliency
Scalability
security
security aspects
security assessment designs
security assessment heuristics
security characteristics
Security Heuristics
security of data
security property
security standard
Standard
standards
system security
Systematics
1
2
next ›
last »