Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
IEEE standards
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by
aekwall
on Mon, 11/16/2020 - 1:57pm
Safety
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Software Architecture
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
functional-level security requirements
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
system life cycle
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by
grigby1
on Mon, 11/02/2020 - 11:28am
authorisation
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
Diagnosis
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
IJTAG
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
Registers
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
biblio
Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in CPS Security Testbed
Submitted by
grigby1
on Tue, 10/06/2020 - 1:01pm
security of data
security
CPS
cyber-physical systems
Metrics
resilience
Resiliency
IEEE standards
Computational modeling
power engineering computing
composability
real-time systems
power grids
IEC standards
SCADA
Scalability
Relays
WAMS
Software systems
Concurrent computing
Phasor measurement units
cyber physical systems
100% realtime performance
Concurrency
coordinated cyber attacks
cyber-event-triggered power grid blackout
cyber-event-triggered power system blackout
cyber-physical system testbeds
grid data streams
hardware-in-the-loop
hardware-in-the-loop CPS security testbeds
HIL CPS security testbed
HIL multigrid system
HIL realtime digital simulator environment
IEEE-118 bus grid model
IEEE-39 bus grid models
industry-grade hardware
interdependent events
large-scale grid models
modular integration designs
Multi-Grid
multigrid isolated models
multitude designs
phasor measurement
physics-constrained recovery
Power and Cyber System Testbed
real-time execution environment
restoration process
synthetic grid model
Ukrainian grid
biblio
Mitigating JTAG as an Attack Surface
Submitted by
grigby1
on Fri, 08/28/2020 - 10:51am
attack surface
authorisation
BIT
boundary scan
boundary scan architecture
boundary scan testing
Built-In Test
chip lock
computer debugging
Cryptography
debug architectures
depot system repair
embedded systems
firmware
IEEE 1149.1
IEEE standards
joint test action group standards
JTAG
JTAG interface
JTAG test access ports
JTAG-based debug
key registers
key systems
materiel availability issues
Metrics
microprocessor chips
on-chip embedded instrumentation
private instructions
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
security
standard test access port
system memory
biblio
Performance Evaluation of Some Industrial Loss of Field Protection Schemes Using a Realistic Model in The RTDS
Submitted by
grigby1
on Thu, 07/16/2020 - 10:43am
admittance based schemes
ANSI code
composability
CPS modeling
earthing
field protection schemes
field relay
IEEE standards
Impedance
important protection functions
industrial LOF protection schemes
industrial loss
Loading
LOF events
LOF relay
LOF studies
loss of field
loss of field relay
machine protection
Metrics
overvoltage protection
performance evaluation
phase domain model
power generation
power generation faults
power generation protection
power plants
pubcrawl
real-time-digital-simulator
realistic power generation unit
realistic system
relay protection
Relays
Reliability
resilience
Resiliency
Rotors
security viewpoints
simulations
synchronous generator
Synchronous generator protection
synchronous generators
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by
aekwall
on Mon, 01/20/2020 - 11:01am
-play instrument wrapper
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
flexible access
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
integrating lightweight encryption
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
RSN
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
biblio
Quickest Detection of Time-Varying False Data Injection Attacks in Dynamic Smart Grids
Submitted by
grigby1
on Mon, 12/30/2019 - 1:22pm
False Data Detection
composability
computational complex scaling
computational complexity
cumulative sum
cumulative-sum-type algorithms
cyber physical systems
Cybersecurity
dynamic smart grid systems
dynamic smart grids
expected false alarm period
false data injection attacks
FDIAs
Human behavior
IEEE standard power system
IEEE standards
power engineering computing
power system security
pubcrawl
resilience
Resiliency
security of data
smart power grids
time-varying false data injection attacks
time-varying state variables
worstcase expected detection delay
biblio
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
security of data
computer network security
intrusion detection system
IP networks
security
Software
real-time systems
Resiliency
pubcrawl
composability
Global Positioning System
malicious activities
Metrics
standards
Decision Making
Phasor measurement units
smart power grids
Smart Grid
power engineering computing
command injection attacks
aforementioned cyber-attacks
attack capabilities
command injection attack
Cyber-physical attacks
decentralized decision making capability
defense mechanisms
IEEE standards
packet drop attack
phasor measurement
potential physical impacts
stealthy cyber-attacks
stealthy data manipulation attack
stealthy man-in-the-middle attacks
synchrophasor communication standard
synchrophasor devices
synchrophasor network security
synchrophasor technology
synchrophasor-based synchronous islanding testbed
synchrophasor-based systems
biblio
Trustworthy reconfigurable access to on-chip infrastructure
Submitted by
grigby1
on Fri, 02/02/2018 - 12:29pm
access mechanisms
composability
cyber physical systems
data communication
embedded systems
external interfaces
Hardware Security
IEEE standards
IEEE Std 1149
IEEE Std 1500
IEEE Std 1687
IJTAG
Instruments
integrated circuit testing
JTAG
Latches
Multiplexing
on-chip embedded infrastructure
pubcrawl
reconfigurable scan network
reconfigurable scan networks
Registers
Resiliency
RSN
scan pattern generation method
secure DFT
secure pattern retargeting
security
security problem
system-on-chip
trustworthiness
trustworthy access pattern generation
trustworthy access sequences
trustworthy data transmission
trustworthy reconfigurable access
Trustworthy Systems
biblio
Artificial neural network based static security assessment module using PMU measurements for smart grid application
Submitted by
grigby1
on Mon, 11/20/2017 - 11:20am
artificial neural network
artificial neural network based static security assessment module
Artificial Neural Networks
collaboration
genetic algorithm
genetic algorithms
Governance
Government
IEEE standards
inter connected power system
neural nets
Neurons
optimization model
phasor measurement
Phasor Measurement Unit
Phasor measurement units
PMU measurements
Policy
policy-based governance
power engineering computing
power system security
pubcrawl
real-time systems
Resiliency
security
smart grid application
smart grid system
smart power grids
standard IEEE 30 bus system
static security assessment scheme
Training
voltage magnitude
Voltage measurement
zero injection buses
1
2
next ›
last »