Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
vulnerability assessment
biblio
Automated Security Assessment for the Internet of Things
Submitted by grigby1 on Thu, 02/24/2022 - 2:51pm
graphical security model
Internet of Things
machine learning
Manuals
Measurement
Metrics
natural language processing
Predictive models
predictive security metrics
pubcrawl
security
smart buildings
vulnerability assessment
biblio
SAIF: Automated Asset Identification for Security Verification at the Register Transfer Level
Submitted by aekwall on Tue, 02/22/2022 - 2:16pm
Measurement and Metrics Testing
vulnerability assessment
security verification.
Security Metrics
security assets
Solid modeling
Very large scale integration
Registers
Metrics
pubcrawl
Analytical models
Hardware
Measurement
Benchmark testing
biblio
Vulnerability Assessment for ICS system Based on Zero-day Attack Graph
Submitted by grigby1 on Wed, 07/28/2021 - 8:46am
Metrics
zero-day
vulnerability assessment
unknown vulnerability
Security Metrics
security metric
security
risk management
pubcrawl
attack graph
Measurement
integrated circuits
ICs
critical infrastructure
Computing Theory
Buildings
automation
biblio
Assessing Information Risks When Using Web Applications Using Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
pubcrawl
Web application vulnerability scanner
Web application
vulnerability assessment
security of data
security
risk analysis
Resiliency
resilience
Cyber Physical System
Metrics
internet
information risk concepts
information risk assessment
Information risk
Fuzzy logic
data protection discipline
biblio
Vulnerability assessment and detection of Deepfake videos
Submitted by grigby1 on Fri, 01/15/2021 - 12:12pm
vulnerability assessment
VidTIMIT database
VGG
pre-trained generative adversarial network
Open Source Software
Facenet neural networks
face recognition systems
deepfake video detection
DeepFake
video signal processing
gan
vulnerability detection
learning (artificial intelligence)
face recognition
Metrics
public domain software
neural nets
Scalability
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
vulnerability assessment
command injection attacks
supervisory control and data acquisition (SCADA)
structuredquery language injection attacks
intrusion detection solutions
Industrial Internet of Things (IIoT)
Industrial Internet of Things
IIoT systems
cyber-vulnerability assessment
cyber attack
electromagnetic interference
Big Data Analytics
IDS
SQL
machine learning (ML)
cyber-attacks
Internet of Things
Metrics
Structured Query Language
Protocols
network security
composability
production engineering computing
Intrusion Detection
intrusion detection system
Resiliency
resilience
pubcrawl
data analysis
machine learning
security of data
learning (artificial intelligence)
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
feature extraction
Web application vulnerability assessment
vulnerability assessment
security of data
Resiliency
pubcrawl
machine learning algorithms
machine learning
logical Web pages
learning (artificial intelligence)
internet
hybrid model
Bayes methods
Entropy
Decision trees
Decision Tree
consumer relationship
composability
Classification algorithms
business process
business data processing
belief networks
Bayesian Belief Network (BBN)
Bayesian belief network
biblio
Analysis of Complex Networks for Security Issues using Attack Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
security issues
VA scans
VA reports
network vulnerabilities
network health
MulVal
Attack Graph Generation Tools.
attach graph
attack paths
attack graphs
attack graph
Informatics
Predictive Metrics
computer network security
Complexity theory
Security analysis
network theory (graphs)
complex networks
computer security
tools
Databases
composability
pubcrawl
Resiliency
vulnerability assessment
Organizations
biblio
A Vulnerability Assessment Method of Cyber Physical Power System Considering Power-Grid Infrastructures Failure
Submitted by grigby1 on Fri, 04/24/2020 - 4:37pm
failure analysis
Power Grid Vulnerability Assessment
vulnerability assessment method
vulnerability assessment
single component function failure
power-grid infrastructures failure
power system reliability
power system faults
Power Grid Network
power components
multiple components synchronization function failure
local CPPS model
information components
functional characteristics
full probability evaluation formula
cyber-physical systems
cyber-physical power system
cyber physical power system
CPPS operation
cooperative attack
communication components
Bayesian network
probability
Metrics
power grids
composability
security
Resiliency
resilience
pubcrawl
1
2
3
4
next ›
last »