Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
threat modelling
biblio
Toward a framework for assessing the cyber-worthiness of complex mission critical systems
Submitted by
aekwall
on Mon, 10/05/2020 - 10:46am
Accreditation
assurance
certification
complex military systems
complex mission critical systems
complex systems
computer security
CPS resilience
cyber
cyber physical systems
cyber-physical systems
cyber-worthiness
embedded systems
high level threat actors
highly contested cyber environment
initial framework
Large-scale systems
military computing
military systems
pubcrawl
resilience
Resiliency
risk management
security
security of data
strong level
SysML
system safety engineering
threat actor
threat modelling
threat models
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by
aekwall
on Mon, 03/16/2020 - 9:29am
cyberattack
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
pubcrawl
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
Petri nets
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
IEC 60870-5-104 protocol
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
biblio
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures
Submitted by
aekwall
on Tue, 10/22/2019 - 8:54am
security of data
Access Control
Hardware
Software
embedded systems
pubcrawl
policy-based governance
risk management
Policy
application threat analysis
Biological system modeling
configurable policy engine
connected vehicles
device life-cycle
DREAD risk assessment model
embedded architectures
embedded security
Guidelines
OEMs
policy update
policy-based security enforcement
policy-based security modelling
Secure by design
Security Modelling
STRIDE
STRIDE threat modelling
threat modelling
Security Policies Analysis
biblio
Privacy Threat Model in Lifelogging
Submitted by
K_Hooper
on Wed, 10/25/2017 - 10:55am
Human behavior
lifelogging
privacy
Privacy Policies
pubcrawl
Scalability
threat modelling
threats
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by
grigby1
on Mon, 02/27/2017 - 11:53am
Analytical models
Cloud Computing
cloud security threat modelling tool
Cloud-COVER model
Computational modeling
controls and orderings for vulnerabilities and exposures model
Data models
graph model
graph theory
modelling
propagation analysis
pubcrawl170107
pubcrawl170108
risk management
security
security of data
system threat prioritization
threat modelling
user security attribute preference