Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Mission Assurance
biblio
An Resilient Cloud Architecture for Mission Assurance
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
security of data
Monitoring
Cloud Computing
computer architecture
pubcrawl
Planning
Information systems
resilience
information system
Information services
cyber threat
Mission Assurance
complex cyber threat environment
cyber physical environment
dual loop architecture
environment awareness network
mission assurance system deployment mechanism
perception analysis planning adjustment
resilient cloud
resilient cloud architecture
resilient cloud environment
resilient dual loop architecture
resource planning
resource situation generation
Resiliency
Resilient Security Architectures
biblio
Mission Resilience for Future Army Tactical Networks
Submitted by grigby1 on Tue, 10/06/2020 - 1:10pm
autonomous vehicles
battlefield operations
command and control systems
CPS resilience
cyber assets
Cyber Physical System
cyber physical systems
cyber resilience metrics
cyber-physical systems
future army tactical networks
Measurement
military communication
military operations
mission
Mission Assurance
Mission critical systems
mission essential functions
mission resilience metrics
network architecture
psychometric
pubcrawl
resilience
Resiliency
sensors
Streaming media
tactical forces
tactical network
tactical network architectures
Task Analysis
traditional engineering methods
Weapons
biblio
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance
Submitted by grigby1 on Tue, 01/21/2020 - 10:32am
collaboration
composability
Cyber Attacks
cyber space threat
graph theory
Human behavior
Information Assurance
Metrics
Mission Assurance
mission impact assessment
mission impact graph
network attacks
policy-based governance
pubcrawl
ranking algorithm
resilience
Resiliency
Scalability
security countermeasures
security of data
biblio
Mission-Centric Automated Cyber Red Teaming
Submitted by aekwall on Mon, 08/05/2019 - 9:40am
Resiliency
Human behavior
composability
policy-based governance
Metrics
cyber security
pubcrawl
Information Assurance
AI Planner
Cyber Automation
Cyber Resiliency
Mission Assurance
red teaming
visualisation
biblio
Functionality and Security Co-Design Environment for Embedded Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:23am
Resilient Security Architectures
Resiliency
adversarial cyber effects
anomalies detection
asymmetric multicore processing
Availability
co-design
co-design environment
command and control systems
Complexity theory
computer network security
critical missions
Cryptography
deliberate attacks
department of defense mission systems
DoD
electronic signal intelligence systems
electronic warfare
embedded systems
functionality
Hardware
hardware development
intelligence surveillance and reconnaissance sensors
Lincoln asymmetric multicore processing architecture
Mission Assurance
mission functions
Multicore processing
multiprocessing systems
pubcrawl
recovery
resilience
resilient embedded system
Secure Processing
security
software development
Sophisticated Attacks
surveillance
System recovery
testbed
biblio
Cyber Terrain Mission Mapping: Tools and Methodologies
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
composability
Computational modeling
computer security
cyber assets
Cyber Dependencies
cyber dependency impact analysis
cyber mission mapping
cyber situational awareness
cyber terrain mission mapping
Cyberspace
key terrain cyber
Metrics
military computing
Mission Assurance
mission execution
mission relevant cyber terrain
mission-centric cybersecurity
Organizations
pubcrawl
Resiliency
security of data
sensors
situational awareness
tools
biblio
Designing agility and resilience into embedded systems
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
unmanned aerial systems
UAS
Systems architecture
systems analysis
system analysis and design
security of data
RF environment
Resilient Security Architectures
Resiliency
resilience
remotely located communicating devices
pubcrawl
mission success
mission objectives
mission assurance a challenging problem
Mission Assurance
Metrics
metric set
Measurement
high level system properties
Global Positioning System
embedded systems
design for cyber security
cyber-physical systems
cyber security
cyber resilience
CPS
computer security
best-practice security policies
autonomous aerial vehicles
attacker
attack surface
Assessment
ARES methodology
analytic process guides system developers
adversarial actors
biblio
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation
Submitted by grigby1 on Tue, 01/23/2018 - 3:01pm
ARMOUR
Automated computer network defence
Automated Cyber Defence
automated mission-oriented decision support
Automated Response Actions
composability
Computational modeling
computer architecture
computer network security
computer networks
Cyber Attacks
cyber defence integration framework
cyber defence science-and-technology platform
data analysis
Data models
data sources
Decision Making
decision support
Decision support systems
Defence Research and Development Canada
infrastructure data analysis
Mission Assurance
mission-context information
near real-time defensive cyber operations
network operators
network responses
network topology
network-based CoA
network-based courses-of-action
Proactive Cyber Defence
pubcrawl
Resiliency
Responsive Cyber Defence
security
situational awareness
Software
Software Vulnerability Mitigation
vulnerability mitigation
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Active dependency mapping
artificial degradation
Automated Dependency Mapping
computer security
Conferences
Cyber Dependencies
cyber physical systems
cyber-physical systems
Data-driven approach
Degradation
dependency analysis
dependency relations
distributed processing
distributed systems
Ecosystems
enterprise networks
Information Reuse
interrelated software services
Mission Assurance
network environment
network performance
pubcrawl
quantitative assessment
resilience
Resilience and Robustness
Resiliency
Robustness
security
Software