Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
critical infrastructure
biblio
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:35pm
collaboration
composability
computer network security
computer security
critical infrastructure
critical infrastructures
electric industrial facilities
Home appliances
Human behavior
Human Factors
internet
Internet background radiation traffic
Internet frontier
internet of malicious things
Internet of Things
Internet-scale Computing Security
Internet-scale insecurities
internet-scale unsolicited IoT devices inference
Internet-wide scanning
IoT cyber security situational awareness
IoT malicious raw data
IoT paradigm
Metrics
Policy Based Governance
pubcrawl
resilience
Resiliency
Scalability
smart home appliances
Smart homes
unsolicited Internet-scale IoT devices
unsolicited IoT devices
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
security
security of data
critical infrastructure
critical infrastructures
Resiliency
pubcrawl
vulnerabilities
Companies
Government
Software Architecture
5G mobile communication
resilience
Telecommunications
threats
Communications
security approach
disasters
natural disasters
criminal attacks
extreme weather events
holistic situation awareness
RESISTO H2020 EU-funded project
risk mitigation
telecom infrastructures
Resilient Security Architectures
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
application configurations
application security
automation
Business
context-aware security assessment automation
critical infrastructure
Dynamic Application Security Testing
Measurement
metrics testing
Metrics
Ontologies
ontologies (artificial intelligence)
Ontology
ontology-based dynamic security assessment automation
ontology-based security model
pubcrawl
quantifiable security assessment process
security aptitude
security assessment architecture
Security Metrics
security of data
security testing
standards
testing
tools
ubiquitous computing
virtualisation
Virtualization
biblio
Measurement and Analysis of Cyber Resilience for Control Systems: An Illustrative Example
Submitted by grigby1 on Tue, 10/06/2020 - 1:10pm
control system environment
control system operation
control system security
control systems
CPS resilience
critical infrastructure
critical infrastructures
cyber attack
Cyber Attacks
cyber physical systems
cyber resilience
cyber security
cyber threats
cyber-physical systems
cyberattack
Digital Information
digital systems
frequency control
Frequency measurement
load frequency control
pubcrawl
resilience
Resiliency
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
advanced communication technologies
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
Cyber-physical attacks
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
modern computing
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
research target
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
biblio
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Submitted by aekwall on Mon, 10/05/2020 - 10:47am
Resilient Security Architectures
Resiliency
Active Defence
business operations
CPS resilience
critical infrastructure
critical infrastructures
cyber physical systems
cyber resilience
Cyber Resilient Embedded System
Cyber-Physical Embedded System
embedded architectures
embedded security domains
embedded security microarchitecture
embedded security requirements
embedded systems
embedded technologies
international security regulations
microarchitectural characteristics
next-generation critical infrastructure
pubcrawl
Recover
Response
security breach
security foundation
security methods
security of data
Security Regulation
serious embedded security challenges
technology manufacturers
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 12:08pm
production engineering computing
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
cryptocurrency
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
Data Mitigation
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Ransom
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 9:18am
security
security of data
critical infrastructure
critical infrastructures
information security
Resiliency
pubcrawl
computer security
Cyberspace
National security
Europe
critical information infrastructure
air gap
common cyberspace
critical infrastructure security
cyber environment
information environment
informational space
intergovernmental national views
protection of critical infrastructure
Damage Assessment
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by aekwall on Mon, 07/06/2020 - 9:18am
Inspection
critical infrastructure
Resiliency
pubcrawl
Cameras
Three-dimensional displays
autonomous aerial vehicles
National security
Bridges
Aircraft
disasters
—sUAS
automated damage assessment
Homeland Security
Infrastructure Inspection
Laser radar
lidar
natural disasters
online mapping technique
optical radar
post-disaster response
small unmanned aircraft systems
sUAS
Damage Assessment
biblio
A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
security of data
security
computer architecture
Resiliency
pubcrawl
standards
Software Architecture
Information systems
security attributes
Guidelines
critical information infrastructure
Network Security Architecture
network architecture
architectural design
Attack Hops
critical infrastructure
data centers
defense in depth
defense-in-depth approach
N-tier/shared nothing system architectures
Nested Zones
ring-based nested network zones
secured information systems
security architectural framework
security architecture
security architecture framework
structural design
1
2
3
4
5
next ›
last »