Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Vulnerability
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
invasive software
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
cyber physical systems
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
cyber attack
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
Ransomware Injection
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
biblio
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Submitted by
grigby1
on Tue, 11/12/2019 - 3:25pm
challenging machine
code fixing patches
code metrics
Computer crime
cyber-crime activities
Databases
dataset
deep learnin
deep learning
extensive grid-search algorithm
F-measure
forest based classifiers
GitHub
Java
JavaScript
JavaScript programs
learning (artificial intelligence)
machie learning
machine learning
machine learning algorithms
Measurement
Metrics
mitigation techniques
natural language processing
nearest neighbour methods
node security project
pattern classification
performing algorithm
performing models
Prediction algorithms
prediction models
Predictive models
predictive security metrics
pubcrawl
public databases
re-sampling strategies
security
security vulnerabilities
Snyk platform
software metrics
software security issues
static source code metrics
Support vector machines
SVM
viable practical approach
Vulnerability
vulnerability information
vulnerable components
vulnerable functions
vulnerable javascript functions
biblio
A Method of Cyber Risk Control Node Selection Based on Game Theory
Submitted by
grigby1
on Thu, 09/05/2019 - 10:27am
composability
Control Theory
cyber attack
game theory
offensive and defensive income
pubcrawl
resilience
Resiliency
risk control
security
Vulnerability
biblio
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS
Submitted by
grigby1
on Mon, 06/10/2019 - 12:55pm
binary comparison
binary comparison technique
Classification algorithms
commas software security
composability
database management systems
feature extraction
K-Trace algorithm
knowledge database
learning (artificial intelligence)
machine learning
machine learning algorithms
open source code
patch file
patched information
privacy
pubcrawl
real-world CWE vulnerabilities
resilience
Resiliency
security
security of data
Software
software security
source files
tools
VMPBL
Vulnerability
vulnerability types
vulnerable functions
vulnerable-patched functions
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
Computer crime
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Drupal website pages
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
privacy
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
tools
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
biblio
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
Submitted by
grigby1
on Thu, 02/14/2019 - 10:22am
cross-site scripting
pubcrawl
resilience
Resiliency
Secure File Sharing
security
security patterns
Software Architecture
System recovery
Vulnerability
biblio
Revery: From Proof-of-Concept to Exploitable
Submitted by
grigby1
on Thu, 02/14/2019 - 10:19am
pubcrawl
Metrics
composability
taint analysis
exploit
Vulnerability
Symbolic Execution
fuzzing
biblio
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack
Submitted by
grigby1
on Fri, 02/08/2019 - 3:28pm
security of data
tools
resilience
pubcrawl
Metrics
Resiliency
composability
graph theory
Communication networks
Servers
Vulnerability
Firewalls (computing)
attack graph
attack path depth
attack path number
attacker
cognition
generation attack graph
LAPA framework
logic-based attack graph
logical language
logical property specification
logical reasoning algorithm
model checking
network risk
network security risk
network vulnerability analysis methods
potential attack
attack graphs
biblio
Reducing Vulnerability to Cyber-Physical Attacks in Water Distribution Networks
Submitted by
grigby1
on Mon, 01/21/2019 - 11:30am
actuator security
actuators
composability
control requirements
cyber attack
cyber physical systems
Cyber-physical attacks
cyber-physical security level
cyber-physical systems
digital devices
Human behavior
industrial control
Industrial Control Systems
malicious attacks
Metrics
Monitoring
physical processes
power engineering computing
power system security
programmable controllers
pubcrawl
Redundancy
redundant cyber components
Resiliency
security
security of data
sensor measurements
sensors
simple control laws
Vulnerability
water distribution
water distribution networks
water resources
water supply
biblio
Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Submitted by
grigby1
on Mon, 11/19/2018 - 11:32am
Compositionality
computer network security
CVE
Human behavior
Human Factors
markov chain
Markov Chain model
Markov processes
network administrators
network attacks
power system security
probability
probability density
pubcrawl
resilience
Resiliency
security levels
security of data
Smart Grid
smart grid comprehensive analysis
Smart Grid Sensors
smart power grids
telecommunication security
transitions probabilities
Vulnerability
Wi-Fi network
wireless
wireless LAN
wireless network vulnerabilities
1
2
3
4
5
next ›
last »