Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Vulnerability
biblio
Physical Security Detectors for Critical Infrastructures Against New-Age Threat of Drones and Human Intrusion
Submitted by grigby1 on Mon, 01/11/2021 - 12:58pm
complex cyber-physical systems
continuous stream
critical infrastructure operators
critical infrastructure security
critical infrastructures
cyber incidents
deep video
Deep-learning
DEFENDER project
distributed cyber-physical systems
drone detection
early stage threat detection
fast restoration
human intruders
human intrusion
Intrusion Detection
learning (artificial intelligence)
Media Data
Metrics
modern critical infrastructures
multithreaded media input streams
neural nets
neural network deep-learning model
NVIDIA GeForce GTX 1080
NVIDIA GeForce RTX 2070 Max-Q Design
physical intrusion
physical security detectors
physical security sensors
proactive protection
pubcrawl
real-time threat identification
Region based Fully Connected Neural Network (RFCN)
remotely operated vehicles
resilience
Resiliency
Scalability
security of data
video analytics solution
Vulnerability
biblio
Abnormal Bus Data Detection of Intelligent and Connected Vehicle Based on Neural Network
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Automotive engineering
security of data
intrusion detection system
Scalability
Resiliency
pubcrawl
detection
standards
neural nets
Vulnerability
data analysis
neural network
Logic gates
Floods
Compositionality
attack
Intelligent Transportation Systems
connected vehicles
data centers
abnormal bus data
abnormal bus data analysis
abnormal bus data detection
Intelligent vehicles
optimized neural network
Intelligent Data Security
Intelligent Data and Security
biblio
Stealthiness of Attacks and Vulnerability of Stochastic Linear Systems
Submitted by grigby1 on Fri, 11/20/2020 - 12:53pm
security of data
security
cyber-physical systems
pubcrawl
resilience
Resiliency
Scalability
control engineering computing
Vulnerability
Linear systems
Cyber-security
stochastic systems
Stochastic processes
Detectors
Stability analysis
Steady-state
Kalman filters
estimation error
stealthiness
stealthy attacks
stochastic linear system
Stochastic Linear Systems
Stochastic Computing Security
biblio
Research on Vulnerability Ontology Model
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
security of data
Ontologies
security
Resiliency
pubcrawl
standards
Databases
Vulnerability
Economics
finance
ontologies (artificial intelligence)
Ontology
Communication networks
inference mechanisms
Compositionality
CVE
capec
CWE
industry public standards
Inference Rules
information security public databases
knowledge inference
public information systems
security vulnerability ontology model
vulnerability class
weakness class
Information Reuse and Security
biblio
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Submitted by aekwall on Mon, 11/09/2020 - 12:11pm
address-space layout randomization
advanced attacker
ASLR
code addresses
code gadgets
code pointers
Compositionality
computer science
Electronic mail
exploitation
information disclosure detection
information disclosure mitigation
Information Reuse and Security
just-in-time code-reuse attacks
Layout
Memory management
multiple position-independent ROP
Payloads
Position-Independent Code-Reuse Attacks
pubcrawl
relative memory
Resiliency
security
security of data
Software
software reusability
source code (software)
Vulnerability
biblio
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 12:36pm
Complexity theory
internet
Java
learning (artificial intelligence)
Measurement
method-level software metrics
method-level traceable patterns
Metrics
metrics testing
nano-pattern
nanopatterns
Object oriented modeling
Predictive models
program testing
pubcrawl
security
security of data
Software
software metrics
software quality
software security
vulnerabilities
Vulnerability
vulnerability prediction models
vulnerable code
vulnerable methods
web services
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 12:51pm
Attack Circuit
attack graph
attack graphs
Computing Theory
Exploitability
graph theory
impact
Internet of Things
IoT device security
IoT network security
Metrics
Network
network flow
pubcrawl
Risk
security
security assessment
Security Metrics
security of data
SIEM logs
Vulnerability
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
actual vulnerabilities
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
CVSS v3 framework
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
IoT embedded networks
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
security
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
biblio
Analysis of Cyber-Physical Security in Electric Smart Grid : Survey and challenges
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
Monitoring
architecture
data privacy
privacy concerns
security
SCADA
SCADA systems
cyber-physical systems
Human behavior
pubcrawl
Vulnerability
Reliability
cyber-physical security
privacy
smart power grids
cyber physical systems
Smart Grid
power engineering computing
Smart Grids
Human Factors
attack motivation
CPS
Meters
security model
ICT
cyber-physical system
communication system
defence
electric smart grid
information and communication technology
privacy issue
security concern
CPS Privacy
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 11:32am
APT attack
APT security attack
composability
Compositionality
computational intelligence
Cryptography
electric power IoT
Hardware
Internet of Things
IoT based technology
Knowledge representation
network attack
networked power terminal equipment oriented cyberspace security
Ontologies
ontologies (artificial intelligence)
Ontology
ontology based security risk model
ontology-based knowledge representation method
operating systems
power engineering computing
power grids
power IoT terminal device
power system security
power system stability
power terminal device
pubcrawl
security
security of data
security risk model
Vulnerability
1
2
3
4
5
6
7
8
next ›
last »