Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
threats
biblio
Encryption Algorithms based on Security in IoT (Internet of Things)
Submitted by aekwall on Thu, 07/14/2022 - 4:18pm
Smart homes
threats
Light Weight
key
Algorithm
QR codes
smart cities
Memory management
cyber-physical systems
Signal processing algorithms
Ciphers
Resiliency
pubcrawl
Wireless communication
wireless sensor networks
IoT
Cryptography
biblio
Security architecture for UAV
Submitted by aekwall on Mon, 12/20/2021 - 12:19pm
Neural networks
wireless
Wi-Fi
vulnerabilities
threats
statistical analysis
security
Resiliency
pubcrawl
Ad Hoc Network Security
Metrics
Law
cyber-physical systems
computer architecture
Compositionality
attacks
ad-hoc systems
Ad hoc networks
biblio
Security of Smart Grid Management of Smart Meter Protection
Submitted by grigby1 on Tue, 11/30/2021 - 3:02pm
Radio frequency
vulnerabilities
threats
smart meters
smart grid security
Smart Grids
Smart Grid
Scalability
Resiliency
resilience
attacks
pubcrawl
Metrics
Meters
Government
Fire
distributed algorithm
Cyber-security
computer security
Companies
biblio
Reducing Threats to Key U.S. Supply Chains
Submitted by willirn1 on Fri, 10/22/2021 - 4:41pm
supply chain management
C3E
threats
Supply Chain
Risk
counterintelligence
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
biblio
Framework for Analyzing the Security of Robot Control Systems
Submitted by grigby1 on Thu, 12/17/2020 - 1:36pm
pubcrawl
vulnerabilities
threats
security system
security of data
security
robots
robotized system
Robotic system
Robot sensing systems
robot operating systems
robot control systems
Resiliency
resilience
Application software
policy-based governance
operating systems
model
mobile robots
malware
Human Factors
Human behavior
group management system
framework
control engineering computing
attacks
attacker
biblio
Issues and Trends in Information Security Policy Compliance
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
ISP
threats
Standards organizations
Security Policies Analysis
security of data
security behaviour
pubcrawl
policy-based governance
Personnel
Organizations
organizational information security policies
Compliance
information security policy compliance
information security policy
information security management
information security incidents
information security
information leakage threats
information governance
information and communication technology
Industry 4.0
computer security
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
Phishing
virtual experiences
unsolicited e-mail
threats
threat mitigation
threat
security measures
security defense mechanisms
risk mitigation
Resiliency
resilience
pubcrawl
Attack vectors
Metrics
mass email infrastructures
machine learning
Human Factors
Human behavior
fraudulent content
fraud
email attacks
electronic mail service
Computer crime
biblio
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Metrics
vehicle sensors
tracing system
threats
telecommunication channels
Start System
security
Scalability
Resiliency
pubcrawl
PKES system
PKES Forcefield movement-tracing
pattern locks
passive keyless entry and start system
multifactor authentication
amplified relay attack
keys (locking)
Key Bearing algorithm
Human Factors
Human behavior
entry access system
coordinate tracing
CAR security
Bluetooth communication channel
Bluetooth
automotive electronics
automobile security
authentication
attacks
1
2
3
next ›
last »