Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Vulnerability Analysis
biblio
5G Core Security in Edge Networks: A Vulnerability Assessment Approach
Submitted by grigby1 on Mon, 04/18/2022 - 11:38am
5G attack graphs
5G attack vector
5G Edge security
5G mobile communication
5G security testbed
Computers
Economics
pubcrawl
Scalability
security
security scalability
Vulnerability Analysis
biblio
Secure Codecity with Evolution: Visualizing Security Vulnerability Evolution of Software Systems
Submitted by aekwall on Tue, 05/18/2021 - 3:20pm
visualization
Vulnerability Evolution
Re-engineering
3D software visualization
3D graphics
Vulnerability Analysis
Human-computer interaction
Three-dimensional displays
Compositionality
Buildings
security
Urban areas
usability
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
Task Analysis
biblio
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
risk management
miniature ICS
proactive security response
probabilistic multiattribute vulnerability criticality analysis model
production engineering computing
pubcrawl
quantitative evaluation
quantitative security metrics
resilience
Resiliency
Metrics
Scalability
Security Criticality Analysis
Security Impact Analysis
security of data
security risk assessment scheme
Vulnerability Analysis
vulnerability host components
vulnerability severities
vulnerability-based impact criticality estimation
Functional Dependency
Compositionality
control engineering computing
control uncertainties
Cyber Dependencies
cyber environments
cyber security risks
cyber threats
Cybersecurity
distributed system
attack probabilities
Human Factors
ICS networks
ICS security
impact estimation
industrial control
Industrial Control System (ICS)
Industrial Control Systems
MAVCA model
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 2:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
Submitted by grigby1 on Fri, 09/18/2020 - 2:15pm
pre-silicon security assessment
design stage
formal verification methods
hardware designer
hardware overhead
hardware system
hardware vulnerabilities
language based framework
language-based approach
language-based hardware security verification
malicious logic detection
potential security vulnerabilities
design mistakes
promising solution
QIF model
QIF-Verilog
quantified information flow model
quantitative information-flow
security rules
verification process
Verilog type systems
vulnerable logic detection
compiler security
integrated circuit testing
Hardware design languages
Cryptography
security solutions
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Hardware
Integrated circuit modeling
hardware description languages
Scalability
Registers
integrated circuit design
formal verification
Measurement
Compositionality
uncertainty
Vulnerability Analysis
electronic engineering computing
data flow
biblio
Attacks and vulnerability analysis of e-mail as a password reset point
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
e-mail servers
brute force attacks
Vulnerability Analysis
social media
Social engineering attack
self-service password reset point
security questions
public knowledge attainable
personal Email account
Password Reset
Mobile handsets
mobile devices
middle attack
Email
authorisation
Brute-force Attack
Computer hacking
policy-based governance
Human Factors
Security analysis
password
Electronic mail
emails
collaboration
pubcrawl
internet
Protocols
biblio
Big Data Security Issues and Natural Language Processing
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
Computer crime
natural language processing technology
DNS
cyber security issues
big data security issues
advanced persistent threat detection
Phishing
Information Assurance
data privacy
natural language processing
cyber-attacks
spam detection
Vulnerability Analysis
advanced persistent threat
pubcrawl
Human behavior
Resiliency
information security
cyber security
security
malware
Conferences
Organizations
Big Data
Scalability
biblio
A dynamic defense-attack game scheme with incomplete information for vulnerability analysis in a cyber-physical power infrastructure
Submitted by grigby1 on Fri, 04/24/2020 - 4:38pm
pubcrawl
resilience
Resiliency
composability
Metrics
cyber-physical power systems
GAME THEORY CYBER-PHYSICAL ATTACKS
particle swarm optimization
Vulnerability Analysis
Power Grid Vulnerability Assessment
1
2
3
4
next ›
last »