Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
vulnerabilities
biblio
Automatically Validating the Effectiveness of Software Diversity Schemes
Submitted by
aekwall
on Mon, 12/02/2019 - 11:07am
security of data
Scalability
Program processors
Resiliency
pubcrawl
Metrics
vulnerabilities
Cybersecurity
computer security
Measurement
evaluation
Semantics
Compositionality
program compilers
compilers
comparative evaluation
DARPA Cyber Grand Challenge environment
diversifying compiler
diversity strategies
diversity techniques
exploit mitigation
scant attention
software diversity
software diversity schemes
software protection
compiler security
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by
grigby1
on Tue, 10/15/2019 - 1:44pm
authentication
authorisation
authorization
AVISPA tool
Cloud Computing
Cloud federations
composability
Computational modeling
computer viruses
data confidentiality
data integrity
DDoS Attacks
enhanced secure mechanism
Human behavior
live migration
live VM migration
malicious viruses
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
source nonrepudiation
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
biblio
Internet of Things: A Survey on Communication Protocol Security
Submitted by
grigby1
on Wed, 10/02/2019 - 2:02pm
Human behavior
Human Factors
Internet of Things
IoT protocols
pubcrawl
resilience
Resiliency
RFID
RFIDs
security
survey
vulnerabilities
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by
aekwall
on Mon, 07/01/2019 - 9:12am
analysis
Assessment
classification
CNSVT
common vulnerability scoring system metric-based technique
computer network security
computer network security vulnerabilities
computer network threats
computer networks
computer science
computer security
computer-based networks
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
CVSS metric-based VACC
CVSS-metric
Measurement
Metrics
Monitoring
Network
network security tools
probability
Protocols
pubcrawl
Security Metrics
threats
VACC
VSM
vulnerabilities
vulnerability Similarity Measure
biblio
Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
Submitted by
grigby1
on Mon, 02/25/2019 - 2:21pm
Cloud Computing
security of data
pubcrawl
Human behavior
Resiliency
composability
Human Factors
Indexes
cyber-physical systems
smart cities
Sensor Systems
Cryptography
Servers
Data collection
vulnerabilities
cyber security
Smart Grid
computing platform
control center
CPSS threats
cyber physical SENSOR Systems
cyber physical sensors system security
cyber security threats
enterprise command
Humidity
Intelligent sensors
local real-time control activities
physical object
process algorithm
Smart Sensor
wireless access points
Smart Grid Sensors
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by
aekwall
on Mon, 02/25/2019 - 10:39am
actual website
Acunetix
Computer hacking
computer science education
Crawlers
Databases
enhanced cybersecurity learning
executing SQL queries
foundational cybersecurity course
Human behavior
invasive software
Linux
Metrics
open source tools
policy-based-governance
preventive measures
privacy
pubcrawl
query processing
real-world implementation
Resiliency
retrieving sensitive information
Servers
specific website
SQL
SQL injection
SQL injection attack
threats
tools
vulnerabilities
Web sites
website connected database
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by
grigby1
on Mon, 01/21/2019 - 11:37am
security of data
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
malware
Browsers
operating system
Universal Serial Bus
cyber-attacks
advanced persistent threats
APT attacks
advanced persistent threat attacks
antivirus software
APT threat vectors
Firewalls (computing)
mitigation
multiple simulated attacks
Payloads
spearphishing
virtualized environment
vulnerabilities
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by
grigby1
on Mon, 11/19/2018 - 11:32am
attacks
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
Human behavior
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
pubcrawl
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grids
Smart Grid Sensors
smart grid stations
smartphone
smart toasters
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
biblio
Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems
Submitted by
grigby1
on Wed, 11/14/2018 - 12:19pm
bitcoin
Bitcoin exchanges
blockchain
blockchain technology
Companies
contracts
Cryptography
ecosystem issues
electronic money
expert systems
financial data processing
Governance
Hacking
Human Factors
human misbehavior
mathematical basis
nonfinancial applications
PoS
PoS blockchain systems
PoW
PoW blockchain systems
privacy
pubcrawl
Scalability
security
security pitfalls
software defects
vulnerabilities
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by
grigby1
on Wed, 09/12/2018 - 10:13am
control systems
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
Databases
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
Industrial Control Systems
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
security management
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
1
2
3
next ›
last »