Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
expert systems
biblio
Developing Accessible and Usable Security (ACCUS) Heuristics
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
expert systems
security
accessibility
expert evaluation
Heuristics
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
Usable Security
biblio
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
Submitted by grigby1 on Mon, 06/17/2019 - 11:51am
expert systems
privacy
decision patterns
Games
Human Factors
Metrics
pubcrawl
resilience
Scalability
security decisions
security requirements
Security Risk Management
biblio
Abnormal Trajectory Detection for Security Infrastructure
Submitted by aekwall on Mon, 03/25/2019 - 9:57am
expert systems
security
composability
Detection anomaly
Metrics
One Class SVM
pubcrawl
Resiliency
security infrastructure
sequence analysis
signal processing security
biblio
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
cross-site scripting
expert systems
pubcrawl
resilience
Resiliency
Secure File Sharing
security
security patterns
Software Architecture
System recovery
Vulnerability
biblio
A quantifiable Attack-Defense Trees model for APT attack
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
trees (mathematics)
probability
network attack
expert systems
Eigenvalues and eigenfunctions
attack-defense trees model
Attack-Defense Trees
APT attack
advanced persistent threat attacks
advanced persistent threats
security
Scalability
Resiliency
Metrics
Human behavior
pubcrawl
Buildings
Analytical models
security of data
analytic hierarchy process
biblio
Power Mobile Terminal Security Assessment Based on Weights Self-Learning
Submitted by grigby1 on Wed, 11/14/2018 - 1:22pm
power system security
weights self-learning method
Training
Software
security of data
security assessment system
security assessment
security
Scalability
Resiliency
resilience
rank correlation analysis
pubcrawl
Correlation
power mobile terminal system
power mobile terminal security assessment
power mobile terminal
power engineering computing
mobile computing
machine learning
learning (artificial intelligence)
Indexes
Human behavior
Hardware
fuzzy comprehensive analysis
expert systems
biblio
Intelligent System for Automatic Performance Evaluation of Distribution System Operators
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Resiliency
performance evaluation procedure
personal criteria
power distribution economics
power distribution reliability
power engineering computing
power outage time minimization
power system security
pubcrawl
resilience
performance evaluation
Scalability
security
Switches
technical criteria
technical indicators
TES
Training
Tutorial Expert System
Tutorials
evaluation process
Companies
distribution system operators
distribution systems
economic criteria
Economic indicators
electrical distribution network operators
electrical network
electrical utilities
Electricity supply industry
automatic performance evaluation
expert systems
Human behavior
intelligent system
maintenance engineering
multicriteria evaluation
operation rules
operation standards
Operators Evaluation
biblio
The Information Security System Synthesis Using the Graphs Theory
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Russian Federation leISSlation
information security threats
optimal enterprise information protection system
optimality problem solution
optimality problem solution on the graph theory basis
protection vector isolation
pubcrawl
ranked descending graph construction
resilience
Resiliency
information security system synthesis based on graph theory
Scalability
security
security of data
Software
software complex basis
software information security
software restriction
tools
graph critical path
access subjects authentication
access subjects identification
computer storage media protection
enterprise information security
enterprise information security system
expert systems
FSTEC order No31
graph calculation
access delineation
graphs theory
graph theory
Hardware
hardware complex basis
hardware information security
Human behavior
information security
information security system synthesis
biblio
A Framework for Measurability of Security
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
security attribute
Multi-Metrics
privacy
privacy and dependability evaluation complexity
pubcrawl
resilience
Resiliency
Scalability
security
multi metrics
security enhancement
Security Evaluation
security function
security measurability
security metric
SPD evaluation complexity
system analysis and design
Communication Systems
MM framework
Measurement
Internet of Things
internet
Human behavior
experts knowledge systematic storage
expert systems
expert knowledge retrieval
ES
Engines
embedded systems
Embedded System
Databases
data privacy
computer network security
biblio
Analyst Intuition Inspired High Velocity Big Data Analysis Using PCA Ranked Fuzzy K-Means Clustering with Multi-Layer Perceptron (MLP) to Obviate Cyber Security Risk
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
pattern classification
learning (artificial intelligence)
log history annotation
malware
malware attacks
manually labelled data
MLP
Monitoring
Multi-layer Perceptron (MLP)
multilayer perceptrons
network datasets
network protocols
network user
neural network classifier multilayer perceptron base
IP networks
pattern clustering
PCA ranked fuzzy k-means clustering
principal component analysis
Principal Component Analysis (PCA)
pubcrawl
resilience
Resiliency
Scalability
scoring system
security
special semisupervise method
statistical data generation
Virus
cyber threats
analyst intuition inspired high velocity big data analysis
Artificial Intelligence
attacker IP addresses characteristics
Big Data
Clustering algorithms
computer networks
computer network security
computer security
cyber-attacks
cyber security
cyber security expert
cyber security log classification
cyber security risk
Analyst Intuition
data analysis
Data mining
efficient security monitoring system
Expectation Regulated
expert system
expert systems
Fuzzy k-means (FKM)
fuzzy set theory
High Velocity
Human behavior
integrated datasets
invasive software
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »