Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ISO standards
biblio
A Security Reference Architecture for Blockchains
Submitted by aekwall on Mon, 09/28/2020 - 10:42am
ISO standards
threat-risk assessment
surveys and tutorials
security reference architecture
operational security issues
layered systems
ISO/IEC 15408
reference architecture
blockchain security
security countermeasures
consensus protocol
security of data
IEC standards
security vulnerabilities
risk management
blockchain
Cryptography
Peer-to-peer computing
Routing
pubcrawl
Resiliency
Scalability
biblio
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems
Submitted by grigby1 on Fri, 05/08/2020 - 1:20pm
methodology
Software Architecture
Security Properties
security of data
security
Resiliency
resilience
reference architecture-based methodology
pubcrawl
operational security services
object-oriented programming
object oriented security
Metrics
architecture
ISO standards
IoT-enabled applications
IoT systems
IoT
Internet of Things
IEC standards
ERAMIS methodology
design features
computer architecture
composability
complexity
Business
biblio
Alternatives to Fault Injections for Early Safety/Security Evaluations
Submitted by aekwall on Mon, 03/09/2020 - 10:17am
Human Factors
Security Risk Estimation
system dependability constraints
RTL fault injection campaigns
radiation testing
market pressure
ISO 26262
intertwined hardware
HW-SW systems
functional safety standards
fault injections
dependability analysis
cyber physical systems
hardware-software codesign
Circuit faults
CPS
Safety
safety-critical software
ISO standards
cost reduction
Reliability
Metrics
pubcrawl
Resiliency
Time measurement
system-on-chip
SoC
embedded systems
Software
Hardware
Scalability
security of data
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
biblio
The Actual Problems of IT-Security Process Assurance
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
organisational aspects
Vulnerability
System recovery
Standard
security of data
security
risk management
Resiliency
resilience
pubcrawl
Production
asset
IT-security process assurance
IT-security management system
ISO standards
integrated management systems
Integrated Management System
information management
IEC standards
company business processes
Companies
business process
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 9:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
biblio
An Empirical Study of Web Software Trustworthiness Measurement
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
internet
Web software trustworthiness measurement
web software
trustworthiness
Trusted Computing
security of data
pubcrawl
online accounting software
matrix algebra
Manganese
ISO/IEC 9126
ISO standards
automation
IEC standards
fuzzy set theory
fuzzy judgment matrix
factor analysis
evidence theory
evidence synthesis
Entropy
empirical analysis
confidence identification
composability
biblio
Concept for Increasing Security of National Information Technology Infrastructure and Private Clouds
Submitted by grigby1 on Fri, 09/28/2018 - 3:04pm
IP networks
Unicast
Routing
Resiliency
resilience
pubcrawl
Protocols
private clouds
policy-based governance
Object recognition
object identifier
national information technology infrastructure
ISO standards
IPv6-protocol
IPv6-header
Cloud Computing
internet
information technology infrastructure
information security
Human behavior
government data processing
global routing prefix
global information community
e-governments
E-Government
Cybersecurity
computer network security
coding IPv6-addresses
codes of countries
clouds
biblio
How formal analysis and verification add security to blockchain-based systems
Submitted by grigby1 on Thu, 08/23/2018 - 10:37am
ISO standards
tools
security of data
security layers
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
process transactions
blockchain
integrated technology
IEC standards
formal verification
formal method
formal analysis
domain specific language
Cryptography
contracts
blockchain-based system security
blockchain security
« first
‹ previous
1
2
3
4
next ›
last »