Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AHP
biblio
A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment
Submitted by grigby1 on Fri, 07/28/2023 - 3:34pm
Information Centric Networks
AHP
Biological system modeling
Complexity theory
Ecosystems
Fuzzy logic
internet of medical things
IoMT
medical devices
Metrics
Organizations
pubcrawl
resilience
Resiliency
security
security assessment
biblio
Device Selection Decision Making using Multi-Criteria for Offloading Application Mobile Codes
Submitted by aekwall on Mon, 10/04/2021 - 2:07pm
Resiliency
Pervasive Computing Security
Portable computers
Mobile handsets
fuzzy TOPSIS
device selection
application partitioning
analytic hierarchy process
AHP
security
Metrics
Scalability
pubcrawl
pervasive computing
performance evaluation
Bandwidth
Human Factors
biblio
Modeling Cyber Resilience for Energy Delivery Systems Using Critical System Functionality
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
Energy Delivery Systems
vulnerability graph representation
Vulnerability Graph
TOPSIS
system recovery curve
security of data
safety-critical software
Resiliency
pubcrawl
matrix algebra
graph theory
graph Laplacian matrix
Computing Theory
EDS map
cyber resilience
CSF
critical system functionality
critical cyber components
Control Theory and Resiliency
analytical hierarchy process
analytic hierarchy process
AHP
resilience
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
A Proposed Framework for Ranking Critical Information Assets in Information Security Risk Assessment Using the OCTAVE Allegro Method with Decision Support System Methods
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
AHP
security risk assesment
SAW
optimal security mitigation steps
OCTAVE Allegro-SAW
OCTAVE Allegro-AHP methods
OCTAVE allegro method
OCTAVE Allegro
information security risk assessment
Decision support systems
decision support system methods
critical information assets
Critical information asset
asset information mitigation
security of data
Security Risk Management
Surface acoustic waves
DSS
Artificial Intelligence
risk analysis
analytic hierarchy process
risk management
Metrics
pubcrawl
Resiliency
information security
Organizations
Scalability
biblio
Research on income distribution model of supply chain financing based on third-party trading platform
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
industrial economics
third-party trading platform
supply chains
supply chain financing
Stability analysis
Shapley value
security
risk correction factors
risk analysis
remuneration
pubcrawl170112
AHP
income unequal distribution
income fluctuation
income distribution model
game theory
ethics
cooperative game
Companies
Banking
analytic hierarchy process
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
AHP, fuzzy sets and TOPSIS based reliable route selection for MANET
Submitted by BrandonB on Wed, 05/06/2015 - 9:03am
mobile ad-hoc network
triangular fuzzy numbers
TOPSIS based reliable route selection
TOPSIS
telecommunication security
telecommunication network routing
technique-for-order performance-by-similarity-to-ideal solution
source node
Routing protocols
Routing
Pragmatics
number theory
multiple route ranking
AHP
mobile ad hoc networks
MCDM
MANET
linguistic values
Fuzzy sets
fuzzy set theory
Fuzzy logic
destination node
criteria weights
analytical hierarchy process
analytic hierarchy process
AHP based reliable route selection
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
1
2
next ›
last »