Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEC standards
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
biblio
The Actual Problems of IT-Security Process Assurance
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
organisational aspects
Vulnerability
System recovery
Standard
security of data
security
risk management
Resiliency
resilience
pubcrawl
Production
asset
IT-security process assurance
IT-security management system
ISO standards
integrated management systems
Integrated Management System
information management
IEC standards
company business processes
Companies
business process
biblio
Risk and avoidance strategy for blocking mechanism of SDN-based security service
Submitted by aekwall on Mon, 02/17/2020 - 1:28pm
Monitoring
Switches
software-defined network
software defined networking
Security Risk Management
security
SDN-based Security Services
SDN-based security service
SDN security
SDN attack
Scalability
risk management
risk analysis
Resiliency
pubcrawl
Protocols
Dynamic Networks and Security
Metrics
malicious host
IP networks
IP forging
IEC standards
forged packets
forged IP address
dynamic network technology
data planes
cost-effective risk avoidance strategy
computer network security
blocking mechanism
attack scenario
composability
biblio
Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity Networks
Submitted by aekwall on Mon, 02/10/2020 - 11:06am
operational support
ICT community
information and communication technology system
Information inconsistencies
integrated cyber-physical system
interdependent cyber-physical system
international electrotechnical commission
International Federation for information processing
ongoing digitalization
failure causes
power distribution
power distribution grid
Power Grid
Sensor Systems
smart distribution grids
smart grid dependability
Stochastic Activity Networks
Smart Grid Sensors
Human Factors
Resiliency
pubcrawl
smart power grids
power grids
IEC standards
power engineering computing
power system security
information and communication technology
Software
surveillance
Compositionality
system reliability
Circuit faults
cyber-physical system modelling
dependability taxonomy
distribution management system
biblio
Developing Battery of Vulnerability Tests for Industrial Control Systems
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Integrated circuit modeling
vulnerability tests
test environment
Servers
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
intrusion prevention systems
Intrusion Detection Systems
Intrusion Detection
Industrial Control Systems Anomaly Detection
information security
Industrial Control Systems
industrial control
Industrial Communication
IEC standards
ICS/IDS systems
ICS networks
ICS area
data generator
control engineering computing
connected environment
computer network security
attack vector
biblio
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
command injection attacks
Time factors
substation automation system
substation automation
stealthy injection attacks
security technologies
SaS
Queueing analysis
QoS requirements
Message service
IEC61850s GOOSE messaging service
generic object oriented substation events messaging service
communications channels
security of data
quality of service
power system security
power engineering computing
IEC standards
Substations
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
modeling technique
traffic characterization
telecommunication traffic
telecommunication security
RFIDs
RFID traffic patterns
RFID traffic models
RFID traces
RFID security
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
piecewise graphs
NFC
Adaptation models
modeling algorithms
Knuth's Rule
ISO standards
IoT
IEC standards
Human Factors
Human behavior
graph theory
Computational modeling
binned RFID command counts
Bayesian Blocks
Bayes methods
anomaly/intrusion detection
Anomaly Detection
biblio
Cybersecurity assurance control baselining for smart grid communication systems
Submitted by aekwall on Mon, 08/05/2019 - 9:42am
Smart Grid
Resiliency
security assurance controls
security baseline
security categorization
security impact levels
security level
security levels
security of data
Security Technical Implementation Guides
security zone
recent innovative risk-based approaches
smart grid communication networks
smart grid communication systems
smart grid security architecture
smart grid system architecture
Smart Grids
standards
Systems Security
technical functional controls
US Defense Information Systems Agency
Human behavior
assurance
assurance baseline
Business
composability
computer security
control systems
cybersecurity assurance base lining concepts
cybersecurity assurance control baselining
cybersecurity assurance controls
Networked Control Systems Security
IEC standards
industrial automation
Information Assurance
Information systems
key cybersecurity control baselining
Metrics
national security systems
policy-based governance
pubcrawl
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 9:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
biblio
An Empirical Study of Web Software Trustworthiness Measurement
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
internet
Web software trustworthiness measurement
web software
trustworthiness
Trusted Computing
security of data
pubcrawl
online accounting software
matrix algebra
Manganese
ISO/IEC 9126
ISO standards
automation
IEC standards
fuzzy set theory
fuzzy judgment matrix
factor analysis
evidence theory
evidence synthesis
Entropy
empirical analysis
confidence identification
composability
« first
‹ previous
1
2
3
4
5
next ›
last »