Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Investment
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
Internet of Things
Transportation
security of data
security economics
security
resilient IIoT systems
Resiliency
resilience
Redundancy
pubcrawl
production engineering computing
Metrics
Investment
actuator security
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
Human behavior
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
composability
actuators
biblio
A Strategic Manufacturing Capacity and Supply Chain Network Design Contingency Planning Approach
Submitted by grigby1 on Mon, 12/03/2018 - 1:51pm
pubcrawl
supply chains
supply chain risk assessment
supply chain network design contingency planning approach
Supply Chain Network Design
supply chain management
strategic network design model
strategic manufacturing capacity
scenario planning
Scalability
Safety
risk assessment scheme
Resiliency
resilience
reserve manufacturing capacity
Capacity planning
profitability
profit maximizing plant locations
product distribution
Planning
optimisation
Metrics
manufacturing
Investment
inventory investments
finance
demand forecasting
Decision support systems
Contingency Planning
biblio
Shortfall-Based Optimal Security Provisioning for Internet of Things
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
Resiliency
telecommunication network topology
Stochastic Computing Security
Stochastic computing
stochastic allocation
shortfall-based optimal security provisioning
security resource allocation plan
security infrastructure
security
Scalability
risk minimization
risk measure
risk management
resource management
resource allocation
computer network security
resilience
pubcrawl
Pareto optimization
optimization problem
optimization
optimisation
network security
Investment
Internet-of-Things scenarios
Internet of Things
Electronic mail
Economics
continuous topology changes
biblio
Security games on infrastructure networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
pubcrawl
Investment
IT systems
Load modeling
Metrics
network security game
networked control systems
node disruptions
optimal attack plans
Policy-Governed Secure Collaboration
interdiction problem
Resiliency
resource allocation
robust control models
Scalability
Science of Security
security
security of data
strategic edge disruptions
distribution networks
collaboration
communication failures
Communication networks
composability
controller-disturbance interaction
cyber-physical security
cyber-physical systems
cyber-security modelling
Density estimation robust algorithm
attacker-defender interactions
game theory
game theory methods
Games
Human behavior
Human Factors
infrastructure networks
Inspection
interdependent security game
biblio
A Content-Based Phishing Email Detection Method
Submitted by grigby1 on Wed, 12/20/2017 - 1:07pm
information extraction
unsolicited e-mail
social engineering criteria
social engineering concepts
social engineering
semantic Web database
Semantic Web
Resource description framework
pubcrawl
phishing email
Phishing
Investment
information storage
Computer crime
Human Factors
Human behavior
fuzzy logic control algorithm
fuzzy control
Filtering
email categories
Electronic mail
Databases
database management systems
cybernetics
Creativity
content-based phishing email detection
biblio
Analyzing information security investment in networked supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
networked supply chains
Trusted Computing
trust risks
supply chains
supply chain management
socially optimal solutions
security breaches
security attacks
risk management
pubcrawl170112
organisational aspects
optimisation
optimal strategy
noncooperative game condition
Computer hacking
Investment
interdependent risks
information security risk
information security investment
information security
infectious risks
Games
game theory-based model
game theory
firms
equilibrium levels
Economics
biblio
An evolutionary game-theoretic framework for cyber-threat information sharing
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
evolutionary stable strategy
Statistics
spanning industry
Sociology
self-enforced evolutionary stability
security of data
pubcrawl170109
military agencies
Investment
information sharing
information management
Incentive Model
Games
game theory
federal institutions
academia
Evolutionary Game Theory
evolutionary game theoretic strategy
evolutionary game theoretic framework
evolutionary computation
ESS
CYBEX framework
CYBEX
cybersecurity information exchange
Cybersecurity
cyber threat information sharing
cyber crimes
computer security
combat cyber attacks
collaborative effort
biblio
"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)"
Submitted by abfox on Tue, 02/14/2017 - 11:51am
advanced persistent threats
APT
computer network security
cost-benefit analysis
invasive software
Investment
malware
malware attacks
Mathematical model
Measurement
Organizations
pubcrawl170101
return on response investment
risk management
RORI index
security countermeasures
biblio
Identity management and trusted interaction in internet and mobile computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:18pm
business models
Computer crime
Identity management
internet
Investment
marketing data processing
mobile computing
mobile services
online markets
online services
potent access capability
security
security of data
sustainable development
Trusted Computing
trusted interaction
biblio
Contingency-Risk Informed Power System Design
Submitted by BrandonB on Fri, 05/01/2015 - 7:47am
long-term grid planning
Vectors
transmission expansion problem
time 2 h
standards
separation oracle
risk analysis
power systems
power system reliability
power system economics
Planning
N-k-ε survivability criterion
mixed-integer programming formulation
minimum cost
combinatorial explosion
Laboratories
Investment
integer programming
implicit optimization
IEEE 57-bus systems
IEEE 30-bus systems
generation expansion problem
electricity
Electric Power System
decomposition
contingency-risk informed power system design
Contingency requirements
contingency analysis problem
« first
‹ previous
1
2