Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk mitigation
biblio
Security Risk Management Analysis using Failure Mode and Effects Analysis (FMEA) Method and Mitigation Using ISO 27002:2013 for Agency in District Government
Submitted by aekwall on Fri, 01/13/2023 - 2:56pm
security
Software
Human Factors
information technology
pubcrawl
Scalability
Metrics
Resiliency
risk management
FMEA
Personnel
ISO standards
Management information systems
PMIS
risk mitigation
Security Risk Management
biblio
Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory
Submitted by grigby1 on Tue, 05/10/2022 - 11:53am
prospect theory
wireless sensor networks
ubiquitous computing
Stochastic game
Scalability
risk mitigation
Resiliency
resilience
quality of service
pubcrawl
Stochastic Computing Security
privacy
performance evaluation
Metrics
Human Factors
Games
edge computing
Dynamic scheduling
data centers
adaptive security
biblio
Securely Taking on New Executable Software Of Uncertain Provenance
Submitted by willirn1 on Tue, 10/26/2021 - 5:39pm
Software
automation
risk mitigation
security
Cybersecurity
software vulnerabilities
C3E
trustworthiness
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 12:59pm
Personnel
trusted human framework
Trusted Computing
software engineering
security of data
risk mitigation
risk management
pubcrawl
potential employees
cyclic process
People Process and Technology
on-going process
insider threats risk
Insider Threats
human trust
Human behavior
enterprise risk management activities
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by grigby1 on Wed, 02/26/2020 - 3:44pm
Phishing
virtual experiences
unsolicited e-mail
threats
threat mitigation
threat
security measures
security defense mechanisms
risk mitigation
Resiliency
resilience
pubcrawl
Attack vectors
Metrics
mass email infrastructures
machine learning
Human Factors
Human behavior
fraudulent content
fraud
email attacks
electronic mail service
Computer crime
biblio
Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea
Submitted by BrandonB on Tue, 05/05/2015 - 8:24am
risk avoidance
impact level
individual ICT risk
individualism group
intensive ICT risk
Moon
personal data
privacy
privacy invasion
probability level
risk acceptance
ICT security
risk management
risk mitigation
risk transfer
security
severe ICT risk
social science perspective
South Korea
strong ICT risk
technological risk
data spill accident case analysis
Big Data
Big Data characteristics
Big Data laws
Big Data market
Big Data norms
Big Data technology
cultural types
culture type
data privacy
Accidents
data variety
data velocity
data volume
egalitarianism group
fatalism group
hierarchy group
ICT policy
ICT risk based policy design
ICT risk management