Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber incidents
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
Physical Security Detectors for Critical Infrastructures Against New-Age Threat of Drones and Human Intrusion
Submitted by grigby1 on Mon, 01/11/2021 - 12:58pm
pubcrawl
multithreaded media input streams
neural nets
neural network deep-learning model
NVIDIA GeForce GTX 1080
NVIDIA GeForce RTX 2070 Max-Q Design
physical intrusion
physical security detectors
physical security sensors
proactive protection
modern critical infrastructures
real-time threat identification
Region based Fully Connected Neural Network (RFCN)
remotely operated vehicles
resilience
Resiliency
Scalability
security of data
video analytics solution
Vulnerability
drone detection
continuous stream
critical infrastructure operators
critical infrastructure security
critical infrastructures
cyber incidents
deep video
Deep-learning
DEFENDER project
distributed cyber-physical systems
complex cyber-physical systems
early stage threat detection
fast restoration
human intruders
human intrusion
Intrusion Detection
learning (artificial intelligence)
Media Data
Metrics
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
logic linguistic models
vital physical system
Ukrainian CEI
security of data
Safety
risk management
Resiliency
resilience capacities
resilience assurance
resilience
pubcrawl
multilevel fuzzy logic models
logic-linguistic models
Accidents
Linguistics
fuzzy set theory
fuzzy logic-based approach
Fuzzy logic
external hostile influences
Damage Assessment
cyber resilience
cyber incidents
critical infrastructures
critical energy infrastructure
Computer crime
CEI cyber resilience assessment
biblio
Cyber KPI for Return on Security Investment
Submitted by grigby1 on Mon, 03/09/2020 - 1:38pm
cyber-attacks
security of data
Security Metrics
security investment
RoSI
ROI
Return on Security Investment
return on investment
pubcrawl
Metrics
cyber dashboard
cyber-attack
cyber subject matter experts
cyber security return
cyber security reports
cyber security incident
cyber security benefits
cyber security
cyber KPI
cyber incidents
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 11:38am
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies