Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security strategy
biblio
Zero Trust Validation: from Practice to Theory : An empirical research project to improve Zero Trust implementations
Submitted by grigby1 on Fri, 12/02/2022 - 11:10am
resilience
zero trust
validation
Time measurement
Software measurement
Software
security strategy
risk management
Resiliency
Acoustic Fingerprints
real-time systems
pubcrawl
Organizations
Insurance
Human Factors
Human behavior
composability
Compliance
biblio
Artificial Immune Technology Architecture for Electric Power Equipment Embedded System
Submitted by aekwall on Fri, 04/01/2022 - 2:06pm
information security
Trusted Computing
Systematics
surveillance
security strategy
security scalability
Scientific Computing Security
Scalability
pubcrawl
Predictive Metrics
embedded systems
Homeostasis
Embedded system information security
electric power equipment
computer architecture
Compositionality
artificial immune technology(AIT)
Metrics
composability
Resiliency
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Research on Industrial Internet of Things Security Architecture and Protection Strategy
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
Protocols
Internet of Things
Internet of Things security architecture
IoT security
IoT systems
Network Security Architecture
network security threats
production engineering computing
protection strategy
intelligent transportation
pubcrawl
security
security of data
security protection strategies
security strategy
security threats
Servers
Intelligent Data and Security
intelligent processing
intelligent environment detection
information security issues
industrial IoT system
industrial IoT information security protection technology
Industrial IoT
industrial automation systems
Data processing
data acquisition
cyber security threats
computer network security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
The building of a security strategy based on the model of game management
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
information security
theory games
systemic approach
security strategy
security of data
Scalability
pubcrawl
Process modeling
principles theory game
Metrics
Management
complex inter-dependencies
Human Factors
Games
game theory
game theoretic security
game management
Decision support systems
Cybersecurity
cyber security management
cost-efficient defense solutions