Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Supply Chain
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
Special Session: Countering IP Security Threats in Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
Monitoring
Valves
Trojan insertion
Training
telecommunication security
tagging
supply chain security
supply chain management
Supply Chain
Scalability
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
Data models
machine learning
logic locking schemes
logic design
learning-based trust verification
learning (artificial intelligence)
IP security threats
invasive software
internet
integrated circuits
integrated circuit technology
integrated circuit manufacture
integrated circuit fabrication
integrated circuit design
Human behavior
electronic engineering computing
biblio
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
object behaviour
defence-in-depth strategy
Digital Witness
digital witnesses
DW
emerging concept
empirical data
employees
federated blockchain model
federated blockchain-based tracking
forensic-readiness
Incident Response
Insider threart
liability attribution framework
modern digital forensics
data collection capabilities
operational efficiency
proactive insider threat detection
Process Automation
real-life case study
SCBE
security-by-design framework
smart building
Smart City
smart controlled business environments
smart SPS objects
smart workplace
systematic integration
Repudiation
Bluetooth
Monitoring
Internet of Things
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
Supply Chain
organisational aspects
Anomaly Detection
Digital Forensics
cryptocurrencies
IoT
Insider Threats
business data processing
Threat Landscape
Artificial Intelligence
CPS
non-repudiation
authenticity
behavioural patterns
Bluetooth-based proximity monitoring solution
businesses
chain-of-custody
complexities
cyber-physical objects
biblio
Does the NIS implementation strategy effectively address cyber security risks in the UK?
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
NIS directive
cyber spaces
cyber-risk management capabilities
cyber-security risk management capabilities
DSP
IGP
legislation
national framework
NCSC
network and information security
NIS
cyber security risks
NIS framework
NIS implementation
NIS implementation strategy
NIS key strategic objectives
NIS objectives
noncyber elements
OES
Regulation
Smart City
UK Critical National Infrastructure sectors
Standards organizations
security of data
Computer crime
Scalability
cyber security
Resiliency
pubcrawl
Metrics
Supply Chain
risk management
cyber-physical security
IoT
cyber attack
Security Risk Management
CA
CNI
CNI sectors
collaborative implementation approach
connected smart technology implementations
critical national infrastructure
cross-sector CNI service security measures
cyber risk management
biblio
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study
Submitted by grigby1 on Mon, 01/27/2020 - 12:33pm
Scalability
privacy concerns
pubcrawl
Quantitative risk assessment
resilience
Resiliency
risk assessments
risk management
SaaS
policy-based governance
security
security risks
Software as a service
Supply Chain
supply chain risk assessment
supply chain-inclusive risk assessment model
supply chains
transparency
composability
case study
cloud
Cloud Computing
cloud computing services
cloud risks
cloud service providers
cloud supply chain cyber risk assessment model
collaboration
Analytical models
computing industry
CSCCRA model
data privacy
dynamic supply chain
Human behavior
Human Factors
Metrics
multicloud SaaS application
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
Determining a Security Roadmap for the Microelectronics Industry
Submitted by grigby1 on Wed, 09/11/2019 - 2:43pm
security
Microelectronics
microelectronics manufacturing industry
Microelectronics Security
microfabrication
process control
production engineering computing
pubcrawl
resilience
Resiliency
Metrics
security maintenance
security of data
security technology roadmap
smart manufacturing
standards
Supply Chain
supply chain management
technological forecasting
industrial property
Big Data
big data explosion
Cloud Computing
cloud-based solutions
composability
data sharing
data systems
electronic equipment manufacture
electronics industry
advanced process control efforts
Industry 4.0
industry-wide standards
information security
International Roadmap for Devices and System Factory Integration International Focus Team
IP networks
IP security
IRDS FI IFT
manufacturing
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
biblio
A risk assessment model for supply chain design. Implementation at Kuehne amp;\#x002B; Nagel Luxembourg
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
international regulations force enterprises
Supply Chain Risk Assesment
sustainable matters
sustainable development
sustainability
supply chain management
supply chain design
Supply Chain
risk assessment model
Performance
national regulations force enterprises
Nagel Luxembourg implementation
Logistics
Kuehne implementation
pubcrawl
indicators
green matters
Economics
decisions making
customers growing awareness
customer satisfaction
Companies
communication and information systems
risk management
Decision Making
supply chains
Metrics
biblio
RFID Security, Verification, and Blockchain: Vulnerabilities Within the Supply Chain for Food Security
Submitted by aekwall on Mon, 02/18/2019 - 12:53pm
agri-food
blockchain
food security
Human behavior
mobile vulnerability
pubcrawl
radio frequency identification
Resiliency
RFID
RFIDs
Scalability
Supply Chain
supply chain security
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »