Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threat
biblio
Usage of Classifier Ensemble for Security Enrichment in IDS
Submitted by grigby1 on Wed, 08/16/2023 - 2:40pm
Intrusion Detection
pubcrawl
resilience
Resiliency
standards
composability
network security
renewable energy sources
computer networks
IDS
automation
classification
intrusion
threat
biblio
The concept of the knowledge base of threats to cyber-physical systems based on the ontological approach
Submitted by grigby1 on Fri, 05/26/2023 - 3:31pm
composability
Resiliency
threat
knowledge based systems
cyber-physical system
Ontology
Internet of Things
Ontologies
cyber-physical systems
CPS Security
computer architecture
Scalability
Analytical models
resilience
policy-based governance
Human behavior
pubcrawl
security
information security
collaboration
biblio
WhatsApp: Cyber Security Risk Management, Governance and Control
Submitted by aekwall on Fri, 01/13/2023 - 2:58pm
pubcrawl
whatsapp
Vulnerability
threat
social networking (online)
Security Risk Management
security
Scalability
risks
risk management
Resiliency
Access controls
Mobile Applications
Metrics
Internet telephony
Human Factors
Governance
Freeware
data science
controls
assets
biblio
Metrics for Assessing Security of System-on-Chip
Submitted by grigby1 on Thu, 01/05/2023 - 4:39pm
pubcrawl
Metrics
Hardware
Benchmark testing
side-channel attacks
Measurement
Vulnerability
Systematics
supply chains
SoC
threat
mathematical models
impact
supply chain risk assessment
biblio
Applying the Methods of Regression Analysis and Fuzzy Logic for Assessing the Information Security Risk of Complex Systems
Submitted by grigby1 on Fri, 09/16/2022 - 3:46pm
regression analysis
multiple regression
cross-correlation
confidence interval
information resources
Costs
Resiliency
Risk
threat
Predictive models
Fuzzy logic
Analytical models
resilience
Metrics
pubcrawl
security
information security
biblio
Analysis of Supply Chain Security Management Systems Based on ISO 28001: 2007: Case Study Leather Factory in Indonesia
Submitted by grigby1 on Fri, 09/09/2022 - 2:59pm
information security
risk management
security
Supply Chain
pubcrawl
Metrics
ISO standards
supply chains
threat
Industrial engineering
security management
Production facilities
ISO 28001:2007
supply chain risk assessment
biblio
Ransomware Prevention System Design based on File Symbolic Linking Honeypots
Submitted by aekwall on Thu, 07/14/2022 - 3:19pm
Incident Response
threat
ransomware preventive measures
ransomware detection
decryption
data acquisition
File systems
pubcrawl
Cybersecurity
system analysis and design
Measurement
information security
Ransomware
composability
Resiliency
Metrics
encryption
Conferences
collaboration
biblio
Blind Attack Flaws in Adaptive Honeypot Strategies
Submitted by grigby1 on Thu, 06/09/2022 - 1:52pm
Network
adaptive
honeypot
deception
Optimized production technology
Resiliency
honey pots
threat
Human Factors
Adaptation models
Artificial Intelligence
Fingerprint recognition
Scalability
security
resilience
pubcrawl
adaptive systems
biblio
Calculation of Risk Parameters of Threats for Protected Information System
Submitted by grigby1 on Mon, 04/18/2022 - 9:56am
probability
threat
Task Analysis
Security Risk Estimation
security
Scalability
Risk
resilience
pubcrawl
protection
automation
Metrics
Mathematical model
intensity
Human Factors
flow
estimation
end-to-end security systems
Economics
biblio
Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis
Submitted by grigby1 on Tue, 03/01/2022 - 3:19pm
Pipelines
Wires
Vegetation
threat
telecommunication traffic
Table lookup
Scalability
Resiliency
resilience
pubcrawl
Acceleration
network on chip security
Network
Metrics
detection
Decision trees
Decision Tree
Cryptography
composability
1
2
3
next ›
last »