Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy analytic hierarchy process
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 11:35am
fuzzy set theory
Fuzzy Cryptography
symmetric cryptographic algorithms
suitable cryptographic algorithm
SHA256
fuzzy analytic hierarchy process
FAHP
experts grading method
ECDSA
asymmetric cryptographic algorithms
financial data processing
AES
cryptographic algorithms
security
cryptocurrencies
analytic hierarchy process
Distributed databases
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Hardware
data privacy
Computational efficiency
Scalability
biblio
Cyber Security Risk Assessment for Industrial Automation Platform
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
IAP software
standards
Software
security of data
risk management
risk assessment
pubcrawl170108
pubcrawl170107
protective strategy
industrial control system
industrial control
industrial automation platform
analytic hierarchy process
fuzzy set theory
fuzzy comprehensive evaluation method
fuzzy analytic hierarchy process
entropy theory
Entropy
cyber security risk assessment
cyber security
computer security
communication links
communication link risk
automation