Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170107
biblio
Forecasting severity of software vulnerability using grey model GM(1,1)
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Predictive models
Vulnerability
software vulnerability forecasting severity
software security level
software security
software risk level
software reliability
Software
severity
security of data
security
pubcrawl170107
grey model
prediction
Measurement
Mathematical model
grey theory
grey systems
grey system theory
GM(1
forecasting theory
forecasting
Data models
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Code based community network for identifying low risk community
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
pubcrawl170107
vehicle routing
travelling
Time
security
Safety
safe routing
Routing
road traffic
road safety
road network
risk factor
pubcrawl170108
balancing conundrum
low risk community
low risk cities
Inference algorithms
fuzzy technique
fuzzy set theory
Fuzzy inference process
distance
cost
code based community network
Code based Community
Cities and towns
boulevard network centers
biblio
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
operating systems (computers)
Substations
smart power grids
Smart Grid
Security Risk Management
security
SCADA Security
risk management
pubcrawl170108
pubcrawl170107
power system management
power system control
power grids
power engineering computing
Communication equipment
off-the-shelf vulnerable operating systems
noncooperative game theory
Non-cooperative Game Theory
Nash Equilibrium
Mathematical model
interdependent ICT
Games
game-theoretical model
game theory
electrical infrastructures
cyber-physical system
communication infrastructure
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security
biblio
A game-theoretic approach for minimizing security risks in the Internet-of-Things
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
optimal prosumer set
user data theft
two player game
Silicon
security risk minimization
security of data
security
pubcrawl170108
pubcrawl170107
prosumers selection Game
Cascading style sheets
noncooperative game
Nash prosumers selection
Nash Equilibrium
Internet of Things
Games
game theory
decision support
Conferences
biblio
Robust optimization of risk for power system based on information gap decision theory
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
power system security
uncertainty
Robustness
robust optimization operation method
robust optimization of power system
risk optimization
risk management
risk control optimization
pubcrawl170108
pubcrawl170107
power systems
Decision support systems
power system risk control
power system management
Power industry
optimization
optimisation
nonprobabilistic uncertainties
Non-probabilistic uncertainty
information gap decision theory
IEEE-30 system
decision theory
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
Cyber Security Risk Assessment for Industrial Automation Platform
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
IAP software
standards
Software
security of data
risk management
risk assessment
pubcrawl170108
pubcrawl170107
protective strategy
industrial control system
industrial control
industrial automation platform
analytic hierarchy process
fuzzy set theory
fuzzy comprehensive evaluation method
fuzzy analytic hierarchy process
entropy theory
Entropy
cyber security risk assessment
cyber security
computer security
communication links
communication link risk
automation
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
Predilections
usage control theory
UCON
TPP
tinkering process
Tinker
theory-of-technology acceptance model
theory-of-perceived risk
TAM
South African lead-users
software packages
software package
security of data
quantitative approach
pubcrawl170108
pubcrawl170107
Banking
Mobile communication
mobile commerce
mobile banking services
Mobile banking
Lead-users
Lead
information security risks
information security risk
information security
Human Factors
Gauteng province
demand-side predilections
Data collection
data analysis
Context
« first
‹ previous
1
2
3
4
next ›
last »