Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Standards organizations
biblio
Designing Good Security Metrics
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
pubcrawl
weaknesses
testing
step-by-step method
Standards organizations
Software
security weaknesses
security of data
Security Metrics
Resiliency
resilience
Measurement
policy-based governance
Organizations
Metrics
Measurement and Metrics Texting
Human behavior
good security metrics
good security metric
Firewalls (computing)
designing
metrics testing
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Does the NIS implementation strategy effectively address cyber security risks in the UK?
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
NIS directive
cyber spaces
cyber-risk management capabilities
cyber-security risk management capabilities
DSP
IGP
legislation
national framework
NCSC
network and information security
NIS
cyber security risks
NIS framework
NIS implementation
NIS implementation strategy
NIS key strategic objectives
NIS objectives
noncyber elements
OES
Regulation
Smart City
UK Critical National Infrastructure sectors
Standards organizations
security of data
Computer crime
Scalability
cyber security
Resiliency
pubcrawl
Metrics
Supply Chain
risk management
cyber-physical security
IoT
cyber attack
Security Risk Management
CA
CNI
CNI sectors
collaborative implementation approach
connected smart technology implementations
critical national infrastructure
cross-sector CNI service security measures
cyber risk management
biblio
Uncertain Requirements, Assurance and Machine Learning
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
pragmatic assurance
deductive verification
financial data processing
financial services
governing bodies
human judgement
inductive assurance
linked evidence
machine-learned components
machine-learning
open-world functionality
conventional machine-learned
predefined requirements
requirements engineering
safety assessment
safety-critical domains
software construction
Standards organizations
uncertain requirements
vehicle control
verification proofs
software assurance
uncertainty
Safety
Ontologies
Software
feature extraction
learning (artificial intelligence)
machine learning
pubcrawl
composability
social networking (online)
social networks
security
privacy
software engineering
software development
assurance
safety-critical software
Scalability
formal verification
assurance case
automotive
biblio
On Design and Implementation a Federated Chat Service Framework in Social Network Applications
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
Human Factors
Social Agents
user profiles
switching cost
social network applications
service requests
Messengers
federated chat service framework
chat services
Prototypes
Switches
Scalability
Standards organizations
chatbots
internet
social networking (online)
Facebook
privacy
pubcrawl
mobile computing
Organizations
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
Security Metrics: Principles and Security Assessment Methods
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
security assessment
Taxonomy of Security Metric
taxonomy
Standards organizations
security standards
security sections
security of data
Security Metrics
security metric
security measures
security conditions
security assessments
security assessment methods
Measurement
pubcrawl
Organizations
organizational security
Metrics
metric standards
Meta-Metric
information technology
information security
business data processing
benchmarking method
Benchmark testing
metrics testing
biblio
Insider Threat Cybersecurity Framework Webtool Methodology: Defending Against Complex Cyber-Physical Threats
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
insider threat
vulnerability assessment
tools
Standards organizations
security of data
resilience
pubcrawl
Organizations
Metrics
insider threat self-assessment
insider threat cybersecurity posture
Insider Threat Cybersecurity Framework webtool
Bars
insider attacks
Human behavior
high-profile insider threat incidents
dynamic defense-in-depth security posture
Data visualization
cybersecurity web tool
cybersecurity methodology
cybersecurity framework
critical organizational cybersecurity questions
computer security
complex cyber-physical threats
biblio
Automated Threat Report Classification over Multi-Source Data
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multisource data
Training
threat report documents
Threat report
Standards organizations
security of data
security
Scalability
Resiliency
pubcrawl
pattern classification
Organizations
NLP
natural language processing techniques
natural language processing
advanced persistent threats
Metrics
machine learning model
learning (artificial intelligence)
Human behavior
feature extraction
enterprise system defenders
document handling
defense systems
Data mining
command and control systems
collaboration
business data processing
bias correction
automated threat report classification
« first
‹ previous
1
2
3
4
5
next ›
last »