Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
business processes
biblio
An Effective Semantic Security Metric for Industrial Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
pubcrawl
systems analysis
System-of-Systems
system design
SoS context
Semantics
Semantic Networks
security of data
Security Metrics
security metric definitions
Security Engineering
security by design
security
Runtime
Resiliency
resilience
Measurement
Model-Based Engineering
Metrics
industrial cyber-physical systems
ICPS
embedded systems
embedded system engineering
effective semantic security metric
cyber-physical systems
Current measurement
composability
business processes
business data processing
Business
metrics testing
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
A Semantic Machine Learning Approach for Cyber Security Monitoring
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
cyber-attacks
Stochastic Computing Security
stochastic styles
software technologies
semantic machine
Network Monitoring
information safety measure
digital global community
deterministic styles
destiny attacks
cyber- attacks
Cyber Attacks
cyber-threats
business processes
learning (artificial intelligence)
Computer crime
Data models
Scalability
Safety
Resiliency
resilience
pubcrawl
Monitoring
cyber security
machine learning
Training
security of data
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Cloud-Centric Framework for Isolating Big Data as Forensic Evidence from IoT Infrastructures
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
Internet of Things
sensors
security
Scalability
Resiliency
pubcrawl
proliferation
parallel processing
nanotechnology
miniaturization
Metrics
IoT infrastructures
IoT
Big Data
forensic evidence
Digital Forensics
Data Security
data exchange
cybercrime activities
cloud-computing
cloud-centric framework
Cloud Computing
CFIBD-IoT framework
business processes
big data security in the cloud
Big data isolation